PLAB-CEH-v12 Practice Labs – Ethical Hacker v12

Information and Technology


15 Hours


Gain access to the skills and knowledge that you need to excel in your IT Career.


The Ethical Hacker Practice Lab gives users the opportunity to gain hands-on experience of the skills required to perform key ethical hacking procedures.

Ethical hacking (also known as penetration testing) is a simulated cyber attack designed to exploit security vulnerabilities within a network and systems. Individuals conducting ethical hacking locate those vulnerabilities and attempt to exploit them. For example, this might involve breaching applications, protocols, Application Programming Interfaces (APIs), servers and firewalls, plus anything else on a network that could be open to potential exploitation.

The objective is to identify vulnerabilities that could be targeted by a malicious agent and exploit those vulnerabilities to simulate the damage that might be caused. In the workplace, this intelligence is used to mitigate the effects of a cyber attack and to inform changes to security policies, procedures and infrastructure.


  • MODULE 1 | Introduction to Ethical Hacking
  • MODULE 2 | Footprinting and Reconnaissance
  • MODULE 3 | IoT Hacking
  • MODULE 4 | Scanning Networks
  • MODULE 5 | Enumeration
  • MODULE 6 | System Hacking
  • MODULE 7 | Malware Threats
  • MODULE 8 | Sniffing
  • MODULE 9 | Denial of Service
  • MODULE 10 | Session Hijacking
  • MODULE 11 | Hacking Web Servers
  • MODULE 12 | Hacking Web Applications
  • MODULE 13 | SQL Injection
  • MODULE 14 | Hacking Wireless Networks
  • MODULE 15 | Hacking Mobile Platforms
  • MODULE 16 | Cryptography
  • MODULE 17 | Social Engineering
  • MODULE 18 | Vulnerability Analysis
  • MODULE 19 | Cloud Computing
  • MODULE 20 | Evading Firewalls
  • MODULE 21 | Steganography

Payment options available to you

Need more information about this course?

Complete the fields below to receive the course information pack.

    By providing us with your contact details, you agree to the use of your data as described in our terms and conditions to receive communications. You may opt out of receiving communications at any time.