Internet Security and risk management

Ethical hacking

Course Overview: Certified Ethical Hacker (CEH) v11

Think Like a Hacker. Act Like a Professional.





In an era where data breaches are a matter of "when," not "if,"
the CEH certification stands as the gold standard for security professionals.
This 12-week intensive program transforms you from a passive observer into a proactive defender.




By mastering the same tools and techniques used by malicious actors, you will learn how to
identify vulnerabilities, strengthen digital perimeters, and protect critical infrastructure.





The Practical Advantage



This is not just a theory-based course. Our hands-on methodology immerses you in real-world simulations.
From intercepting network traffic to exploiting web vulnerabilities, you will apply every concept
in a controlled, ethical lab environment.





Weekly Curriculum Outline





































Phase Focus Area Key Highlights
Weeks 1-3 Reconnaissance & Footprinting Network scanning, OSINT, and gathering intelligence without detection.
Weeks 4-6 Network & System Hacking Exploiting system vulnerabilities, password cracking, and mobile platform security.
Weeks 7-9 Web & Wireless Security Web application penetration testing, SQL injection, and wireless network protection.
Weeks 10-11 Specialized Tracking & IoT SMS/GPS tracking ethics, IMEI monitoring, and device data access.
Week 12 Exam Prep & Career Strategy Mock exams, incident response, and CISO-level strategic planning.




Who Should Enroll?


This program is designed for:



  • Defenders: Network/System Administrators and Security Officers.

  • Offensive Specialists: Ethical Hackers and Penetration Testers.

  • Strategists: Risk Managers, Auditors, and IT Directors.

  • Investigators: Law Enforcement and Incident Response Teams.





Career Growth & Roadmap


The CEH certification opens doors to high-impact roles:



  • Entry Level: Junior Penetration Tester or Security Analyst.

  • Mid-Senior: Security Consultant, Incident Responder, or Security Engineer.

  • Leadership: Security Architect or Chief Information Security Officer (CISO).





Program Logistics



  • Duration: 12 Weeks

  • Schedule: 3 classes weekly (3 hours per session)

  • Format: Physical classes (Practical, hands-on learning)



πŸŽ“ Special Offer: IT Students get 30% OFF!


Use Coupon Code: DCHA-ITS1





Ready to Change Your Life?



Don’t wait for a breach to happen β€” be the one who prevents it.



πŸ“ž Call/WhatsApp:
+1 347 219 0143 |
+234 902 861 469 | 09065878266





Β© 2026 CEH Training Program. All Rights Reserved.


4.0 (4000 ratings)

Created By

Peter Esiet

Last updated: 2026-02-23 16:01:11
What you get in this course
Understand Fundamental Concepts
Master Techniques and Tools
Develop Practical Skills
Apply Knowledge in Real-World Scenarios

Course Contents

Introduction to Ethical Hacking
Foot-printing and Reconnaissance
Network Scanning
Network Scanning
Vulnerability Assessment
System Hacking
Malware Analysis
Packet Sniffing
Social Engineering Tactics
Denial-of-Service (DoS) Techniques
Session Hijacking
Circumventing IDS, Firewalls, and Honeypots
Web Server Exploitation
Web Application Hacking
SQL Injection
Wireless Network Exploitation
Mobile Platform Hacking
IoT and Operational Technology (OT) Exploits
Cloud Security
Cryptography Fundamentals
Penetration Testing Methodologies
Reporting and Documentation
Divice monitring and tracking

Course Requirements

Laptop
understanding of TCP/IP and some experience in the information security domain is encouraged.
Ethical hacking image

NGN300,000.00

30-day money back guarantee

Course Contains:
24-hours on-demand
23 Sections/Modules
Full life time access
Certificate of completion