{"id":13621,"date":"2025-08-21T17:49:36","date_gmt":"2025-08-21T14:49:36","guid":{"rendered":"https:\/\/mada.edu.sa\/?post_type=course&#038;p=13621"},"modified":"2026-04-22T15:42:54","modified_gmt":"2026-04-22T12:42:54","slug":"ceh11","status":"publish","type":"course","link":"https:\/\/mada.edu.sa\/en\/course\/ceh11\/","title":{"rendered":"EC-Council Certified Ethical Hacker (CEH v11) Course"},"content":{"rendered":"<h1><span style=\"font-family: inherit; font-size: 35px; font-style: inherit;\">General Overview<\/span><\/h1>\n<p>The <strong>EC-Council Certified Ethical Hacker (CEH v11)<\/strong> course is one of the most prominent training programs in the field of cybersecurity. It focuses on the theoretical methodology of ethical hacking according to the latest CEH standards from the EC-Council. This course is designed to provide a comprehensive understanding of the principles and techniques used by hackers, but from a defensive perspective aimed at enhancing the security of systems and networks.<\/p>\n<p>The course covers the theoretical aspects of the penetration testing process, ranging from information gathering and vulnerability analysis to risk assessment. All content is delivered within a systematic theoretical framework, without the need for field exercises or practical applications. The material highlights tools and techniques used in cyberattacks\u2014such as phishing, Denial of Service (DoS) attacks, and bypassing authentication systems\u2014while emphasizing strategic countermeasures. This course serves as an essential reference for those wishing to understand the hacking world from the inside out to develop proactive digital infrastructure protection skills.<\/p>\n<h2>General Objective<\/h2>\n<p>The primary goal of the <strong>EC-Council CEH v11<\/strong> course is to provide trainees with a precise theoretical understanding of the ethical hacking framework. The program focuses on vulnerability assessment skills, risk analysis, and the adoption of best practices in cybersecurity. It aims to consolidate knowledge regarding the methods hackers use to exploit system weaknesses, framed within a professional context intended for protection rather than intrusion.<\/p>\n<p>The general objective centers on developing the trainees&#8217; ability to understand the <strong>Cyber Kill Chain<\/strong>, identify vulnerabilities in networks and applications, and make informed security decisions. Additionally, it introduces participants to the EC-Council&#8217;s certified methodologies for security evaluation and the theoretical role of various attack tools in improving an organization\u2019s defenses. This program is a pivotal step toward building a workforce capable of protecting digital systems professionally through a solid theoretical foundation.<\/p>\n<h2>Detailed Objectives<\/h2>\n<ul>\n<li>Understand the concept of Ethical Hacking (CEH v11) and its vital role in system protection.<\/li>\n<li>Identify the stages of penetration testing, from initial reconnaissance to final reporting.<\/li>\n<li>Recognize common types of cyberattacks and their theoretical mechanisms.<\/li>\n<li>Learn how to theoretically evaluate security vulnerabilities in networks and applications.<\/li>\n<li>Gain theoretical knowledge regarding ethical hacking tools and their defensive applications.<\/li>\n<\/ul>\n<h2>Course Modules<\/h2>\n<h3>Day 1: Introduction to Ethical Hacking<\/h3>\n<ul>\n<li>Introduction to the EC-Council Certified Ethical Hacker (CEH v11) course.<\/li>\n<li>Defining ethical hacking: Why is it essential in modern cybersecurity?<\/li>\n<li>Distinguishing between &#8220;White Hat&#8221; (Ethical) and &#8220;Black Hat&#8221; (Malicious) hackers.<\/li>\n<li>Overview of EC-Council standards and the ethics of hacking.<\/li>\n<\/ul>\n<h3>Day 2: Information Gathering and Environment Analysis<\/h3>\n<ul>\n<li>The concept of <strong>Reconnaissance<\/strong> and its theoretical execution.<\/li>\n<li>Passive vs. Active Reconnaissance techniques.<\/li>\n<li>Using advanced search engines (<strong>Google Dorking<\/strong>) for data collection.<\/li>\n<li>The importance of <strong>Footprinting<\/strong> and mapping the network landscape.<\/li>\n<\/ul>\n<h3>Day 3: Vulnerability Identification and Exploitation<\/h3>\n<ul>\n<li>Theoretical explanation of network <strong>Scanning<\/strong>.<\/li>\n<li>A theoretical look at port detection tools and services.<\/li>\n<li>Identifying security vulnerabilities within systems and applications.<\/li>\n<li>The theoretical concept of <strong>Exploitation<\/strong> and how it occurs.<\/li>\n<\/ul>\n<h3>Day 4: Common Types of Cyberattacks<\/h3>\n<ul>\n<li>Explaining <strong>Phishing<\/strong> attacks and how to recognize them.<\/li>\n<li>Overview of <strong>DoS\/DDoS<\/strong> (Denial of Service) attacks and their impact.<\/li>\n<li>Understanding the concept of <strong>Session Hijacking<\/strong>.<\/li>\n<li>The importance of <strong>SQL Injection<\/strong> attacks and bypassing authentication mechanisms.<\/li>\n<\/ul>\n<h3>Day 5: Security Reporting and Recommendations<\/h3>\n<ul>\n<li>How to prepare a professional and accurate penetration testing report.<\/li>\n<li>Core elements of a report: Observations, assessments, and recommendations.<\/li>\n<li>The role of reporting in improving an organization&#8217;s security posture.<\/li>\n<li>Effective communication with management regarding security risks.<\/li>\n<\/ul>\n<h2>Target Audience and Conclusion<\/h2>\n<p>The <strong>EC-Council CEH v11<\/strong> course is a vital development tool for professionals in cybersecurity, IT management, and digital infrastructure protection in both the public and private sectors. The course builds a strategic awareness of how hackers think, allowing professionals to follow organized methodologies to discover vulnerabilities before they can be exploited.<\/p>\n<p>These skills are essential for security analysts, protection officers, network managers, and those involved in digital transformation. The course is also ideal for individuals preparing to sit for the <strong>Certified Ethical Hacker (CEH)<\/strong> exam. Thanks to its structured theoretical nature, the program establishes a robust knowledge base, enabling trainees to navigate the technical and ethical complexities of the hacking world and make decisions that enhance institutional resilience against digital threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>General Overview The EC-Council Certified Ethical Hacker (CEH v11) course is one of the most prominent training programs in the field of cybersecurity. It focuses on the theoretical methodology of ethical hacking according to the latest CEH standards from the EC-Council. This course is designed to provide a comprehensive understanding of the principles and techniques &#8230; <a title=\"EC-Council Certified Ethical Hacker (CEH v11) Course\" class=\"read-more\" href=\"https:\/\/mada.edu.sa\/en\/course\/ceh11\/\" aria-label=\"Read more about EC-Council Certified Ethical Hacker (CEH v11) Course\">\u0625\u0642\u0631\u0623 \u0627\u0644\u0645\u0632\u064a\u062f<\/a><\/p>\n","protected":false},"author":145,"featured_media":15096,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"course_category":[],"class_list":["post-13621","course","type-course","status-publish","has-post-thumbnail","hentry","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course\/13621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course"}],"about":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/types\/course"}],"author":[{"embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/comments?post=13621"}],"version-history":[{"count":1,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course\/13621\/revisions"}],"predecessor-version":[{"id":13630,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course\/13621\/revisions\/13630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/media\/15096"}],"wp:attachment":[{"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=13621"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/mada.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=13621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}