top of page

CCNA + CEH Training Sale

CCNA (Training only) + CEH (Training + Certification) is available now for  50%  less.

Original Price: RM 8500 | Promo Price: RM 4250

Promo valid for the first 25 registrations only!


Speak with our Course Advisor

Certified Ethical Hacker V12 

Course Price

RM 6,250 (excluding 6% SST) 

(5 days/40 hours live instructor-led training)


The Certified Ethical Hacker (CEH) course offered by Nexperts Academy is a comprehensive training program designed to equip professionals with the skills and knowledge necessary to identify and prevent potential security threats. The course covers a wide range of topics, including network security, system security, cryptography, and ethical hacking methodologies. 

Participants will gain practical hands-on experience through the use of EC-Council's iLabs platform, as well as engaging with real-world examples of cyber-attacks and countermeasures. The course is delivered by accredited trainers and is available both in the classroom and online, allowing participants to choose the mode of learning that suits them best. 

Upon completion of the course, participants will receive a certificate of completion from Nexperts Academy and will be eligible to take the CEH certification exam issued by EC-Council. In the event that a participant does not pass the exam on their first attempt, Nexperts Academy offers a free exam retake and provides access to an exam preparation guide to help participants prepare. 

Overall, the CEH course offered by Nexperts Academy is a highly practical and engaging program that is designed to equip professionals with the knowledge and skills necessary to protect their organizations against cyber-attacks. 


RM6,250 (excluding 6% SST) 

Fee including: 

  • Materials 

  • EC Council Labs 

  • Examination voucher 

  • Examination retake voucher  

  • Preparation for examination 

  • Trained by Certified trainers 



Upon completion of the CEHv12 course, learners will have acquired the following skills and knowledge: 


  • Understanding of ethical hacking concepts, methodologies, and tools 

  • Knowledge of common hacking techniques and how to counter them 

  • Ability to perform network scanning and vulnerability analysis 

  • Ability to identify and address security weaknesses in web servers and applications 

  • Knowledge of mobile platform, wireless, cloud computing, and IoT/OT hacking techniques 

  • Understanding of cryptography concepts and tools 

  • Hands-on experience in using ethical hacking tools to address security vulnerabilities 

  • Preparation for the CEHv12 certification exam



Throughout the course, learners will use a range of tools, including:  

  • Nmap 

  • Nessus 

  • Metasploit 

  • Wireshark 

  • Aircrack-ng 

  • Cain and Abel 

  • John the Ripper 

  • Sqlmap 

  • Burp Suite 

  • Social-Engineer Toolkit 

  • Maltego 

  • Hydra 

  • Nikto 

  • Netcat 



  1. Comprehensive course materials, including presentation slides, handouts, and reference guides 

  2. Access to online training materials, including video lectures, quizzes, and practice exercises 

  3. Hands-on lab exercises to practice applying the course concepts in a real-world environment 

  4. Access to EC Council hacking lab -Hands-on practice in simulated environments, including virtual machines and hacking labs 

  5. Classroom and online training options to accommodate different learning styles and preferences 

  6. Expert instructors with extensive industry experience and knowledge of the latest cybersecurity trends and best practices 

  7. A dedicated support team to answer questions and provide assistance throughout the course 

  8. Exam preparation guide to help students prepare for the certification exam 

  9. Practice exam to simulate the certification exam experience and assess readiness 

  10. Free exam retake if the student fails the exam on their first attempt (terms and conditions apply) 

  11. Certificate of completion issued by Nexperts Academy to showcase the student's achievement and demonstrate their knowledge and skills to employers 



  • Information Security Analyst 1 

  • Security Analyst L1 

  • Cyber Defense Analyst 

  • Vulnerability Assessment Analyst 

  • Network Security Engineer 

  • SOC Security Analyst 

  • Security Analyst 

  • Cybersecurity Analyst level 1, level 2, & level 3 

  • Mid-Level Information Security Auditor 

  • Cybersecurity Auditor 

  • IT Security Administrator 

  • Cybersecurity Consultant 

  • Senior SOC Analyst 

  • Warning Analyst 

  • Infosec Security Administrator 

  • Solution Architect 

  • Network Engineer 

  • Information Security Manager 

  • Senior Security Consultant 

  • Security Administrator 



The CEHv12 course will provide learners with a range of skills, including: 

  • An understanding of information security laws, standards, and controls 

  • The ability to perform footprinting and reconnaissance on computer systems and networks 

  • The ability to scan networks and identify vulnerabilities 

  • The ability to enumerate computer systems and networks 

  • The ability to perform vulnerability analysis and assessment 

  • The ability to hack into computer systems and networks 

  • An understanding of malware threats and the ability to counter them 

  • The ability to perform network sniffing and social engineering attacks 

  • An understanding of denial-of-service attacks and the ability to counter them 

  • The ability to perform session hijacking and evade IDS, firewalls, and honeypots 

  • The ability to hack web servers and applications 

  • An understanding of SQL injection and the ability to counter it 

  • The ability to hack wireless networks and mobile platforms 

  • An understanding of IoT and OT hacking 

  • An understanding of cloud computing and cryptography



Sure, here are some possible course objectives for the Certified Ethical Hacker v12 (CEH v12) course: 


  1. Understand the principles and practices of ethical hacking and information security 

  2. Develop expertise in various hacking methodologies and frameworks, and learn how to apply them effectively 

  3. Master different hacking concepts and ethical hacking concepts, and use them for securing computer networks and systems 

  4. Learn about the different information security controls, laws, and standards that apply to ethical hacking and cybersecurity 

  5. Gain knowledge of footprinting and reconnaissance techniques, and use them to collect information about potential targets 

  6. Learn about network scanning, host discovery, port and service discovery, and OS fingerprinting techniques, and use them to detect vulnerabilities in computer networks 

  7. Master the art of enumeration, and learn how to gather information about system resources and user accounts in computer networks 

  8. Develop expertise in vulnerability assessment and analysis, and learn how to identify vulnerabilities and assess their impact on computer networks and systems 

  9. Understand the various malware threats, APT concepts, Trojan concepts, and fileless malware concepts, and learn how to counter them effectively 

  10. Gain knowledge of sniffing techniques, MAC attacks, DHCP attacks, ARP poisoning, and spoofing attacks, and learn how to use them to analyze network traffic and detect security breaches 

  11. Develop expertise in social engineering techniques, and learn how to use them to manipulate individuals and groups to gain unauthorized access to computer networks and systems 

  12. Learn about denial-of-service attacks, botnets, DDoS attack techniques, and DDoS case studies, and develop skills in countermeasures and defense mechanisms 

  13. Gain knowledge of session hijacking concepts, application-level session hijacking, and network-level session hijacking, and learn how to use them to take control of user sessions 

  14. Develop expertise in evading IDS, firewalls, and honeypots, and learn how to use IDS/Firewall evasion tools and countermeasures to bypass security mechanisms

  15. Learn about web server and web application hacking, SQL injection concepts and methodology, wireless network hacking, mobile platform hacking, IoT and OT hacking, and cloud computing security concepts 

  16. Develop skills in cryptography concepts, encryption algorithms, email encryption, disk encryption, and cryptography attack countermeasures. 



The inquiry process comprises three simple steps.

  • Submit Inquiry- Tell us a bit about yourself and the questions you want to enquire about. Use our CHAT feature or submit an enquiry form. You can also WhatsApp us on +601112216870 (Mr Vaheed)

  • Reviewing–Your questions will be processed and answered within a day or two 

  • Response–Answers will typically be sent through email. However, you may tell us the option you prefer us to contact you in



  • Physical Classroom Training (Malaysia)

  • On-site Company Training (Malaysia)

  • Online Training via Microsoft Teams/ZOOM. (Malaysia and International)

Contact Us



Module 1: Introduction to Ethical Hacking 

  • Information Security Overview 

  • Hacking Methodologies and Frameworks 

  • Hacking Concepts 

  • Ethical Hacking Concepts 

  • Information Security Controls 

  • Information Security Laws and Standards 


Module 2: Footprinting and Reconnaissance 

  • Footprinting Concepts 

  • Footprinting through Search Engines 

  • Footprinting through Web Services 

  • Footprinting through Social Networking Sites 

  • Website Footprinting 

  • Email Footprinting 

  • Whois Footprinting 

  • DNS Footprinting 

  • Network Footprinting 

  • Footprinting through Social Engineering 

  • Footprinting Tools 

  • Footprinting Countermeasures 


Module 3: Scanning Networks 

  • Network Scanning Concepts 

  • Scanning Tools 

  • Host Discovery 

  • Port and Service Discovery 

  • OS Discovery (Banner Grabbing/OS Fingerprinting) 

  • Scanning Beyond IDS and Firewall 

  • Network Scanning Countermeasures 


Module 4: Enumeration 

  • Enumeration Concepts 

  • NetBIOS Enumeration 

  • SNMP Enumeration 

  • LDAP Enumeration 

  • NTP and NFS Enumeration 

  • SMTP and DNS Enumeration 

  • Other Enumeration Techniques 

  • Enumeration Countermeasures 


Module 5: Vulnerability Analysis 

  • Vulnerability Assessment Concepts 

  • Vulnerability Classification and Assessment Types 

  • Vulnerability Assessment Tools 

  • Vulnerability Assessment Reports 


Module 6: System Hacking 

  • Gaining Access 

  • Escalating Privileges 

  • Maintaining Access 

  • Clearing Logs 


Module 7: Malware Threats

  • Malware Concepts 

  • APT Concepts 

  • Trojan Concepts 

  • o Worm Makers 

  • Fileless Malware Concepts 

  • Malware Analysis 

  • Malware Countermeasures 

  • Anti-Malware Software 


Module 8: Sniffing 

  • Sniffing Concepts 

  • Sniffing Technique: MAC Attacks 

  • Sniffing Technique: DHCP Attacks 

  • Sniffing Technique: ARP Poisoning 

  • Sniffing Technique: Spoofing Attacks 

  • Sniffing Technique: DNS Poisoning 

  • Sniffing Tools 


Module 9: Social Engineering 

  • Social Engineering Concepts 

  • Social Engineering Techniques 

  • Insider Threats 

  • Impersonation on Social Networking Sites 

  • Identity Theft 

  • Social Engineering Countermeasures 


Module 10: Denial-of-Service 

  • DoS/DDoS Concepts 

  • Botnets 

  • DoS/DDoS Attack Techniques 

  • DDoS Case Study 

  • DoS/DDoS Attack Countermeasures 


Module 11: Session Hijacking 

  • Session Hijacking Concepts 

  • Application-Level Session Hijacking 

  • Network-Level Session Hijacking 

  • Session Hijacking Tools 

  • Session Hijacking Countermeasures 


Module 12: Evading IDS, Firewalls, and Honeypots 

  • IDS, IPS, Firewall, and Honeypot Concepts 

  • IDS, IPS, Firewall, and Honeypot Solutions 

  • Evading IDS 

  • Evading Firewalls 

Module 11: Exceptions and Assertions

  • Defining the purpose of Java exceptions

  • Using the try and throw statements

  • Using the catch, multi-catch, and finally clauses

  • Autoclose resources with a try-with-resources statement

  • Recognizing common exception classes and categories

  • Creating custom exceptions

  • Testing invariants by using assertions

  • Evading NAC and Endpoint Security 

  • IDS/Firewall Evading Tools 

  • Detecting Honeypots 

  • IDS/Firewall Evasion Countermeasures 


Module 13: Hacking Web Servers 

  • Web Server Concepts 

  • Web Server Attacks 

  • Web Server Attack Methodology 

  • Web Server Attack Countermeasures 


Module 14: Hacking Web Applications 

  • Web Application Concepts 

  • Web Application Threats 

  • Web Application Hacking Methodology 

  • Web API, Webhooks, and Web Shell 

  • Web Application Security 


Module 15: SQL Injection 

  • SQL Injection Concepts 

  • Types of SQL Injection 

  • SQL Injection Methodology 

  • SQL Injection Tools 

  • SQL Injection Countermeasures 


Module 16: Hacking Wireless Networks 

  • Wireless Concepts 

  • Wireless Encryption 

  • Wireless Threats 

  • Wireless Hacking Methodology 

  • Wireless Hacking Tools 

  • Bluetooth Hacking 

  • Wireless Attack Countermeasures 

  • Wireless Security Tools 


Module 17: Hacking Mobile Platforms 

  • Mobile Platform Attack Vectors 

  • Hacking Android OS 

  • Hacking iOS 

  • Mobile Device Management 

  • Mobile Security Guidelines and Tools 


Module 18: IoT and OT Hacking 

  • IoT Hacking 

  • IoT Concepts

  • IoT Attacks 

  • IoT Hacking Methodology 

  • OT Hacking 

  • OT Concepts 

  • OT Attacks 

  • OT Hacking Methodology 


Module 19: Cloud Computing 

  • Cloud Computing Concepts 

  • Container Technology 

  • Manipulating CloudTrial Service 

  • Cloud Security 


Module 20: Cryptography 

  • Cryptography Concepts 

  • Encryption Algorithms 

  • Cryptography Tools 

  • Email Encryption 

  • Disk Encryption 

  • Cryptanalysis 

  • Cryptography Attack Countermeasures

Get Authenticated






24 HRS-01.png

- 24/7 SUPPORT





ONE ON ONE-01.png


bottom of page