Course description

Professional Ethical Hacker (PEH) is the world’s most advanced ethical hacking course covering 14 of the most important security domains any individual will need when they are planning to beef up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security professionals. Professional Ethical Hacker – PEH v2 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization. This course includes System Hacking, Website Hacking, Reverse Engineering, Wireless Networks Hacking, AND more.

What will i learn?

  • 01 : Introduction to Ethical Hacking – Theory
  • 02 : Open Source Intelligence (OSINT) – Theory, Lab
  • 03 : Network Scanning – Theory, Lab
  • 04 : System Hacking – Theory, Lab
  • 05 : Malware Threats – Theory, Lab
  • 06 : Reverse Engineering – Theory, Lab
  • 07 : Cryptography – Theory, Lab
  • 08 : Sniffing – Theory, Lab
  • 09 : Social Engineering – Theory, Lab
  • 10 : Denial-of-Service – Theory, Lab
  • 11 : Hacking WiFi Networks – Theory, Lab
  • 12 : Hacking Web Applications – Theory, Lab
  • 13 : Report Writing – Theory, Lab
  • 14 : Bug Bounty – Theory

Requirements

  • Basic knowledge on using computer.
  • The student must be above 18 years of age.

Frequently asked question

Yes, The Professional Ethical Hacker (PEH) certification is the most trusted ethical hacking certification and accomplishment recommended by employers globally.

A Professional Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A PEH understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Professional Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

PEH is the world’s most advanced ethical hacking course covering 14 of the most important security domains any individual will need when they are planning to beef-up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security professionals. Professional Ethical Hacker – PEH v1 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization. This course includes System Hacking, Website Hacking, Reverse Engineering, Wireless Networks Hacking, AND more.

Security Officers, IT Auditors, Security Professionals, Site Administrators, Anyone who is concerned about the integrity of the information technology infrastructure, and individuals who are highly passionate about hacking.

Ethical Hacker,
Bug Hunter,
Freelancer,
IT Security Specialist,
IT Security Consultant,
Network Security Specialist,
Security Administrator,
Penetration Tester,
Site Administrator,
IT Auditor,
Computer Forensics Analyst,
Information Security Engineer,
Cyber Security Engineer,
Data Security Analyst.

Professional Ethical Hacker – PEH v2 (Practical)
Number of Practical Challenges : 20,
Duration : 6 hours,
Test Delivery : Online,
Passing score : 70% / 14 Marks,
Open Book : Just Like In The Real World,
Exam Availability : 1st Day Of Every Month,
Test Format : Practical Challenges And Multiple Choice.

Rafi Uddin Kanon

27-Sep-2025

5

Super fun labs, not boring at all.

Altaf Ali

25-Sep-2025

5

Great balance of offensive security and reporting.

Labib Hasan

24-Sep-2025

4

External + internal attack vectors duita practice kora hoise

Jihad Alam Poddar

23-Sep-2025

5

রেড টিম অ্যাসেসমেন্ট করার আত্মবিশ্বাস পেয়েছি

Jony Islam

23-Sep-2025

5

CTF studies khub engaging chilo.

Maruf Hossain Robi

22-Sep-2025

5

0ne of the best red teaming courses available

Riad Uddin Rahat

22-Sep-2025

5

Covers the full red team kill chain step by step..

Milon Mollah

21-Sep-2025

5

IT background na thakleo easy to learn.

Safat

21-Sep-2025

5

Beginners der jonne ekdom friendly

Lotif Mia

20-Sep-2025

5

I finally understood zero trust after this course.

Anwar Ahmed

20-Sep-2025

5

থিওরি আর প্র্যাকটিক্যাল ব্যালান্সড ছিল

Nisha Islam

19-Sep-2025

4

Strong beginner foundation for OSCP learners

Rafiq Khan

19-Sep-2025

5

Cyber job preparation er jonno helpful.

Sabina Akter

18-Sep-2025

5

ল্যাব সেশনগুলো মজাদার ছিল।

Ashik Rahman

17-Sep-2025

4

Easy to follow with practical tips

Amina Yasmin

16-Sep-2025

5

CEH প্রস্তুতির জন্য দারুণ

Jahangir Hossain

15-Sep-2025

5

Career growth er jonno perfect choice.

Monika Das

14-Sep-2025

5

Great introduction to cybersecurity basics, highly recommended for beginners.

Jahangir Hossain

14-Sep-2025

5

কোর্স কনটেন্ট গুলো গুছানো

Amina Yasmin

12-Sep-2025

4

Good

Sohan Rahman

27-Aug-2025

5

cybersecurity career jonno oboshi akti valo course

Tanvir Rahman

16-Aug-2025

4

Course material ebong content khub e valo just ektu sound issue ache.

Raihan Rahman

24-Jul-2025

4

Course Contents: 4.5 | Mentor Support : 4.5

Arifa Akter

12-Jul-2025

5

Perfect for start career in information security

Sabina Akter

30-Jun-2025

5

NAZIM UDDIN

Mr. NAZIM is currently serving as Manager of the Technology Security Division at Financial Organization. In this role, he develops, implements, and manages IT infrastructure and network security strategies, conduct internal IT audits, threat hunting, maintain PCI and ISO compliance, incident response, and guide the IT team while ensuring continuous improvement and security best practices. He has extensive experience working across diverse industry projects, including Government Organizations, Payment System Operator, IIGs, ISPs, Law Enforcement Agencies, Insurance, Banks, Finance, Corporations, and NGOs. In addition he holds industry certifications such as Network+, CEH (Master), CPENT, LPT (Master), OSCP, BSCP, and ISO/IEC 27001:2022 Lead Auditor also. He is ranked 20th out of 5M+ participants globally on the well-known CTF platform TryHackMe and has successfully exploited over 1200+ systems.

৳4200

৳4950

15% OFF

Lectures

135

Quizzes

10

Skill level

Beginner

Expiry period

Lifetime

Related courses