top of page
Blue Background
yayasan.png

Certified Ethical Hacker (CEH) Course

Your path to become a Certified Ethical Hacker

77646068_SL-072622-51930-20_edited.jpg
CEH-Feature-image-1_edited.jpg

About the Certified Ethical Hacker (CEH) Programme:

Dreaming of becoming a Certified Ethical Hacker? This is where your journey begins.

Nexperts Academy's Certified Ethical Hacker (CEH) curriculum is for people who love cybersecurity and want to learn everything there is to know about ethical hacking tools, techniques, and security legislation.
 

This course gives students real-time assault simulations that let them practice their abilities in system penetration, vulnerability assessments, and threat response. You'll learn by doing labs that are like real-life cyber-attacks.

This curriculum is for you if you want to protect yourself from cyber risks and make a career in penetration testing, cybercrime defense, and ethical hacking.

Who Can Apply for this Financing?

​​To enroll in this programme, you must meet the eligibility requirements listed on the Nexperts Academy website

Eligibility

  • Bumiputera

  • Malaysian citizen

  • Aged 16 years old and above

Terms

  • For eligibility of financing that has no pay back requirement under Silver Package , you will need to Pass the Examination within a stipulated time frame. Kindly refer to the offer letter and ALTI on the actual time frame.  

  • If you fail the examination despite many repeats/ exam retakes within the time frame, you will need to pay the whole course fee as mentioned in the Letter of Enrolment / Offer Letter back to Yayasan Peneraju in the form of monthly instalment.

  • To avoid any repayment, every student will need to put effort to attend training , perform labs diligently and practice examination past questions to ensure passing in first or second attempt .

  • In any event, Nexperts Academy will provide one (1) repeat / retake exam for students who failed examination first time.

Course Highlights

  • Instructor led training

  • Materials, EC Council iLabs and Tools

  • Recording of training

  • One off Allowance (RM300-RM500) by Nexperts Academy (please note Allowance is only being provided by Nexperts Academy and Not Yayasan Peneraju)

  • Exam voucher sponsored by Nexperts Academy 2 attempts only

  • Breakfast & lunch provided for classroom trainings

  • Certified Ethical Hacker Certification

Ideal for

  • People who want to work in cybersecurity or ethical hacking

  • Recent grads who want to get more jobs in IT security

  • IT workers that want to improve their abilities in penetration testing and vulnerability assessment

  • People who love technology and want to know how hackers think and how to protect themselves from assaults

Prerequisites

  • Obtain a valid Letter of Enrolment from the Approved Learning & Training Institution (ALTI)

  • No prior familiarity with cybersecurity is needed; all the important ideas will be taught from the bottom up.

  • A personal laptop for training and practice

  • A stable internet connection for learning online or in a mixed way

  • Ability to read and write in English for technical instructions and communication

schedule.jpeg

Key Learning Outcomes:

  • Do reconnaissance, scanning, and exploitation.

  • Find and protect against malware, social engineering, and DoS attacks

  • Do tests on hacking websites, wireless networks, and the cloud

  • Use basic cryptography and security defences

  • Get completely ready for the CEH certification test

*Yayasan Peneraju's ALTI Program gives you flexible funding!

⏱︎

Duration: 5 days (Fulltime: 9:00 am - 5:00pm)

Weekdays: Monday to friday 
Weekends: Saturdays & Sundays 

💻

Mode: Online / Classroom / Hybrid

💵

Price: Paid by Yayasan Peneraju

🎖

Certification: Certified Ethical Hacker (CEH)

Course Outline:

Module 1: Introduction to Ethical Hacking

  • Information Security Overview

  • Hacking Methodologies and Frameworks

  • Hacking Concepts

  • Ethical Hacking Concepts

  • Information Security Controls

  • Information Security Laws and Standards

 

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts

  • Footprinting through Search Engines

  • Footprinting through Web Services

  • Footprinting through Social Networking Sites

  • Website Footprinting

  • Email Footprinting

  • Whois Footprinting

  • DNS Footprinting

  • Network Footprinting

  • Footprinting through Social Engineering

  • Footprinting Tools

  • Footprinting Countermeasures

 

Module 3: Scanning Networks

  • Network Scanning Concepts

  • Scanning Tools

  • Host Discovery

  • Port and Service Discovery

  • OS Discovery (Banner Grabbing/OS Fingerprinting)

  • Scanning Beyond IDS and Firewall

  • Network Scanning Countermeasures

Module 4: Enumeration

  • Enumeration Concepts

  • NetBIOS Enumeration

  • SNMP Enumeration

  • LDAP Enumeration

  • NTP and NFS Enumeration

  • SMTP and DNS Enumeration

  • Other Enumeration Techniques

  • Enumeration Countermeasures

 

Module 5: Vulnerability Analysis

  • Vulnerability Assessment Concepts

  • Vulnerability Classification and Assessment Types

  • Vulnerability Assessment Tools

  • Vulnerability Assessment Reports

 

Module 6: System Hacking

  • Gaining Access

  • Escalating Privileges

  • Maintaining Access

  • Clearing Logs

Module 7: Malware Threats

  • Malware Concepts

  • APT Concepts

  • Trojan Concepts

  • Worm Makers

  • Fileless Malware Concepts

  • Malware Analysis

  • Malware Countermeasures

  • Anti-Malware Software

Module 8: Sniffing

  • Sniffing Concepts

  • Sniffing Technique: MAC Attacks

  • Sniffing Technique: DHCP Attacks

  • Sniffing Technique: ARP Poisoning

  • Sniffing Technique: Spoofing Attacks

  • Sniffing Technique: DNS Poisoning

  • Sniffing Tools

 

Module 9: Social Engineering

  • Social Engineering Concepts

  • Social Engineering Techniques

  • Insider Threats

  • Impersonation on Social Networking Sites

  • Identity Theft

  • Social Engineering Countermeasures

 

Module 10: Denial-of-Service

  • DoS/DDoS Concepts

  • Botnets

  • DoS/DDoS Attack Techniques

  • DDoS Case Study

  • DoS/DDoS Attack Countermeasures

 

Module 11: Session Hijacking

  • Session Hijacking Concepts

  • Application-Level Session Hijacking

  • Network-Level Session Hijacking

  • Session Hijacking Tools

  • Session Hijacking Countermeasures

​Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS, IPS, Firewall, and Honeypot Concepts

  • IDS, IPS, Firewall, and Honeypot Solutions

  • Evading IDS

  • Evading Firewalls

  • Evading NAC and Endpoint Security

  • IDS/Firewall Evading Tools

  • Detecting Honeypots

  • IDS/Firewall Evasion Countermeasures

Module 13: Hacking Web Servers

  • Web Server Concepts

  • Web Server Attacks

  • Web Server Attack Methodology

  • Web Server Attack Countermeasures

 

Module 14: Hacking Web Applications

  • Web Application Concepts

  • Web Application Threats

  • Web Application Hacking Methodology

  • Web API, Webhooks, and Web Shell

  • Web Application Security

 

Module 15: SQL Injection

  • SQL Injection Concepts

  • Types of SQL Injection

  • SQL Injection Methodology

  • SQL Injection Tools

  • SQL Injection Countermeasures

Module 16: Hacking Wireless Networks

  • Wireless Concepts

  • Wireless Encryption

  • Wireless Threats

  • Wireless Hacking Methodology

  • Wireless Hacking Tools

  • Bluetooth Hacking

  • Wireless Attack Countermeasures

  • Wireless Security Tools

 

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors

  • Hacking Android OS

  • Hacking iOS

  • Mobile Device Management

  • Mobile Security Guidelines and Tools

 

Module 18: IoT and OT Hacking

  • IoT Hacking

  • IoT Concepts

  • IoT Attacks

  • IoT Hacking Methodology

  • OT Hacking

  • OT Concepts

  • OT Attacks

  • OT Hacking Methodology

​Module 19: Cloud Computing

  • Cloud Computing Concepts

  • Container Technology

  • Manipulating CloudTrial Service

  • Cloud Security

 

Module 20: Cryptography

  • Cryptography Concepts

  • Encryption Algorithms

  • Cryptography Tools

  • Email Encryption

  • Disk Encryption

  • Cryptanalysis

  • Cryptography Attack Countermeasures

Application Process

1) Submit your details on Nexperts Grants website

Here you will be submitting application to obtain Letter of Enrolment / Surat Tawaran Kursus ( you need this Offer Letter to submit to Yayasan Peneraju)

2) Review of Applications and Acceptance Letters

Our staff will check your eligibility within three days and provide you with the Letter of Enrolment (Surat Tawaran Kursus) from Nexparts Academy if you qualify.

3) Apply for Financing at peneraju.org

To obtain Yayasan Peneraju’s financing, you will need to submit the Letter of Enrolment in step 1 above  along with other mandatory three (3) documents ; Birth Certificate, IC Copy (front and back) and your Latest Bank Statement. Make sure to obtain a Certified True Copy stamp on the three (3) mandatory documents mentioned above.

4) Get Approval in 30 Days

After your financing is approved by Yayasan Peneraju and a contract is signed between you and Yayasan Peneraju, Nexperts Academy will issue you an invoice for your onward submission to Yayasan Peneraju.

5) Attend training with Nexperts Academy

Nexperts Academy will provide you with confirmed training schedules. You can select the intake based on your preference 

6) Yayasan Peneraju will transfer Course Fee to you

Yayasan Peneraju will transfer the course fee to your bank account for your onward disbursement of the same to Nexperts Academy.

Start Your Certification Journey Today!

Apply now and take advantage of Yayasan Peneraju’s flexible financing options. Fill out the form below, and our team will contact you with the next steps.

Nexperts Grants Scholarship - Yayasan Peneraju - Certified Ethical Hacker(CEH)

* Full name as per IC

Address *

Small Title

Please Note:- Above dates are Tentative Dates only , actual dates will be given once Yayasan Peneraju approves your application

* Consent & Agreement

CEH Form

FAQs: Programme & Financing

The CEH curriculum lasts for five days and teaches you about reconnaissance, scanning, exploitation, malware analysis, social engineering, DoS, web and wireless hacking, cloud vulnerabilities, encryption, and security defences. You'll learn how to do penetration testing and ethical hacking by doing hands-on labs and real-world attack simulations.

Programme FAQs

You must satisfy the conditions of the Yayasan Peneraju ALTI Program, which include being a Bumiputera, a Malaysian citizen, and at least 16 years old. Within seven business days after receiving your application, Nexperts Academy will check to see whether you are eligible

When you pass the CEH test, you will get the EC-Council Certified Ethical Hacker credential.

Yes, as long as you fulfill Yayasan Peneraju's rules on how much you may borrow and how much you have to pay back.

Financing FAQs

  • Disbursement (Advance) Payment: No payment in advance. The money goes to your account so you may pay Nexperts Academy.

  • Claim for Reimbursement Pay in full up advance and then claim when the work is done.

  • Silver: Up to RM15,000 (one-time only, 0% repayment).

  • Gold: Up to RM30,000 (multiple applications, 50% repayment).

  • Platinum: Up to RM150,000 (multiple applications, 20% repayment, convertible to scholarship).

Usually, it takes 14 to 20 business days after you send in your application at peneraju.org.

You may reapply after addressing problems, or you can pay for it yourself.

What to Expect After Applying at peneraju.org

Application Assessment:

Yayasan will review your application, it will take a good 21 working days. Expect some delay of approval or rejection from Yayasan Peneraju due to high volume of applications

Next Steps for Qualified Applicants:

Yayasan Peneraju will send an email informing on the status of your application, either approved or rejected .

CTC Documents

if approved, Sign the contract issued by Yayasan Peneraju and attend training with ALTI ie Nexperts Academy Sdn Bhd

Approval from peneraju.org

​Must Complete the examination and pass  certification ( for courses CEH , Network+, Cloud+ )

Final Step

⁠Upload the certification  at peneraju.org to be exempted from paying back to Yayasan Peneraju as per the terms of Silver Package.

Start Your Ethical Hacking Journey Today!

Apply today through Nexperts Academy to take part in Yayasan Peneraju's fully funded program to begin your career in ethical hacking.

bottom of page