SERTIFIKASI INTERNASIONAL CYBER SECURITY NO. 1 DI INDONESIA

TRAINING CERTIFIED ETHICAL HACKER (CEH)

Raih Sertifikasi CEH Internasional untuk membuka peluang kerja secara global dan meningkatkan karirmu dengan sertifikasi yang telah diakui lembaga internasional terpercaya.
Durasi Training

±40 Jam

Level Sertifikasi

Beginner

Exam delivered by
Training ini adalah persiapan untuk ujian sertifikasi CEH. Ujian sertifikasi akan dijadwalkan dan diselenggarakan melalui penyedia pihak ketiga.
Hear from them.
You can be next too.

95%

Merasa terbantu dengan program sertifikasi CEH di Coding Studio

95%

Puas dengan proses persiapan ujian sertifikasi CEH di Coding Studio

100%

Berhasil lulus ujian & mendapatkan sertifikat CEH Resmi EC-Council

Partner pilihan untuk menunjukkan kemampuan cyber security-mu

Kolaborasi eksklusif dengan Gero Security, dipimpin oleh tiga praktisi bersertifikat internasional. Pengalaman bertahun-tahun dalam industri cybersecurity kini hadir dalam bentuk kurikulum yang dirancang khusus untuk profesional Indonesia.

Coding Studio merupakan Accredited Training Center resmi dari EC-Council

ATC-2026

Kami siap bantu Kamu untuk raih sertifikasi internasional Certified Ethical Hacker (CEH)

Tentang Sertifikasi Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) adalah sertifikasi internasional di bidang Cyber Security yang diakui secara global. Sertifikasi ini membuktikan kemampuan seseorang dalam menemukan, menganalisis, dan mengatasi celah keamanan dengan cara yang etis dan profesional.

Dengan mengikuti program kelas Training Certified Ethical Hacker (CEH) di Coding Studio, Kamu akan mendapatkan pembekalan komprehensif mengenai metodologi ethical hacking yang efektif dan dapat diterapkan pada berbagai infrastruktur digital modern. Program ini juga dirancang untuk mempersiapkan Anda memperoleh sertifikasi CEH internasional yang diakui secara global sebagai standar kompetensi di bidang Cyber Security.

Sertifikat CEH Yang Akan Kamu Dapatkan

Sertifikasi Certified Ethical Hacker (CEH) ini Cocok Untuk

Certified Ethical Hacker (CEH) adalah sertifikasi internasional di bidang Cyber Security yang diakui secara global. Sertifikasi ini membuktikan kemampuan seseorang dalam menemukan, menganalisis, dan mengatasi celah keamanan dengan cara yang etis dan profesional.
Mahasiswa/Fresh Graduates IT

Persaingan kerja di bidang IT semakin ketat. Dengan CEH, kamu bisa menonjol dibanding kandidat lain karena punya kredensial global sejak awal karier. Sertifikasi ini akan membuka pintu ke lebih banyak peluang kerja di bidang cyber security.

Profesional IT/Cyber

Bagi kamu yang sudah bekerja di bidang IT, training ini akan memperkuat kemampuanmu dalam menganalisis, mendeteksi, dan mengamankan jaringan dari berbagai ancaman. Sertifikasi CEH akan menjadi nilai tambah signifikan dalam kariermu.

Cyber Security Enthusiast & Penetration Tester

Kalau kamu tertarik dengan dunia hacking, training ini memberi kesempatan untuk belajar langsung metode yang digunakan hacker—dengan cara yang legal dan etis. Kamu juga akan menguasai tools profesional yang banyak dipakai di industri.

Perusahaan / Tim IT

Organisasi yang memiliki talenta bersertifikasi CEH dapat lebih siap menghadapi serangan siber yang makin kompleks. Melalui training ini, tim IT perusahaanmu akan lebih terampil dalam melindungi data, sistem, dan reputasi bisnis.

Dengan kata lain, kelas ini sangat relevan untuk KAMU yang...

Langkah-langkah Untuk Mendapatkan Sertifikasi CEH

Gak perlu bingung mulai dari mana — cukup ikuti langkah ini dan wujudkan mimpimu jadi CEH Certified.

Pelajari Materi Persiapan Ujian Sertifikasi CEH

Belajar Ethical Hacking jadi lebih mudah dan terarah lewat 20 modul AI-powered yang dirancang sesuai kurikulum resmi EC-Council.

Learn the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Key Topics Covered:

  • Elements of Information Security
  • Classification of Attacks
  • Hacker Classes
  • Ethical Hacking
  • AI-Driven Ethical Hacking
  • ChatGPT-Powered AI Tools for Ethical Hacker
  • CEH Ethical Hacking Framework
  • Cyber Kill Chain Methodology
  • MITRE ATT&CK Framework
  • Information Assurance (IA)
  • Risk Management
  • Threat Intelligence Lifecycle
  • Incident Management
  • PCI DSS, HIPPA, SOX, GDPR, DPA

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.

Key Topics Covered:

  • Reconnaissance
  • Footprinting Using Advanced Google Hacking Techniques
  • Footprinting through People Search Services
  • Dark Web Footprinting
  • Competitive Intelligence Gathering
  • Footprinting through Social Networking Sites
  • Whois Lookup

Learn different network scanning techniques and countermeasures.

Key Topics Covered:

  • Network Scanning
  • Scanning Tools
  • Host Discovery Techniques
  • Port Scanning Techniques
  • Host Discovery and Port Scanning with AI
  • Service Version Discovery
  • OS Discovery/Banner Grabbing
  • Scanning Beyond IDS and Firewall

Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Key Topics Covered:

  • Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • NFS Enumeration
  • SMTP Enumeration
  • DNS Cache Snooping
  • DNSSEC Zone Walking
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
  • SMB Enumeration
  • Enumeration using AI
  • Enumeration Countermeasures

Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are included as well.

Key Topics Covered:

  • Vulnerability Classification
  • Vulnerability Scoring Systems and Databases
  • Vulnerability-Management Life Cycle
  • Vulnerability Research
  • Vulnerability Scanning and Analysis
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • AI-Powered Vulnerability Assessment Tools

Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Key Topics Covered:

  • Password Cracking
  • Password Attacks
  • Password-Cracking Tools
  • Vulnerability Exploitation
  • Metasploit Framework
  • AI-Powered Vulnerability Exploitation Tools
  • Buffer Overflow
  • Buffer Overflow Detection Tools
  • Active Directory (AD) enumeration
  • Privilege Escalation
  • Privilege Escalation Tools
  • Executing Applications
  • Keylogger, Spyware, and many more!

Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Key Topics Covered:

  • Computer Worms
  • Fileless Malware
  • AI-based Malware
  • Malware Analysis
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Virus Detection Methods
  • Malware Countermeasures
  • Anti-Trojan Software
  • AI-Powered Malware Detection and Analysis Tools

Learn about packet-sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Key Topics Covered:

  • Network Sniffing
  • MAC Flooding
  • DHCP Starvation Attack
  • ARP Spoofing
  • ARP Spoofing/Poisoning Tools
  • MAC Spoofing
  • VLAN Hopping
  • STP Attack
  • DNS Poisoning Techniques
  • DNS Poisoning Tools
  • Sniffing Tools
  • Sniffer Detection Techniques
  • Promiscuous Detection Tools

Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Key Topics Covered:

  • Social Engineering
  • Types of Social Engineering
  • Human-based Social Engineering Techniques
  • Impersonation
  • Computer-based Social Engineering Techniques
  • Phising
  • Phising Tools
  • Perform Impersonation using AI
  • Identity Theft
  • Mobile-based Social Engineering Techniques
  • Social Engineering Countermeasures
  • Anti-Phishing Toolbar

Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Key Topics Covered:

  • DoS Attack
  • DDoS Attack
  • Botnets
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Toolkits
  • DoS/DDoS Attack Detection Techniques
  • DoS/DDoS Protection Tools
  • DoS/DDoS Protection Services

Learn the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Key Topics Covered:

  • Session Hijacking
  • Application-Level Session Hijacking
  • Compromising Session IDs
  • Session Hijacking
  • Network-Level Session Hijacking
  • TCP/IP Hijacking
  • RST Hijacking
  • Blind Hijacking
  • Session Hijacking Tools
  • Session Hijacking Detection Methods
  • Session Hijacking Detection Tools
  • Approaches to Prevent Session Hijacking

Learn about firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Key Topics Covered:

  • Intrusion Detection System (IDS)
  • Intrusion Prevention System (IPS)
  • Firewall
  • Types of Firewalls
  • Intrusion Detection Tools
  • Intrusion Prevention Tools
  • IDS/Firewall Evasion Techniques
  • NAC and Endpoint Security Evasion Techniques
  • IDS/Firewall Evading Tools
  • Honeypot
  • Types of Honeypots
  • Honeypot Tools
  • IDS/Firewall Evasion Countermeasures

Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Key Topics Covered:

  • Web Server Architecture
  • Web Server Vulnerabilities
  • Web Server Attacks
  • DNS Server Hijacking
  • Web Cache Poisoning Attack
  • Web Server Footprinting/Banner Grabbing
  • Directory Brute Forcing
  • Vulnerability Scanning
  • Web Server Password Hacking
  • Web Server Attack Tools
  • Web Server Attack Countermeasures
  • Detecting Web Server Hacking Attempts
  • Web Server Security Tools

Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.

Key Topics Covered:

  • Web Application
  • OWASP Top 10 Application Security Risks – 2021
  • Web Application Attacks
  • Footprint Web Infrastructure
  • Analyze Web Applications
  • Bypass Client-side Controls
  • Attack Access Controls
  • Attack Web Services
  • Web API, Webhooks, Web API Hacking Methodology
  • API Security Risks and Solutions
  • Web Application Security Testing, and many more!

Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.

Key Topics Covered:

  • SQL Injection
  • Types of SQL injection
  • Error Based SQL Injection
  • Union SQL Injection
  • SQL Injection Methodology
  • Information Gathering and SQL Injection Vulnerability Detection
  • Launch SQL Injection Attacks
  • Advanced SQL Injection
  • SQL Injection Tools
  • SQL Injection with AI
  • Evasion Techniques
  • SQL Injection Countermeasures
  • SQL Injection Detection Tools

Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Key Topics Covered:

  • Wireless Networks
  • Wireless Standards
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wi-Fi Discovery
  • Wireless Traffic Analysis
  • Launch of Wireless Attacks
  • Wi-Fi Encryption Cracking
  • Wireless Attack Countermeasures
  • Wi-Fi Security Auditing Tools

Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Key Topics Covered:

  • Anatomy of a Mobile Attack
  • App Sandboxing Issues
  • SMS Phishing Attack (SMiShing)
  • Call Spoofing
  • OTP Hijacking/Two-Factor Authentication Hijacking
  • Camera/Microphone Capture Attacks
  • Android Rooting
  • Hacking Android Devices
  • Android Hacking Tools
  • Android Security Tools
  • Jailbreaking iOS
  • Hacking iOS Devices
  • iOS Device Security Tools
  • Mobile Device Management (MDM)
  • OWASP Top 10 Mobile Risks and Solutions
  • Mobile Security Guidelines
  • Mobile Security Tools

Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Key Topics Covered:

  • IoT Architecture
  • IoT Technologies and Protocols
  • OWASP Top 10 IoT Threats
  • IoT Vulnerabilities
  • IoT Threats
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • IoT Security Tools
  • IT/OT Convergence (IIOT)
  • OT Technologies and Protocols
  • OT Vulnerabilities
  • OT Threats
  • OT Attacks
  • OT Hacking Methodology
  • OT Hacking Tools
  • OT Security Tools

Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Key Topics Covered:

  • Cloud Computing
  • Fog Computing
  • Edge Computing
  • Container, Docker, Kubernetes
  • Serverless Computing
  • OWASP Top 10 Cloud Security Risks
  • Cloud Computing Threats
  • Container Vulnerabilities
  • Kubernetes Vulnerabilities
  • Cloud Attacks
  • Cloud Hacking

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

Key Topics Covered:

  • Cryptography
  • Ciphers
  • Symmetric Encryption Algorithms
  • Asymmetric Encryption Algorithms
  • Message Digest Functions
  • Quantum Cryptography
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Signed Certificate
  • Digital Signature
  • Email Encryption
  • Disk Encryption
  • Blockchain, and many more!

Belajar Langsung Secara Intensif Dengan Mentor Profesional

Belajar intensif ±6 jam per hari selama 1 bulan bareng mentor profesional — cara tercepat buat siap ujian CEH.

Maestro Purnama Fajrie

Certified Instructure CEH at Coding Studio (Freelance)

Career

Saatnya Ujian & Raih Sertifikat CEH-mu!

Inilah momen pembuktian. Raih sertifikasi CEH dan tunjukkan keahlianmu kepada dunia.

Kamu akan mendapatkan Exam Voucher CEH worth $950 (IDR ±15,6 Juta Rupiah)
Ujian sertifikasi akan dijadwalkan dan diselenggarakan melalui penyedia EC-Council.
Dengan adanya voucher ini, Anda tidak akan dikenakan biaya tambahan untuk mengikuti ujian sertifikasi CEH ini.

Bagikan Sertifikat CEH & Update Portfolio-mu!

Inilah momen pembuktian. Raih sertifikasi CEH dan tunjukkan keahlianmu kepada dunia.

Sertifikat CEH resmi dari EC-Council
Sertifikat dari Cyber Studio

Fasilitas & Benefit Yang Akan Kamu Dapatkan

Beberapa opsi lokasi belajar yang dapat Kamu pilih:
Location

WU Hub Coworking Space

Jl. H. R. Rasuna Said No.6 Kav C5, RT.3/RW.1, Karet, Kecamatan Setiabudi, Kota Jakarta Selatan, Daerah Khusus Ibukota Jakarta 12920

Testimoni Alumni Yang Sudah Mengikuti Training Sertifikasi CEH

Kata mereka tentang pembelajaran di Coding Studio

Biaya Training Sertifikasi CEH

Beberapa opsi biaya training sesuai lokasi belajar yang dapat Kamu pilih:

Training Online - Sertifikasi CEH Resmi by EC-Council

Ikuti training sertifikasi CEH secara online di manapun
Benefit yang Kamu dapatkan jika mengikuti Training
  • Full-day Intensive Training & Coaching Rp13,990,000
  • Exam Preparation Materials Rp10,000,000
  • Exam Voucher CEH (USD $950) ≈ ±Rp16,000,000
  • FREE Retake Exam Voucher* (USD $500) ≈ ±Rp8,500,000
  • FREE Access All Learning Path (3 months subscription) Rp1,500,000
  • Exclusive IT Community (on Discord) Rp1,000,000
  • Total Benefit Yang Kamu Dapatkan

    ±Rp37,490,000

Rp37,490,000

Rp15,490,000

Include learning module + 220 Hands-on Lab + 4000 Hacking Tools + exam voucher
:
:
sebelum diskon berakhir!

Frequently Ask Questions.

Pertanyaan yang sering ditanyakan mengenai program Sertifikasi Internasional di Coding Studio.

Apa itu program Verified Coding Studio?

Program Verified adalah program pelatihan dan persiapan intensif dari Coding Studio yang dirancang untuk peserta yang ingin lulus mendapatkan sertifikasi internasional resmi. Fokus utamanya adalah membantu peserta membangun portofolio profesional sekaligus mendapatkan pengakuan kompetensi secara global.

Tidak perlu. Untuk program sertifikasi Microsoft Office Specialist (MOS), kamu bisa mulai meskipun belum memiliki latar belakang IT karena materi disusun secara praktis dan mudah dipahami.

Namun, untuk program sertifikasi Certified Ethical Hacker (CEH), disarankan kamu sudah memiliki dasar pengetahuan komputer atau pengalaman dasar di bidang IT, karena materi cukup teknis dan mendalam. Tapi tenang saja—kamu tetap akan dibimbing langkah demi langkah hingga siap menghadapi ujian sertifikasi.

Belajar IT bareng Cyber Studio

Persiapkan dirimu dari sekarang. Dimulai dari belajar skill yang dibutuhkan oleh startup dan industri saat ini. Yuk, tingkatkan skillmu sekarang juga.