5 Days


Toronto, Ontario


(group pricing and early bird discount available)



Cybersecurity is one of the hottest topics in today’s business world. The industry predicts global annual cybercrime costs will grow to $6 trillion by 2021. Managing cyber risk has become one of the top priorities among corporate leaders and executives. The investment in cybersecurity is a necessity to all organizations.

The #1 challenge in cybersecurity is the talent gap. The global shortage of cybersecurity professionals will be 2 million by 2019. Organizations across all domains (e.g. Fortune 500, Banks, Insurance, Telecom, Consulting Firms, Government, Technology) are hungry for finding right cybersecurity talent.

“To defend a hacker, you need to think like a hacker.” This is why Penetration Testing (or Ethical Hacking) becomes a high-demand field in cybersecurity. EC-Council’s Certified Ethical Hacker (CEH) certification is ranked as one of the Top-Paying IT certifications in 2018 with an average salary of $106,375 in US.


Cybersecurity Project is recognized by EC-Council as an Accredited Training Center (ATC) meeting strict standards of excellence for delivering instructor-led training. We are EC-Council’s premier channel for delivering high-quality security related training to businesses and industry professionals.

Moreover, we are not another training shop you often see in the market (which just walks you through a standard curriculum and collects your money). Our passion is to advance the cybersecurity ecosystem via training, career, and collaboration. We not only teach you all necessary skills for certification exams, but also provide you industry insights, career advice, and networking events. We will assist you to engage the cybersecurity community and discover potential professional/business opportunities.

In short, we care about your success!


Bryan Li

Bryan Li

Bryan has 20+ years experience in the areas of enterprise solutions, information security, product development, program management, and IT consulting. His leadership and management experience include Head of Business Systems, Director of Product Development & Innovation, and Director of Program Management with multiple industry-leading companies.

Bryan is dedicated to addressing the growing concerns about cybersecurity via skills training, career development, industry collaboration, and innovated technologies. He is EC-Council’s preferred instructor for the courses such as Certified Ethical Hacker (CEH) and Certified Network Defender (CND).

Bryan has taught hundreds of students in various cybersecurity courses, and delivered many cybersecurity seminars and speeches at the organizations such as University of Toronto Rotman School of Management, City of Markham, CIFI Security Summit, CPA Ontario, Ontario Centres of Excellence (OCE), York University, Lambton College, ACCES Employment, Canadian Institute Regulatory and Compliance Conference, Canadian Institute Privacy and Data Security Conference etc.

Bryan is also the founder and catalyst of “Cyber Tech & Risk”, which is a hub for people who care about cyber tech and risk to get fresh ideas, advance career development, and expand business networks.

Bryan holds CISSP, CCSP, CEI, CEH, CND, PMP, CBAP, and a number of other professional certifications.


The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

You will get:

  • CEH instructor-led training

  • CEH v10 e-Courseware

  • CEH v10 iLabs 6 Month Subscription

  • CEH ECC Exam Voucher

You will also get:

  • Cybersecurity Career Workshop

  • Access to Cyber Tech & Risk Events

  • Membership of Cyber Career Centre


Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking

Module 19: Cloud Computing

Module 20: Cryptography