Certified Ethical Hacker v.12 (CEH)

The goal of this course is to help master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. Course includes over 200 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

Course duration, academic hours: 50
Price (excl. VAT) 2500,00 
Price (with VAT): 3025,00 
Lecturer: Kirils Solovjovs
Kirils Solovjovs
Head of security company "Possible Security", IT policy activist, vulnerability finder and the most visible "good hacker" in Latvia. Kirill specializes in network flow analysis and reverse engineering, as well as social engineering. Experienced in investigating security incidents. Kirill has obtained three higher educations with distinction, incl. Master's degree in computer science at the University of Latvia, specializing in computer networks specialist and project manager. His professional experience is complemented by an internship at the NATO Cyber Defense Center of Excellence, developing the Crossed Swords red team exercise.

Deniss Čalovskis
Deniss Čalovskis
Deniss Calovskis is a prominent figure in the cyber security world. The instructor is a certified data protection officer (DPO) or ethical hacker, which shows a high level of competence in the field of data security and protection.


01. July, 2024 - 09. July, 2024
RĪGA, Dzirnavu iela 140
Deniss Čalovskis
Price (excl. VAT)
Price (with VAT):
Contact us

Apply or ask a question!


If you want to apply for the course or ask a question about it, feel free to use this form.

Please enter your first and last names
Please enter company name
Please enter your phone number
Please enter your email

Thank you! We will contact you.

Training schedule:
01.07.2024 09:00-16:45
02.07.2024 09:00-16:15
04.07.2024 09:00-16:45
05.07.2024 09:00-16:15
08.07.2024 09:00-16:45
09.07.2024 09:00-16:15
Course target

CEH v.12 course helps you learn how to hack ethically, ensuring compliance with any security policy. Participants is going to learn risk mitigation techniques and develop skills in penetration testing, social engineering, foot printing, reconnaissance, vulnerability scanning, malware detection and analysis as well as get hands-on experience in remediation and the use of automation tools for faster and more efficient penetration testing. Participants will gain knowledge on attack vectors, network security, mobile platforms and cloud computing.

  • Information Security Analyst
  • Administrator
  • Information Assurance (IA) Security
  • Officer
  • Information Security Manager
  • Specialist
  • Information Systems Security Engineer
  • Manager
  • Information Security Professionals
  • Officers
  • Information Security / IT Auditors
  • Risk / Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers 
At Course Completion

Upon completion of this course, students will learn:

  1. Key issues plaguing the information security world, incident management process, and penetration testing;
  2. Various types of foot printing, foot printing tools, and countermeasures;
  3. Network scanning techniques and scanning countermeasures;
  4. Enumeration techniques and enumeration countermeasures;
  5. System hacking methodology, steganography, steganalysis attacks, and covering tracks;
  6. Different types of Trojans, Trojan analysis, and Trojan countermeasures;
  7. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures;
  8. Packet sniffing techniques and how to defend against sniffing;
  9. Social Engineering techniques, identify theft, and social engineering countermeasures;
  10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures;
  11. Session hijacking techniques and countermeasures;
  12. Different types of webserver attacks, attack methodology, and countermeasures;
  13. Different types of web application attacks, web application hacking methodology, and countermeasures;
  14. SQL injection attacks and injection detection tools;
  15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools;
  16. Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools;
  17. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures;
  18. Various cloud computing concepts, threats, attacks, and security techniques and tools;
  19. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools;
  20. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap;
  21. Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems;
  22. Different threats to IoT platforms and learn how to defend IoT devices securely. 

Before attending this course, participant must have a strong working knowledge of TCP/IP, Windows Server, a basic familiarity with Linux and/or Unix, and should ideally have at least two years’ IT experience.

Training materials

EC-Council training materials and iLabs.

Certification Exam

Certified Ethical Hacker v12 (ANSI) exam. Code: 312-50 (ECC EXAM)  (the exam fee is already included in the course price).

Course outline
  • Module 01: Introduction to Ethical Hacking;
  • Module 02: Foot printing and Reconnaissance;
  • Module 03: Scanning Networks;
  • Module 04: Enumeration<;
  • Module 05: Vulnerability Analysis;
  • Module 06: System Hacking;
  • Module 07: Malware Threats;
  • Module 08: Sniffing;
  • Module 09: Social Engineering;
  • Module 10: Denial-of-Service;
  • Module 11: Session Hijacking;
  • Module 12: Evading IDS, Firewalls, and Honeypots;
  • Module 13: Hacking Web Servers;
  • Module 14: Hacking Web Applications;
  • Module 15: SQL Injection;
  • Module 16: Hacking Wireless Networks;
  • Module 17: Hacking Mobile Platforms;
  • Module 18: IoT Hacking;
  • Module 19: Cloud Computing;
  • Module 20: Cryptography.

If you want to get more information about this course, contact us by phone +371 67505091 or send an e-mail at mrn@bda.lv.