EC-Council № 05 of 14 ATC Accredited Offensive

CEH
Ethical Hacker

The world-famous Certified Ethical Hacker (C|EH v12) — develop real-world experience in ethical hacking through the hands-on C|EH practice environment. Now available at Mac Jason Academy, an EC-Council Accredited Training Center.

5day
Bootcamp Format
20
CEH Modules
1:1
Mentor Pairing
220q
Practice Bank
№ 01 / Overview

Think like the attacker. Defend like a professional.

The C|EH course provides learners with an understanding of ethical hacking phases, various attack vectors and preventative countermeasures. It teaches you how hackers think and act maliciously so you can better position your organization's security posture — and pre-empt the breaches before they happen.

Our delivery is shaped by Mac Jason Academy's status as an EC-Council Accredited Training Center. That means official curriculum, EC-Council-aligned labs, and instructors with combined industry experience exceeding 40 years. You won't be reading slides — you'll be footprinting, scanning, exploiting and pivoting in the C|EH Engage practice environment.

Who this is for: Aspiring penetration testers, SOC analysts looking to move from blue to purple team, IT administrators tired of being reactive, military and federal personnel pursuing 8570/8140 compliance, and career-changers committed to offensive security.

№ 02 / Outcomes

What you'll walk away with.

  • 01Sit for the EC-Council C|EH exam with confidence20 modules of accredited training — exam blueprint coverage end-to-end.
  • 02Execute the five phases of ethical hackingReconnaissance, scanning, gaining access, maintaining access, covering tracks — taught with live targets.
  • 03Operate the attacker toolkit fluentlyNmap, Metasploit, Burp Suite, Wireshark, John the Ripper, sqlmap — used in supervised lab engagements.
  • 04Recognise modern attack vectorsWeb app injection, wireless, mobile, IoT, OT and cloud — covered with current-version exploits.
  • 05Write the report employers actually wantFindings, evidence, business impact and remediation — modelled on consulting deliverables.
  • 06Position for a SOC, red team or pentest roleCareer conversations with practicing engineers from Mac Jason Consult.
Network operations centre with monitor walls
Chapter 03 — In the lab
№ 03 / Curriculum

Twenty modules. Twenty attack surfaces.

Curriculum aligned to EC-Council's C|EH v12 Exam Blueprint. Each module pairs theory, a guided lab and a mentor checkpoint.

Information security overview, hacker classes, the five phases of ethical hacking, controls, laws, and the C|EH code of ethics. We set the rules of engagement before anyone touches a terminal.
Passive and active reconnaissance, search engine intel, WHOIS, DNS, network and email footprinting. OSINT tradecraft using current-version tooling.
Host discovery, port and service enumeration, OS fingerprinting, evading IDS via crafted scans. Hands-on Nmap, masscan and stealthier techniques.
NetBIOS, SMB, SNMP, LDAP, NTP, NFS, SMTP, DNS and the protocols attackers love. Pulling usernames, shares and configuration leaks.
CVSS scoring, vulnerability assessment lifecycle, types of scanners, classification and reporting. Hands-on Nessus, OpenVAS and Nikto.
Gaining access, escalating privileges, maintaining access and clearing logs. Password cracking, Metasploit, post-exploitation techniques.
Trojans, viruses, worms, ransomware, fileless malware, APT lifecycle. Static and dynamic analysis in a sandboxed lab.
MAC flooding, ARP poisoning, DHCP attacks, DNS spoofing. Hands-on Wireshark, Ettercap and packet capture interpretation.
Human attack vectors, pretexting, phishing, vishing, smishing, business email compromise. Designing and running a sanctioned phishing campaign.
DoS, DDoS, botnets, amplification attacks, mitigation strategies. Architecting resilient services against volumetric and application-layer attacks.
Application-layer and network-layer hijacking, TCP/IP attacks, session prediction, MITM countermeasures.
IDS/IPS evasion, firewall fingerprinting, honeypot detection, packet fragmentation. Where defensive controls fail — and why.
Server misconfigurations, directory traversal, HTTP response splitting, web cache poisoning, deserialisation. The OWASP server-side attack catalogue.
OWASP Top 10 deep dive — XSS, CSRF, broken auth, IDOR, SSRF. Hands-on Burp Suite Pro lab against a vulnerable web app.
Inband, blind, out-of-band injection, second-order attacks, NoSQL injection, automation with sqlmap and remediation patterns.
WEP/WPA/WPA2/WPA3 attacks, rogue APs, evil twin, Bluetooth and RFID exploitation. Aircrack-ng suite in a controlled RF lab.
Android and iOS attack surfaces, MDM evasion, mobile malware, secure coding for app developers. OWASP Mobile Top 10.
IoT firmware, BLE, Zigbee, ICS/SCADA protocols. The attack vectors that hit industrial and energy clients the hardest.
AWS, Azure and GCP misconfigurations, container and serverless attacks, IAM abuse, shared responsibility model. Cloud-native pentest workflow.
Symmetric and asymmetric crypto, PKI, hashing, digital signatures, cryptanalysis. What breaks, why it breaks, and what to use instead. Includes a full mock C|EH exam.
№ 04 / Faculty

Practitioners who teach.

EC-Council certified instructors with a combined 40+ years of industry experience.

Lead Instructor · CEH · OSCP · CISSP
Senior Offensive Security Lead

Twenty-plus years of red team and penetration testing engagements across oil & gas, healthcare and federal clients. Trained over a thousand candidates for offensive security exams.

Mentor · CEH · GPEN
Lead Mentor, Offensive Practice

Bridges the gap between blueprint and Monday-morning engagement. Mentors students through the C|EH Engage labs from week one onward.

№ 05 — From a graduate
"The knowledge I gained doesn't compare to other sources I tried before enrolling in their cyber security program."
SL
Samuel Lawson
Cyber Security Graduate
№ 06 / Questions

The questions we hear most.

No. C|EH certification does not require any prerequisite, however having knowledge about networking basics will be an additional advantage to understanding the concepts easily. We pace the early modules so non-technical career-changers can catch up.
Exam voucher options are available — the standard tuition does not include the voucher by default. Speak to admissions about bundled packages and the EC-Council iLearn options we can arrange as an ATC.
Sit in on the next cohort free of charge. We'd rather you pass than walk away. Most students pass on the first attempt; those who don't usually need focused review on web application or wireless modules and recover quickly.
Yes. We deliver C|EH in three formats — live online, in-person at our Sugar Land classroom, or a blended on-demand/instructor-led version. All sessions are recorded for lifetime access.
Two evening sessions per week (Tuesday and Thursday, 6:30–9:00pm CT), plus a Saturday lab workshop. Five-day bootcamp formats run quarterly for accelerated learners.
Yes — we partner with Mia-Share / Meritize for tuition financing with monthly payment plans. See Financial Aid for full details.
№ 07 — Enroll

Cohort opens in weeks, not months.

Hold your seat with a deposit. Speak to admissions if you'd prefer a quick fit-check first — no high-pressure pitch, just a candid conversation about whether C|EH is right for you.