Lassonde Professional Development

Close mobile menu

Program Length

12 weeks

Next Program Dates


Program Format

self-paced, weekly coaching sessions

Tuition and Fees



Knowledge of computer networks and concepts of programming

Course Overview n

You will learn the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization. u003cbru003eu003cbru003eYou will focus on hacking techniques and technologies from an offensive perspective. This advanced security program is regularly updated to reflect the latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.

u003cstrongu003eThis program is being offered as a 12-week self-paced course with weekly coaching sessions. The course consists of the following:u003c/strongu003eu003cbru003eu003cbru003eu003cstrongu003eModule 1: Introduction to Ethical Hacking u003c/strongu003eu003cbru003eCover the fundamentals of key issues in the information security world, including the basics of u003cstrongu003eethical hackingu003c/strongu003e, information security controls, relevant laws, and standard procedures.u003cbru003eu003cbru003eu003cstrongu003eModule 2: Footprinting and Reconnaissanceu003c/strongu003eu003cbru003eLearn how to use the latest techniques and tools to perform foot printing and u003cstrongu003ereconnaissanceu003c/strongu003e, a critical pre-attack phase of the ethical hacking process.u003cbru003eu003cstrongu003eu003cbru003eModule 3: Scanning Networksu003c/strongu003eu003cbru003eLearn different u003cstrongu003enetwork scanningu003c/strongu003e techniques and countermeasures.u003cbru003eu003cstrongu003eu003cbru003eModule 4: Enumerationu003c/strongu003eu003cbru003eLearn various u003cstrongu003eenumerationu003c/strongu003e techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures.u003cbru003eu003cstrongu003eu003cbru003eModule 5: Vulnerability Analysisu003c/strongu003eu003cbru003eLearn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems.u003cbru003eu003cstrongu003eu003cbru003eModule 6: System Hackingu003c/strongu003eu003cbru003eLearn about the various u003cstrongu003esystem hackingu003c/strongu003e methodologies—including steganography, steganalysis attacks, and covering tracks—used to discover system and network vulnerabilities. u003cbru003eu003cstrongu003eu003cbru003eModule 7: Malware Threatsu003c/strongu003eu003cbru003eGet an introduction to the different types of malware, such as Trojans, viruses, and worms, as well as system auditing for u003cstrongu003emalware attacksu003c/strongu003e, malware analysis, and countermeasures. u003cbru003eu003cstrongu003eu003cbru003eModule 8: Sniffingu003c/strongu003eu003cbru003eLearn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.u003cbru003eu003cstrongu003eu003cbru003eModule 9: Social Engineeringu003c/strongu003eu003cbru003eLearn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.u003cbru003eu003cstrongu003eu003cbru003eModule 10: Denial-of-Serviceu003c/strongu003eu003cbru003eLearn about different u003cstrongu003eDenial of Service (DoS)u003c/strongu003e and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.u003cbru003eu003cstrongu003eu003cbru003eModule 11: Session Hijackingu003c/strongu003eu003cbru003eUnderstand the various u003cstrongu003esession hijackingu003c/strongu003e techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.u003cbru003eu003cstrongu003eu003cbru003eModule 12: Evading IDS, Firewalls, and Honeypotsu003c/strongu003eu003cbru003eGet introduced to firewall, intrusion detection system, and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.u003cbru003eu003cstrongu003eu003cbru003eModule 13: Hacking Web Serversu003c/strongu003eu003cbru003eLearn about u003cstrongu003eweb server attacksu003c/strongu003e, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.u003cbru003eu003cstrongu003eu003cbru003eModule 14: Hacking Web Applicationsu003c/strongu003eu003cbru003eLearn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.u003cbru003eu003cstrongu003eu003cbru003eModule 15: SQL Injectionu003c/strongu003eu003cbru003eLearn about u003cstrongu003eSQL injection attacku003c/strongu003e techniques, injection detection tools, and countermeasures to detect and defend against SQL injection attempts.u003cbru003eu003cstrongu003eu003cbru003eModule 16: Hacking Wireless Networksu003c/strongu003eu003cbru003eLearn about wireless encryption, wireless hacking methodologies and tools, and Wi-Fi security tools.u003cbru003eu003cstrongu003eu003cbru003eModule 17: Hacking Mobile Platformsu003c/strongu003eu003cbru003eLearn about mobile platform attack vectors, Android vulnerability exploits, and mobile security guidelines and tools.u003cbru003eu003cstrongu003eu003cbru003eModule 18: IoT and OT Hackingu003c/strongu003eu003cbru003eLearn how to secure and defend Internet of Things (IoT) and operational technology (OT) devices and possible threats to IoT and OT platforms.u003cbru003eu003cstrongu003eu003cbru003eModule 19: Cloud Computingu003c/strongu003eu003cbru003eLearn different cloud computing concepts, such as container technologies and server less computing, various cloud-based threats and attacks, and u003cstrongu003ecloud securityu003c/strongu003e techniques and tools.u003cbru003eu003cstrongu003eu003cbru003eModule 20: Cryptographyu003c/strongu003eu003cbru003eIn the final module, learn about u003cstrongu003ecryptographyu003c/strongu003e and ciphers, public-key infrastructure, cryptography attacks, and cryptanalysis tools.u003cbru003eu003cbru003e
The Certified Lead Ethical Hacker exam comprises of two parts: practical exam and report writing. The practical exam requires the candidate to compromise at least two target machines through penetration testing. The process should be documented in a written report. The Certified Lead Ethical Hacker exam is an open book exam. Candidates are allowed to use training course materials and personal notes during the examination process.

The “ Certified Lead Ethical Hacker” exam meets all the requirements of the  Examination and Certification Program (ECP). It covers the following competency domains:

Domain 1: Information gathering tools and techniques
Domain 2: Threat modeling and vulnerability identification
Domain 3: Exploitation techniques
Domain 4: Privilege escalation
Domain 5: Pivoting and file transfers
Domain 6: Reporting
Upon successful completion of the course, you will be awarded with a Certificate of Completion from Lassonde School of Engineering and a CEH Certification (optional) from EC-Council.u003cbru003eu003cbru003eu003cstrongu003eHow to Receive Certified Ethical Hacker (CEH) Certification?u003c/strongu003eu003cbru003eu003cbru003eYou must successfully complete the CEH examination, which is a 4-hour exam with 125 multiple choice questions. This knowledge-based exam will test your skills in Information Security Threats and Attack Vectors, Attack Detection, Attack Prevention, Procedures, Methodologies and more! The exam fees are included in the course tuition fees. u003cbru003e

The training material for CEH was perfect! It had an abundance of knowledge and I was delighted to learn multiple practices to find and exploit multiple vulnerabilities within a system

—Seth Henry, Systems Engineer

More about EC-Council

The International Council of Electronic Commerce Consultants (EC-Council) is an American organization that offers cybersecurity certification, education, training, and services in various cybersecurity skills. EC-Council is headquartered in Albuquerque, New Mexico, and has certified over 237,000 professionals from 145 countries.

As the impact of security incidents in small and large organizations has increased significantly, so has the demand for ethical hacking. Ethical hacking is one of the most effective tools of safeguarding assets and protecting people and information. Ethical hacking certification is slowly becoming a standard requirement for professionals who want to work in the field of information security. 


Program Director