Certified Ethical Hacker

Certified Ethical Hacker


Practical objective

The production of staff capable of conducting hacking testing operations, identifying weaknesses and how to deal with them, in addition to taking the necessary security measures for preventing future hackings and detecting and identifying the hacker.

This course represents the theoretical and practical basis for any information engineer and any communications engineer who seeks to excel by acquiring the skills needed by specially banks, and generally the large companies to secure their digital data.

Through this course, you become a priority in jobs related to information security and security systems and their branches.

Trainee requirements

The trainee must have completed the course entry to the networks within his / her curriculum or have followed the CCNA R & S course.

Summary of the course

The course offers a curriculum that provides a gateway to jobs in information security, networking and a career in IT. The curriculum consists of 60 hours divided into 30 two-hour sessions each. The sessions are divided into two sections: the first section is 10 non-synchronized sessions that contain the theoretical part of the curriculum and the student finds them on Moodle to study them by himself/herself, as discussions are held with the instructor during the second part of the sessions. The second part of the sessions consists of 20 synchronized sessions containing the practical subjects that will be carried implemented using the programs specially for ethical hacking which will be provided to the trainees during the course, in addition to solving a set of questions of previous examinations on the theoretical ideas related to the subject of the session.

Through both recorded sessions and synchronized sessions, the student receives all the information given in EC-Council courses as well as additional training on exam questions and the way they come.

The course will teach the new curriculum of 2018 with all its tools and references. This will be reflected in both the tools and the experimental method and the following axes will be added:

  • Analysis of weaknesses.
  • The security of the Internet of things.

Training Course Topics

Introduction to Ethical Hacking

Footpriting and Reconnaissance

Scanning Networks


Vulnerability Analysis

System Hacking

Malware threats


Social Engineering


Session Hijacking

Evading IDS, Firewall and Honeypots Technology

Hacking Web servers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Hacking Mobile Platforms

IoT Hacking

Cloud Computing


Targeted group
  • Students of information and communication faculties of all years
  • Graduates of all faculties of information and communications
  • Students and graduates of the Intermediate Institute of Computers
  • Students and graduates of informatics secondary school.
  • Students and graduates of colleges, institutes and other high schools with an engineering degree
  • All interested in the networking world

Learning outcomes


Learning Outcomes


Practical expertise and practical and theoretical experience in the use of open source electronic intelligence tools and technologies, and research and electronic survey



How to Prepare a Hacking Test Lab


How to collect information, security check and techniques in social engineering and other important topics


Investing Operating system Kali