


About the Certified Ethical Hacker (CEH) Programme:
Dreaming of becoming a Certified Ethical Hacker? This is where your journey begins.
Nexperts Academy's Certified Ethical Hacker (CEH) curriculum is for people who love cybersecurity and want to learn everything there is to know about ethical hacking tools, techniques, and security legislation.
This course gives students real-time assault simulations that let them practice their abilities in system penetration, vulnerability assessments, and threat response. You'll learn by doing labs that are like real-life cyber-attacks.
This curriculum is for you if you want to protect yourself from cyber risks and make a career in penetration testing, cybercrime defense, and ethical hacking.
Who Can Apply for this Financing?
To enroll in this programme, you must meet the eligibility requirements listed on the Nexperts Academy website
Eligibility
-
Bumiputera
-
Malaysian citizen
-
Aged 16 years old and above
Terms
-
For eligibility of financing that has no pay back requirement under Silver Package , you will need to Pass the Examination within a stipulated time frame. Kindly refer to the offer letter and ALTI on the actual time frame.
-
If you fail the examination despite many repeats/ exam retakes within the time frame, you will need to pay the whole course fee as mentioned in the Letter of Enrolment / Offer Letter back to Yayasan Peneraju in the form of monthly instalment.
-
To avoid any repayment, every student will need to put effort to attend training , perform labs diligently and practice examination past questions to ensure passing in first or second attempt .
-
In any event, Nexperts Academy will provide one (1) repeat / retake exam for students who failed examination first time.
Course Highlights
-
Instructor led training
-
Materials, EC Council iLabs and Tools
-
Recording of training
-
One off Allowance (RM300-RM500) by Nexperts Academy (please note Allowance is only being provided by Nexperts Academy and Not Yayasan Peneraju)
-
Exam voucher sponsored by Nexperts Academy 2 attempts only
-
Breakfast & lunch provided for classroom trainings
-
Certified Ethical Hacker Certification
Ideal for
-
People who want to work in cybersecurity or ethical hacking
-
Recent grads who want to get more jobs in IT security
-
IT workers that want to improve their abilities in penetration testing and vulnerability assessment
-
People who love technology and want to know how hackers think and how to protect themselves from assaults
Prerequisites
-
Obtain a valid Letter of Enrolment from the Approved Learning & Training Institution (ALTI)
-
No prior familiarity with cybersecurity is needed; all the important ideas will be taught from the bottom up.
-
A personal laptop for training and practice
-
A stable internet connection for learning online or in a mixed way
-
Ability to read and write in English for technical instructions and communication

Key Learning Outcomes:
-
Do reconnaissance, scanning, and exploitation.
-
Find and protect against malware, social engineering, and DoS attacks
-
Do tests on hacking websites, wireless networks, and the cloud
-
Use basic cryptography and security defences
-
Get completely ready for the CEH certification test
*Yayasan Peneraju's ALTI Program gives you flexible funding!
⏱︎
Duration: 5 days (Fulltime: 9:00 am - 5:00pm)
Weekdays: Monday to friday
Weekends: Saturdays & Sundays
💻
Mode: Online / Classroom / Hybrid
💵
Price: Paid by Yayasan Peneraju
🎖
Certification: Certified Ethical Hacker (CEH)
Course Outline:
Module 1: Introduction to Ethical Hacking
-
Information Security Overview
-
Hacking Methodologies and Frameworks
-
Hacking Concepts
-
Ethical Hacking Concepts
-
Information Security Controls
-
Information Security Laws and Standards
Module 2: Footprinting and Reconnaissance
-
Footprinting Concepts
-
Footprinting through Search Engines
-
Footprinting through Web Services
-
Footprinting through Social Networking Sites
-
Website Footprinting
-
Email Footprinting
-
Whois Footprinting
-
DNS Footprinting
-
Network Footprinting
-
Footprinting through Social Engineering
-
Footprinting Tools
-
Footprinting Countermeasures
Module 3: Scanning Networks
-
Network Scanning Concepts
-
Scanning Tools
-
Host Discovery
-
Port and Service Discovery
-
OS Discovery (Banner Grabbing/OS Fingerprinting)
-
Scanning Beyond IDS and Firewall
-
Network Scanning Countermeasures
Module 4: Enumeration
-
Enumeration Concepts
-
NetBIOS Enumeration
-
SNMP Enumeration
-
LDAP Enumeration
-
NTP and NFS Enumeration
-
SMTP and DNS Enumeration
-
Other Enumeration Techniques
-
Enumeration Countermeasures
Module 5: Vulnerability Analysis
-
Vulnerability Assessment Concepts
-
Vulnerability Classification and Assessment Types
-
Vulnerability Assessment Tools
-
Vulnerability Assessment Reports
Module 6: System Hacking
-
Gaining Access
-
Escalating Privileges
-
Maintaining Access
-
Clearing Logs
Module 7: Malware Threats
-
Malware Concepts
-
APT Concepts
-
Trojan Concepts
-
Worm Makers
-
Fileless Malware Concepts
-
Malware Analysis
-
Malware Countermeasures
-
Anti-Malware Software
Module 8: Sniffing
-
Sniffing Concepts
-
Sniffing Technique: MAC Attacks
-
Sniffing Technique: DHCP Attacks
-
Sniffing Technique: ARP Poisoning
-
Sniffing Technique: Spoofing Attacks
-
Sniffing Technique: DNS Poisoning
-
Sniffing Tools
Module 9: Social Engineering
-
Social Engineering Concepts
-
Social Engineering Techniques
-
Insider Threats
-
Impersonation on Social Networking Sites
-
Identity Theft
-
Social Engineering Countermeasures
Module 10: Denial-of-Service
-
DoS/DDoS Concepts
-
Botnets
-
DoS/DDoS Attack Techniques
-
DDoS Case Study
-
DoS/DDoS Attack Countermeasures
Module 11: Session Hijacking
-
Session Hijacking Concepts
-
Application-Level Session Hijacking
-
Network-Level Session Hijacking
-
Session Hijacking Tools
-
Session Hijacking Countermeasures
Module 12: Evading IDS, Firewalls, and Honeypots
-
IDS, IPS, Firewall, and Honeypot Concepts
-
IDS, IPS, Firewall, and Honeypot Solutions
-
Evading IDS
-
Evading Firewalls
-
Evading NAC and Endpoint Security
-
IDS/Firewall Evading Tools
-
Detecting Honeypots
-
IDS/Firewall Evasion Countermeasures
Module 13: Hacking Web Servers
-
Web Server Concepts
-
Web Server Attacks
-
Web Server Attack Methodology
-
Web Server Attack Countermeasures
Module 14: Hacking Web Applications
-
Web Application Concepts
-
Web Application Threats
-
Web Application Hacking Methodology
-
Web API, Webhooks, and Web Shell
-
Web Application Security
Module 15: SQL Injection
-
SQL Injection Concepts
-
Types of SQL Injection
-
SQL Injection Methodology
-
SQL Injection Tools
-
SQL Injection Countermeasures
Module 16: Hacking Wireless Networks
-
Wireless Concepts
-
Wireless Encryption
-
Wireless Threats
-
Wireless Hacking Methodology
-
Wireless Hacking Tools
-
Bluetooth Hacking
-
Wireless Attack Countermeasures
-
Wireless Security Tools
Module 17: Hacking Mobile Platforms
-
Mobile Platform Attack Vectors
-
Hacking Android OS
-
Hacking iOS
-
Mobile Device Management
-
Mobile Security Guidelines and Tools
Module 18: IoT and OT Hacking
-
IoT Hacking
-
IoT Concepts
-
IoT Attacks
-
IoT Hacking Methodology
-
OT Hacking
-
OT Concepts
-
OT Attacks
-
OT Hacking Methodology
Module 19: Cloud Computing
-
Cloud Computing Concepts
-
Container Technology
-
Manipulating CloudTrial Service
-
Cloud Security
Module 20: Cryptography
-
Cryptography Concepts
-
Encryption Algorithms
-
Cryptography Tools
-
Email Encryption
-
Disk Encryption
-
Cryptanalysis
-
Cryptography Attack Countermeasures

Application Process
1) Submit your details on Nexperts Grants website
Here you will be submitting application to obtain Letter of Enrolment / Surat Tawaran Kursus ( you need this Offer Letter to submit to Yayasan Peneraju)
2) Review of Applications and Acceptance Letters
Our staff will check your eligibility within three days and provide you with the Letter of Enrolment (Surat Tawaran Kursus) from Nexparts Academy if you qualify.
3) Apply for Financing at peneraju.org
To obtain Yayasan Peneraju’s financing, you will need to submit the Letter of Enrolment in step 1 above along with other mandatory three (3) documents ; Birth Certificate, IC Copy (front and back) and your Latest Bank Statement. Make sure to obtain a Certified True Copy stamp on the three (3) mandatory documents mentioned above.
4) Get Approval in 30 Days
After your financing is approved by Yayasan Peneraju and a contract is signed between you and Yayasan Peneraju, Nexperts Academy will issue you an invoice for your onward submission to Yayasan Peneraju.
5) Attend training with Nexperts Academy
Nexperts Academy will provide you with confirmed training schedules. You can select the intake based on your preference
6) Yayasan Peneraju will transfer Course Fee to you
Yayasan Peneraju will transfer the course fee to your bank account for your onward disbursement of the same to Nexperts Academy.
Start Your Certification Journey Today!
Apply now and take advantage of Yayasan Peneraju’s flexible financing options. Fill out the form below, and our team will contact you with the next steps.
FAQs: Programme & Financing
The CEH curriculum lasts for five days and teaches you about reconnaissance, scanning, exploitation, malware analysis, social engineering, DoS, web and wireless hacking, cloud vulnerabilities, encryption, and security defences. You'll learn how to do penetration testing and ethical hacking by doing hands-on labs and real-world attack simulations.
Programme FAQs
You must satisfy the conditions of the Yayasan Peneraju ALTI Program, which include being a Bumiputera, a Malaysian citizen, and at least 16 years old. Within seven business days after receiving your application, Nexperts Academy will check to see whether you are eligible
When you pass the CEH test, you will get the EC-Council Certified Ethical Hacker credential.
Yes, as long as you fulfill Yayasan Peneraju's rules on how much you may borrow and how much you have to pay back.
Financing FAQs
-
Disbursement (Advance) Payment: No payment in advance. The money goes to your account so you may pay Nexperts Academy.
-
Claim for Reimbursement Pay in full up advance and then claim when the work is done.
-
Silver: Up to RM15,000 (one-time only, 0% repayment).
-
Gold: Up to RM30,000 (multiple applications, 50% repayment).
-
Platinum: Up to RM150,000 (multiple applications, 20% repayment, convertible to scholarship).
Usually, it takes 14 to 20 business days after you send in your application at peneraju.org.
You may reapply after addressing problems, or you can pay for it yourself.

What to Expect After Applying at peneraju.org
Application Assessment:
Yayasan will review your application, it will take a good 21 working days. Expect some delay of approval or rejection from Yayasan Peneraju due to high volume of applications
Next Steps for Qualified Applicants:
Yayasan Peneraju will send an email informing on the status of your application, either approved or rejected .
CTC Documents
if approved, Sign the contract issued by Yayasan Peneraju and attend training with ALTI ie Nexperts Academy Sdn Bhd
Approval from peneraju.org
Must Complete the examination and pass certification ( for courses CEH , Network+, Cloud+ )
Final Step
Upload the certification at peneraju.org to be exempted from paying back to Yayasan Peneraju as per the terms of Silver Package.
Start Your Ethical Hacking Journey Today!
Apply today through Nexperts Academy to take part in Yayasan Peneraju's fully funded program to begin your career in ethical hacking.


