SERTIFIKASI INTERNASIONAL CYBER SECURITY NO. 1 DI INDONESIA
TRAINING CERTIFIED ETHICAL HACKER (CEH)
Durasi Training
±40 Jam
Level Sertifikasi
Beginner
Exam delivered by
Hear from them.
You can be next too.
95%
Merasa terbantu dengan program sertifikasi CEH di Coding Studio
95%
Puas dengan proses persiapan ujian sertifikasi CEH di Coding Studio
100%
Berhasil lulus ujian & mendapatkan sertifikat CEH Resmi EC-Council
Partner pilihan untuk menunjukkan kemampuan cyber security-mu
Coding Studio merupakan Accredited Training Center resmi dari EC-Council
Kami siap bantu Kamu untuk raih sertifikasi internasional Certified Ethical Hacker (CEH)
Tentang Sertifikasi Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) adalah sertifikasi internasional di bidang Cyber Security yang diakui secara global. Sertifikasi ini membuktikan kemampuan seseorang dalam menemukan, menganalisis, dan mengatasi celah keamanan dengan cara yang etis dan profesional.
Dengan mengikuti program kelas Training Certified Ethical Hacker (CEH) di Coding Studio, Kamu akan mendapatkan pembekalan komprehensif mengenai metodologi ethical hacking yang efektif dan dapat diterapkan pada berbagai infrastruktur digital modern. Program ini juga dirancang untuk mempersiapkan Anda memperoleh sertifikasi CEH internasional yang diakui secara global sebagai standar kompetensi di bidang Cyber Security.
Sertifikat CEH Yang Akan Kamu Dapatkan
Sertifikasi Certified Ethical Hacker (CEH) ini Cocok Untuk
Certified Ethical Hacker (CEH) adalah sertifikasi internasional di bidang Cyber Security yang diakui secara global. Sertifikasi ini membuktikan kemampuan seseorang dalam menemukan, menganalisis, dan mengatasi celah keamanan dengan cara yang etis dan profesional.
Mahasiswa/Fresh Graduates IT
Persaingan kerja di bidang IT semakin ketat. Dengan CEH, kamu bisa menonjol dibanding kandidat lain karena punya kredensial global sejak awal karier. Sertifikasi ini akan membuka pintu ke lebih banyak peluang kerja di bidang cyber security.
Profesional IT/Cyber
Bagi kamu yang sudah bekerja di bidang IT, training ini akan memperkuat kemampuanmu dalam menganalisis, mendeteksi, dan mengamankan jaringan dari berbagai ancaman. Sertifikasi CEH akan menjadi nilai tambah signifikan dalam kariermu.
Cyber Security Enthusiast & Penetration Tester
Kalau kamu tertarik dengan dunia hacking, training ini memberi kesempatan untuk belajar langsung metode yang digunakan hacker—dengan cara yang legal dan etis. Kamu juga akan menguasai tools profesional yang banyak dipakai di industri.
Perusahaan / Tim IT
Organisasi yang memiliki talenta bersertifikasi CEH dapat lebih siap menghadapi serangan siber yang makin kompleks. Melalui training ini, tim IT perusahaanmu akan lebih terampil dalam melindungi data, sistem, dan reputasi bisnis.
Dengan kata lain, kelas ini sangat relevan untuk KAMU yang...
- Ingin upgrade skill & mulai bangun karir di bidang Cyber Security
- Ingin menambah achievement /nilai plus untuk peluang karir & naik jabatan
- Ingin memiliki kredibilitas untuk skill-skill Cyber Security yang sudah dimiliki
Langkah-langkah Untuk Mendapatkan Sertifikasi CEH
Gak perlu bingung mulai dari mana — cukup ikuti langkah ini dan wujudkan mimpimu jadi CEH Certified.
Pelajari Materi Persiapan Ujian Sertifikasi CEH
Belajar Ethical Hacking jadi lebih mudah dan terarah lewat 20 modul AI-powered yang dirancang sesuai kurikulum resmi EC-Council.
Module 01
Introduction to Ethical Hacking
Introduction to Ethical Hacking
Learn the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Key Topics Covered:
- Elements of Information Security
- Classification of Attacks
- Hacker Classes
- Ethical Hacking
- AI-Driven Ethical Hacking
- ChatGPT-Powered AI Tools for Ethical Hacker
- CEH Ethical Hacking Framework
- Cyber Kill Chain Methodology
- MITRE ATT&CK Framework
- Information Assurance (IA)
- Risk Management
- Threat Intelligence Lifecycle
- Incident Management
- PCI DSS, HIPPA, SOX, GDPR, DPA
Module 02
Footprinting and Reconnaissance
Footprinting and Reconnaissance
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Key Topics Covered:
- Reconnaissance
- Footprinting Using Advanced Google Hacking Techniques
- Footprinting through People Search Services
- Dark Web Footprinting
- Competitive Intelligence Gathering
- Footprinting through Social Networking Sites
- Whois Lookup
Module 03
Scanning Networks
Scanning Networks
Learn different network scanning techniques and countermeasures.
Key Topics Covered:
- Network Scanning
- Scanning Tools
- Host Discovery Techniques
- Port Scanning Techniques
- Host Discovery and Port Scanning with AI
- Service Version Discovery
- OS Discovery/Banner Grabbing
- Scanning Beyond IDS and Firewall
Module 04
Enumeration
Enumeration
Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Key Topics Covered:
- Enumeration
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- NFS Enumeration
- SMTP Enumeration
- DNS Cache Snooping
- DNSSEC Zone Walking
- IPsec Enumeration
- VoIP Enumeration
- RPC Enumeration
- Unix/Linux User Enumeration
- SMB Enumeration
- Enumeration using AI
- Enumeration Countermeasures
Module 05
Vulnerability Analysis
Vulnerability Analysis
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are included as well.
Key Topics Covered:
- Vulnerability Classification
- Vulnerability Scoring Systems and Databases
- Vulnerability-Management Life Cycle
- Vulnerability Research
- Vulnerability Scanning and Analysis
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
- AI-Powered Vulnerability Assessment Tools
Module 06
System Hacking
System Hacking
Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Key Topics Covered:
- Password Cracking
- Password Attacks
- Password-Cracking Tools
- Vulnerability Exploitation
- Metasploit Framework
- AI-Powered Vulnerability Exploitation Tools
- Buffer Overflow
- Buffer Overflow Detection Tools
- Active Directory (AD) enumeration
- Privilege Escalation
- Privilege Escalation Tools
- Executing Applications
- Keylogger, Spyware, and many more!
Module 07
Malware Threats
Malware Threats
Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Key Topics Covered:
- Computer Worms
- Fileless Malware
- AI-based Malware
- Malware Analysis
- Static Malware Analysis
- Dynamic Malware Analysis
- Virus Detection Methods
- Malware Countermeasures
- Anti-Trojan Software
- AI-Powered Malware Detection and Analysis Tools
Module 08
Sniffing
Sniffing
Learn about packet-sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Key Topics Covered:
- Network Sniffing
- MAC Flooding
- DHCP Starvation Attack
- ARP Spoofing
- ARP Spoofing/Poisoning Tools
- MAC Spoofing
- VLAN Hopping
- STP Attack
- DNS Poisoning Techniques
- DNS Poisoning Tools
- Sniffing Tools
- Sniffer Detection Techniques
- Promiscuous Detection Tools
Module 09
Social Engineering
Social Engineering
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Key Topics Covered:
- Social Engineering
- Types of Social Engineering
- Human-based Social Engineering Techniques
- Impersonation
- Computer-based Social Engineering Techniques
- Phising
- Phising Tools
- Perform Impersonation using AI
- Identity Theft
- Mobile-based Social Engineering Techniques
- Social Engineering Countermeasures
- Anti-Phishing Toolbar
Module 10
Denial-of-Service
Denial-of-Service
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Key Topics Covered:
- DoS Attack
- DDoS Attack
- Botnets
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Toolkits
- DoS/DDoS Attack Detection Techniques
- DoS/DDoS Protection Tools
- DoS/DDoS Protection Services
Module 11
Session Hijacking
Session Hijacking
Learn the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Key Topics Covered:
- Session Hijacking
- Application-Level Session Hijacking
- Compromising Session IDs
- Session Hijacking
- Network-Level Session Hijacking
- TCP/IP Hijacking
- RST Hijacking
- Blind Hijacking
- Session Hijacking Tools
- Session Hijacking Detection Methods
- Session Hijacking Detection Tools
- Approaches to Prevent Session Hijacking
Module 12
Evading IDS, Firewalls, and Honeypots
Evading IDS, Firewalls, and Honeypots
Learn about firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Key Topics Covered:
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- Firewall
- Types of Firewalls
- Intrusion Detection Tools
- Intrusion Prevention Tools
- IDS/Firewall Evasion Techniques
- NAC and Endpoint Security Evasion Techniques
- IDS/Firewall Evading Tools
- Honeypot
- Types of Honeypots
- Honeypot Tools
- IDS/Firewall Evasion Countermeasures
Module 13
Hacking Web Servers
Hacking Web Servers
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Key Topics Covered:
- Web Server Architecture
- Web Server Vulnerabilities
- Web Server Attacks
- DNS Server Hijacking
- Web Cache Poisoning Attack
- Web Server Footprinting/Banner Grabbing
- Directory Brute Forcing
- Vulnerability Scanning
- Web Server Password Hacking
- Web Server Attack Tools
- Web Server Attack Countermeasures
- Detecting Web Server Hacking Attempts
- Web Server Security Tools
Module 14
Hacking Web Applications
Hacking Web Applications
Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
Key Topics Covered:
- Web Application
- OWASP Top 10 Application Security Risks – 2021
- Web Application Attacks
- Footprint Web Infrastructure
- Analyze Web Applications
- Bypass Client-side Controls
- Attack Access Controls
- Attack Web Services
- Web API, Webhooks, Web API Hacking Methodology
- API Security Risks and Solutions
- Web Application Security Testing, and many more!
Module 15
SQL Injection
SQL Injection
Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Key Topics Covered:
- SQL Injection
- Types of SQL injection
- Error Based SQL Injection
- Union SQL Injection
- SQL Injection Methodology
- Information Gathering and SQL Injection Vulnerability Detection
- Launch SQL Injection Attacks
- Advanced SQL Injection
- SQL Injection Tools
- SQL Injection with AI
- Evasion Techniques
- SQL Injection Countermeasures
- SQL Injection Detection Tools
Module 16
Hacking Wireless Networks
Hacking Wireless Networks
Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Key Topics Covered:
- Wireless Networks
- Wireless Standards
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wi-Fi Discovery
- Wireless Traffic Analysis
- Launch of Wireless Attacks
- Wi-Fi Encryption Cracking
- Wireless Attack Countermeasures
- Wi-Fi Security Auditing Tools
Module 17
Hacking Mobile Platforms
Hacking Mobile Platforms
Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Key Topics Covered:
- Anatomy of a Mobile Attack
- App Sandboxing Issues
- SMS Phishing Attack (SMiShing)
- Call Spoofing
- OTP Hijacking/Two-Factor Authentication Hijacking
- Camera/Microphone Capture Attacks
- Android Rooting
- Hacking Android Devices
- Android Hacking Tools
- Android Security Tools
- Jailbreaking iOS
- Hacking iOS Devices
- iOS Device Security Tools
- Mobile Device Management (MDM)
- OWASP Top 10 Mobile Risks and Solutions
- Mobile Security Guidelines
- Mobile Security Tools
Module 18
IoT Hacking
IoT Hacking
Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Key Topics Covered:
- IoT Architecture
- IoT Technologies and Protocols
- OWASP Top 10 IoT Threats
- IoT Vulnerabilities
- IoT Threats
- IoT Attacks
- IoT Hacking Methodology
- IoT Hacking Tools
- IoT Security Tools
- IT/OT Convergence (IIOT)
- OT Technologies and Protocols
- OT Vulnerabilities
- OT Threats
- OT Attacks
- OT Hacking Methodology
- OT Hacking Tools
- OT Security Tools
Module 19
Cloud Computing
Cloud Computing
Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Key Topics Covered:
- Cloud Computing
- Fog Computing
- Edge Computing
- Container, Docker, Kubernetes
- Serverless Computing
- OWASP Top 10 Cloud Security Risks
- Cloud Computing Threats
- Container Vulnerabilities
- Kubernetes Vulnerabilities
- Cloud Attacks
- Cloud Hacking
Module 20
Cryptography
Cryptography
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
Key Topics Covered:
- Cryptography
- Ciphers
- Symmetric Encryption Algorithms
- Asymmetric Encryption Algorithms
- Message Digest Functions
- Quantum Cryptography
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Signed Certificate
- Digital Signature
- Email Encryption
- Disk Encryption
- Blockchain, and many more!
Belajar Langsung Secara Intensif Dengan Mentor Profesional
Belajar intensif ±6 jam per hari selama 1 bulan bareng mentor profesional — cara tercepat buat siap ujian CEH.
Maestro Purnama Fajrie
Certified Instructure CEH at Coding Studio (Freelance)
Career
- Cyber Security Consultant at Astra Graphia Information Technology
- Cyber Security Consultant at PT. Inovasi Informatika Indonesia
- Cyber Security Consultant at PT. BPR Akasiabank
Certification & Achievement
- Certified Incident Handler EC-Council
- Web Application Penetration Tester [eWPT] INE
- Certified Network Defender EC-Council
- Certified Ethical Hacker EC-Council
- Cisco Certified Network Associate
- Certified AppSec Practitioner (CAP)
Saatnya Ujian & Raih Sertifikat CEH-mu!
Inilah momen pembuktian. Raih sertifikasi CEH dan tunjukkan keahlianmu kepada dunia.
Kamu akan mendapatkan Exam Voucher CEH worth $950 (IDR ±15,6 Juta Rupiah)
Ujian sertifikasi akan dijadwalkan dan diselenggarakan melalui penyedia EC-Council.
Dengan adanya voucher ini, Anda tidak akan dikenakan biaya tambahan untuk mengikuti ujian sertifikasi CEH ini.
Bagikan Sertifikat CEH & Update Portfolio-mu!
Inilah momen pembuktian. Raih sertifikasi CEH dan tunjukkan keahlianmu kepada dunia.
Sertifikat CEH resmi dari EC-Council
Sertifikat dari Cyber Studio
Fasilitas & Benefit Yang Akan Kamu Dapatkan
Beberapa opsi lokasi belajar yang dapat Kamu pilih:
Testimoni Alumni Yang Sudah Mengikuti Training Sertifikasi CEH
Kata mereka tentang pembelajaran di Coding Studio
Biaya Training Sertifikasi CEH
Beberapa opsi biaya training sesuai lokasi belajar yang dapat Kamu pilih:
Training Online
Belajar di manapun via GmeetTraining Onsite @Jakarta
Belajar di WU Hub Coworking SpaceTraining Onsite @Gading Serpong
Belajar di Coding Studio Gading SerpongTraining Online - Sertifikasi CEH Resmi by EC-Council
Benefit yang Kamu dapatkan jika mengikuti Training
-
Full-day Intensive Training & Coaching Rp13,990,000
-
Exam Preparation Materials Rp10,000,000
-
Exam Voucher CEH (USD $950) ≈ ±Rp16,000,000
-
FREE Retake Exam Voucher* (USD $500) ≈ ±Rp8,500,000
-
FREE Access All Learning Path (3 months subscription) Rp1,500,000
-
Exclusive IT Community (on Discord) Rp1,000,000
-
Total Benefit Yang Kamu Dapatkan
±Rp37,490,000
Rp37,490,000
Rp15,490,000
sebelum diskon berakhir!
Training Onsite @Jakarta - Sertifikasi CEH Resmi by EC-Council
Benefit yang Kamu dapatkan jika mengikuti Training
-
Full-day Intensive Training & Coaching Rp14,990,000
-
Exam Preparation Materials Rp10,000,000
-
Exam Voucher CEH (USD $950) ≈ ±Rp16,000,000
-
FREE Retake Exam Voucher* (USD $500) ≈ ±Rp8,500,000
-
FREE Lunch, Snack, & Coffee Break Rp500,000
-
FREE Access All Learning Path (3 months subscription) Rp1,500,000
-
Exclusive IT Community (on Discord) Rp1,000,000
-
Total Benefit Yang Kamu Dapatkan
±Rp38,990,000
Rp38,990,000
Rp16,990,000
sebelum diskon berakhir!
Training Onsite @Gading Serpong - Sertifikasi CEH Resmi by EC-Council
Benefit yang Kamu dapatkan jika mengikuti Training
-
Full-day Intensive Training & Coaching Rp16,990,000
-
Exam Preparation Materials Rp10,000,000
-
Exam Voucher CEH (USD $950) ≈ ±Rp16,000,000
-
FREE Retake Exam Voucher* (USD $500) ≈ ±Rp8,500,000
-
FREE Lunch, Snack, & Coffee Break Rp500,000
-
FREE Access All Learning Path (3 months subscription) Rp1,500,000
-
Exclusive IT Community (on Discord) Rp1,000,000
-
Total Benefit Yang Kamu Dapatkan
±Rp40,990,000
Rp40,990,000
Rp18,990,000
sebelum diskon berakhir!
Frequently Ask Questions.
Pertanyaan yang sering ditanyakan mengenai program Sertifikasi Internasional di Coding Studio.
Apa itu program Verified Coding Studio?
Program Verified adalah program pelatihan dan persiapan intensif dari Coding Studio yang dirancang untuk peserta yang ingin lulus mendapatkan sertifikasi internasional resmi. Fokus utamanya adalah membantu peserta membangun portofolio profesional sekaligus mendapatkan pengakuan kompetensi secara global.
Apakah saya perlu latar belakang IT untuk mengikuti program ini?
Tidak perlu. Untuk program sertifikasi Microsoft Office Specialist (MOS), kamu bisa mulai meskipun belum memiliki latar belakang IT karena materi disusun secara praktis dan mudah dipahami.
Namun, untuk program sertifikasi Certified Ethical Hacker (CEH), disarankan kamu sudah memiliki dasar pengetahuan komputer atau pengalaman dasar di bidang IT, karena materi cukup teknis dan mendalam. Tapi tenang saja—kamu tetap akan dibimbing langkah demi langkah hingga siap menghadapi ujian sertifikasi.















