Get In Touch

Phone 1300 816 777

312-50 Certified Ethical Hacker

The Certified Ethical Hacker (CEH 312-50) course is a great next step for anyone who wants to look at how…

admin August 20, 2025

Skill Plus

Home Skill Plus

About Course

The Certified Ethical Hacker (CEH 312-50) course is a great next step for anyone who wants to look at how attackers target networks, what tools attackers use, and how these techniques can be used by ethical hackers. Topics include the basic concepts related to ethical hacking, reconnaissance techniques, system hacking phases and attack techniques, network and perimeter hacking, web application hacking occurs, wireless network hacking, and mobile platforms, IoT, and OT hacking.

The goal of this course is to provide you with all the tools you need to prepare for the Certified Ethical Hacker exam — including extensive prep tools such as quizzes, foundation topics, exam preparation tasks, exercises, and review questions — to increase your chances of passing the exam on your first try.

Course objectives

Upon successful completion of this course, students should be able to:  

  • Explain basic concepts related to ethical hacking
  • Demonstrate reconnaissance techniques
  • Describe system hacking phases and attack techniques
  • Identify network and perimeter hacking
  • Explain how web application hacking occurs
  • Understand wireless network hacking
  • Describe hacking on mobile platforms, IoT, and OT hacking
Show More

Course Content

Lesson 1: An Introduction to Ethical Hacking

Lesson 2: The Technical Foundations of Hacking

Lesson 3: Footprinting, Reconnaissance, and Scanning

Lesson 4: Enumeration and System Hacking

Lesson 5: Social Engineering, Malware Threats, and Vulnerability Analysis

Lesson 6: Sniffers, Session Hijacking, and Denial of Service

Lesson 7: Web Server Hacking, Web Applications, and Database Attacks

Lesson 8: Wireless Technologies, Mobile Security, and Attacks

Lesson 9: Evading IDs, Firewalls, and Honeypots

Lesson 10: Cryptographic Attacks and Defenses

Lesson 11: Cloud Computing, IoT and Botnets

Related Course

No Related Course