Course Information
Course Name: Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Part 1, 2, 3 Online Course
Part 1 – Foundations
Total Video Hours: 24 Hrs 3 Min
Total Videos: 113
Part 2 – Ethical Hacker
Total Video Hours: 22 Hrs 15 Min
Total Videos: 180
Part 3 – Advanced Ethical Hacker
Total Video Hours: 24 Hrs 1 Min
Total Videos: 189
Delivery Format: Online, self-paced
Skill Level: Intermediate to Advanced
Certification Alignment: EC-Council Certified Ethical Hacker (CEH) v11 – ECC 312-50
Included in This Course
Over 70 hours of structured CEH v11 training content
480+ detailed instructional videos across three learning stages
Coverage of all CEH 312-50 exam objectives
Hands-on ethical hacking and penetration testing scenarios
Real-world demonstrations using Kali Linux, Metasploit, Nmap, and other tools
Network, system, web, wireless, mobile, IoT, OT, and cloud security topics
Malware analysis, password cracking, and exploitation techniques
Defensive strategies, countermeasures, and penetration testing reports
Progressive skill development from foundations to advanced attacks
Course Outline
Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50)
Module 1 – CEH v11 Foundations Course Introduction
Module 2 – CEH v11 Introduction To Networking
Module 3 – CEH v11 LAN Components
Module 4 – CEH v11 Routing and Network Access
Module 5 – CEH v11 Intrusion Detection and Network Layers
Module 6 – CEH v11 Networking Protocols and Addressing
Module 7 – CEH v11 Network Services
Module 8 – CEH v11 Access Control
Module 9 – CEH v11 Intro to Linux
Module 10 – CEH v11 Configuring Linux
Module 11 – CEH v11 Practicing Linux Configuration
Module 12 – CEH v11 Managing Linux
Module 13 – CEH v11 Practicing Linux Management
Module 14 – CEH v11 Intro to Windows
Module 15 – CEH v11 Windows Commands
Module 16 – CEH v11 Practicing Windows Commands
Module 17 – CEH v11 Intro to Hacking
Module 18 – CEH v11 Information Security
Module 19 – CEH v11 Protecting Data
Module 20 – CEH v11 Managing Risk
Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50)
Module 21 – CEH v11 Ethical Hacker Course Intro
Module 22 – CEH v11 Intro to Footprinting
Module 23 – CEH v11 Footprinting Network Services
Module 24 – CEH v11 Defend Against Footprinting
Module 25 – CEH v11 Intro to Scanning
Module 26 – CEH v11 Port Scanning
Module 27 – CEH v11 Vulnerability Scanning
Module 28 – CEH v11 NMAP
Module 29 – CEH v11 Firewalls and Intrusion Detection
Module 30 – CEH v11 Evading Detection
Module 31 – CEH v11 Proxies and VPNs
Module 32 – CEH v11 Accessing Vulnerability
Module 33 – CEH v11 Vulnerability Research
Module 34 – CEH v11 Intro to Enumeration
Module 35 – CEH v11 Service Enumeration
Module 36 – CEH v11 Advanced Enumeration
Module 37 – CEH v11 Command Line Enumeration
Module 38 – CEH v11 Defending Against Enumeration
Module 39 – CEH v11 Intro to System Hacking
Module 40 – CEH v11 System Hacking with Metasploit
Module 41 – CEH v11 Further Attacking a Compromised System
Module 42 – CEH v11 Hacking an Operating System
Module 43 – CEH v11 Password Cracking Overview
Module 44 – CEH v11 Performing Password Attacks
Module 45 – CEH v11 Using Exploits
Module 46 – CEH v11 Hiding Information
Module 47 – CEH v11 Covering Tracks
Module 48 – CEH v11 Malware Overview
Module 49 – CEH v11 Hacking With Malware
Module 50 – CEH v11 Creating Malware
Module 51 – CEH v11 Detecting Malware
Module 52 – CEH v11 Defending Against Malware
Module 53 – CEH v11 Sniffing
Module 54 – CEH v11 Spoofing and MITM
Module 55 – CEH v11 Defending Against Poisoning and Sniffing
Module 56 – CEH v11 Social Engineering
Module 57 – CEH v11 Defending Against Social Engineering
Module 58 – CEH v11 Denial-of-Service
Module 59 – CEH v11 Advanced DoS Attacks
Module 60 – CEH v11 Defending Against Denial-of-Service
Certified Ethical Hacker Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50)
Module 61 – CEH v11 Advanced Ethical Hacker Course Intro
Module 62 – CEH v11 Session Hijacking
Module 63 – CEH v11 Defending Against Hijacking
Module 64 – CEH v11 Implementing Intrusion Detection
Module 65 – CEH v11 Testing Intrusion Detection
Module 66 – CEH v11 Implementing Firewalls
Module 67 – CEH v11 Testing Firewalls
Module 68 – CEH v11 Implementing Honeypots
Module 69 – CEH v11 Attacker Webserver
Module 70 – CEH v11 Webserver Defense
Module 71 – CEH v11 Intro To Web Apps
Module 72 – CEH v11 OWASP Top Web App Vulnerabilities
Module 73 – CEH v11 Additional Web App Vulnerabilities
Module 74 – CEH v11 Common Web App Attacks
Module 75 – CEH v11 Unauthorized Access Through Web Apps
Module 76 – CEH v11 Web App Overflow Attacks
Module 77 – CEH v11 Defending Web Apps
Module 78 – CEH v11 Intro To SQL Injection
Module 79 – CEH v11 Performing SQL Injection
Module 80 – CEH v11 Defending Against SQL Injection
Module 81 – CEH v11 Wireless Networking Overview
Module 82 – CEH v11 Wi-Fi Security
Module 83 – CEH v11 Hacking Wi-Fi
Module 84 – CEH v11 Advanced Wireless Attacks
Module 85 – CEH v11 Defending Wireless Networks
Module 86 – CEH v11 Mobile Platform Overview
Module 87 – CEH v11 Hacking Android
Module 88 – CEH v11 Hacking iOS
Module 89 – CEH v11 Mobile Platform Defense
Module 90 – CEH v11 IoT Hacking
Module 91 – CEH v11 IoT Defense
Module 92 – CEH v11 Operational Technology Overview
Module 93 – CEH v11 Hacking OT
Module 94 – CEH v11 Defending OT
Module 95 – CEH v11 Attacking The Cloud
Module 96 – CEH v11 Cloud Defense
Module 97 – CEH v11 Cryptography Overview
Module 98 – CEH v11 Protecting Data With Cryptography
Module 99 – CEH v11 Protecting Data at Home and in Transit
Module 100 – CEH v11 Pentesting Cryptography
CEH Version 11 Ethical Hacker Course Article
Certified Ethical Hacker Version 11 Part 2: Ethical Hacker (ECC 312-50) Part 1, 2, 3 Online Course establishes a complete pathway for mastering ethical hacking and penetration testing techniques used in modern cybersecurity operations. Ethical hacking requires not only tool proficiency but also a deep understanding of why vulnerabilities exist and how attackers exploit them. This CEH v11 course is structured to develop analytical thinking, technical accuracy, and professional judgment.
Foundational knowledge begins with networking, protocols, and operating systems. Understanding how data flows through networks and how systems authenticate users is essential for identifying security weaknesses. CEH Part 1 focuses on networking models, LAN technologies, routing, intrusion detection systems, and access control. Linux and Windows command-line skills are emphasized, enabling students to interact directly with systems during assessments.
Ethical hacking methodologies rely on structured processes. CEH v11 introduces penetration testing phases, the cyber kill chain, and information security principles. Students analyze security policies, risk management frameworks, and legal considerations governing ethical hacking engagements. This foundation ensures that technical skills are applied responsibly and professionally.
CEH Part 2 transitions into active penetration testing techniques. Footprinting and reconnaissance demonstrate how attackers gather intelligence using OSINT, DNS analysis, and social engineering vectors. Scanning and enumeration techniques identify live hosts, open ports, and vulnerable services. Tools such as Nmap and vulnerability scanners are used to map attack surfaces accurately.
System hacking modules focus on exploiting vulnerabilities, gaining access, escalating privileges, and maintaining persistence. Password attacks, malware deployment, and exploitation frameworks such as Metasploit are explained in detail. Ethical hackers learn how attackers bypass security controls and how defenders can detect and mitigate these actions.
Malware analysis and creation provide insight into how malicious software operates. CEH v11 explains viruses, worms, trojans, ransomware, and rootkits, along with detection and countermeasure strategies. Sniffing, spoofing, and man-in-the-middle attacks highlight risks to network communications and authentication mechanisms.
Social engineering and denial-of-service attacks illustrate how human behavior and resource exhaustion can be exploited. These modules emphasize the importance of awareness training, layered defenses, and monitoring strategies to reduce organizational risk.
CEH Part 3 expands into advanced attack surfaces. Web application security focuses on OWASP vulnerabilities, SQL injection, session hijacking, and input validation flaws. Students analyze real-world web attacks and apply defensive techniques to secure applications.
Wireless and mobile security modules address Wi-Fi attacks, rogue access points, Bluetooth exploitation, and mobile device vulnerabilities. IoT and OT hacking introduces risks associated with industrial systems, SCADA environments, and embedded devices.
Cloud security and cryptography modules examine virtualization risks, encryption techniques, key management, and secure data transmission. Ethical hackers evaluate cloud architectures and identify misconfigurations that expose sensitive data.
This CEH certification program emphasizes both offensive and defensive security perspectives. By understanding attacker methodologies, professionals strengthen their ability to design secure systems, conduct penetration tests, and support incident response teams. The progressive structure ensures skills are built logically across all three parts.
Certified Ethical Hacker Version 11 training supports roles such as ethical hacker, penetration tester, security analyst, and cybersecurity consultant. The extensive coverage and hands-on focus align with industry expectations and CEH 312-50 certification requirements.
FAQs
Who should enroll in the CEH v11 online course?
IT professionals, security analysts, network administrators, and ethical hackers seeking advanced cybersecurity skills.
Is this course aligned with the CEH 312-50 exam objectives?
The course fully aligns with EC-Council CEH v11 exam objectives across all three parts.
Does the course include hands-on penetration testing practice?
Practical demonstrations and guided exercises are included throughout the training.
Are Linux and Windows skills required before starting?
Basic familiarity is helpful, and foundational concepts are reinforced in Part 1.
Does this course cover modern attack surfaces like cloud and IoT?
Cloud, IoT, OT, mobile, and wireless security topics are covered in Part 3.
Is this course suitable for cybersecurity career advancement?
The structured progression supports professional growth in ethical hacking and penetration testing roles.
