Past Event
03 Mar 2024 - 03 May 2024

CEH v12 On-site Training at Laba, Anamnagar

LABA, in association with EC Council,  Proudly announce 60 hours camp Training and Certification program is Certified Ethical Hacker (CEH V12) an enthusiastic person can join.

About CEH V12 ANSI Exam

Number of Questions: 125

Test Duration: 4 Hours

Test Format: Multiple Choice

Test Delivery: RPS (Remote Proctoring System)

Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Passing Score: 70% 

CEH Practical Exam:

CEH Practical is a 6-hour, rigorous exam that requires you to demonstrate the skills and abilities of ethical hacking techniques such as:

  • Port scanning tools (e.g., Nmap, Hping)
  • Vulnerability detection
  • Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
  • SQL injection methodology and evasion techniques
  • Web application security tools (e.g., Acunetix WVS)
  • SQL injection detection tools (e.g., IBM Security AppScan)
  • Communication protocols
    This is the next step to becoming a C|EH Master after you have achieved your C|EH certification. Within C|EH Practical, you have a limited amount of time to complete 20 challenges that test your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VMs and applications with solutions to uncover vulnerabilities.

CEH Master :
Upon Completing the C|EH (Master) program, which consists of C|EH and C|EH (Practical), the C|EH (Master) designation is awarded. C|EH Masters have shown proficiency at a master level in the knowledge, skills, and abilities of ethical hacking with a total 6 hours of testing to prove their competency. Top top 10 performers in both C|EH and C|EH Practical exams are showcased on the C|EH Master Global Ethical Hacking Leaderboard.

CEH v12 On-site Training at Laba, Anamnagar



Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.

Perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.

Network scanning techniques and scanning countermeasures.

Enumeration techniques and enumeration countermeasures.

Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure,and end systems.

System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system
and network vulnerabilities.

Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.

Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend sniffing.

Social engineering techniques and how to identify theft attacks to audit humanlevel vulnerabilities and suggest social engineering countermeasures.

DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.

Session hijacking techniques to discover network-level session management, authentication/authorization, cryptographic weaknesses, and countermeasures.

Web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.

Web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in
web applications, and countermeasures.

SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.

Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.

Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter
for weaknesses, and countermeasures.

Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools.

Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.

Threats to IoT and OT platforms and learn how to defend IoT and OT devices securely.

Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

Date / Time

7:00 AM - 9:00 AM

03 Mar 2024 - 03 May 2024


Rubaya Nath Dahal



Aastha Karki



Pratap Nembang




- Kathmandu Address

Anamnagar, Kathmandu


Sign Up for News and Offers

Subscribe for the latest news and great deals we offer