Certified Ethical Hacker (CEH v10) Training

Level: Intermediate
Rating: 4.6/5 4.64/5 Based on 264 Reviews

In this award-winning Certified Ethical Hacker (CEH v10) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your CEH certification course tuition fee fee is an EC-Council CEH exam voucher that enables you to take the exam remotely.

Certification Voucher Extensions
EC-Council is extending expiration dates on ALL ECC Exam Vouchers by 90 days at no cost, to ensure everyone has the appropriate time to prepare for their certification exams.

iLabs Access Extensions
EC-Council will offer existing iLabs users a 90-day extension by request to provide additional training time within EC-Council cyber ranges as they experience the disruptions and delays associated with COVID-19. Any iLabs user that has purchased and redeemed an iLabs access code on or after January 1st, 2020 can write to ace-support@eccouncil.org.

 

Key Features of this Certified Ethical Hacker Training:

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition fee
  • After-course instructor coaching benefit
  • After-course computing sandbox included

You Will Learn How To:

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyse your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Certifications/Credits:

EC-Council Logo CompTIA

Choose the Training Solution That Best Fits Your Individual Needs or Organisational Goals

BLENDED LEARNING

On Demand & Live Review Session

  • On-demand CEH training modules (1-year access)
  • 2 hours of one-on-one after-course instructor coaching
  • Pre-configured EC-Council iLabs (6-month access)
  • Exam voucher included
View Course Details

Standard £1495

ADD TO CART

PRODUCT #2031

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition fee can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard £2895

RESERVE SEAT

PRODUCT #2031

PREMIUM TRAINING

Unlimited Access to Everything

Unlimited annual access to:

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox included
  • Self-paced lecture videos
  • Pre-configured EC-Council iLabs
  • Exam Voucher included
  • CyberQ Exam Prep
  • Test Pass Guarantee
View Bundle Details & Schedule

Standard £3195/Year

ADD TO CART

PRODUCT #70H5

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More on Training with Learning Tree Training Vouchers!

Our flexible, easy-to-redeem training vouchers are available to any employee within your organisation. For details, please call 0800 282 353 or chat live.

On Demand & Live Review Session

Certified Ethical Hacker On-Demand Course Information

  • Recommended Experience

    • Two years of security-related experience and a strong practical working knowledge of TCP/IP
  • Lab Bundle Available

    • Reinforce your skills while practising the CEH exam objectives with CYBRScore Lab Bundles: {course:E002}
  • Exam Information

    • This course includes a voucher to take the CEH exam via ProctorU
    • Exam voucher is supplied by EC-Council
  • Certification Information

Certified Ethical Hacker On-Demand Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

In Class & Live, Online Training

Note: This course runs for 5 Days *

*Events with the Partial Day Event clock icon run longer than normal but provide the convenience of half-day sessions.

  • 7 - 11 Dec 9:00 AM - 4:30 PM GMT Online (AnyWare) Online (AnyWare) Reserve Your Seat

  • 1 - 5 Feb 9:00 AM - 4:30 PM GMT London / Online (AnyWare) London / Online (AnyWare) Reserve Your Seat

  • 10 - 14 May 9:00 AM - 4:30 PM BST Online (AnyWare) Online (AnyWare) Reserve Your Seat

  • 2 - 6 Aug 9:00 AM - 4:30 PM BST Online (AnyWare) Online (AnyWare) Reserve Your Seat

  • 30 Nov - 4 Dec 2:00 PM - 9:30 PM GMT Online (AnyWare) Online (AnyWare) Reserve Your Seat

  • 19 - 23 Apr 2:00 PM - 9:30 PM BST Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.

Partial Day Event

Learning Tree offers a flexible schedule program. If you cannot attend full day sessions, this option consists of four-hour sessions per day instead of the full-day session.

Important Certified Ethical Hacker Course Information

  • Recommended Experience

    • Two years of security-related experience and a strong practical working knowledge of TCP/IP
  • Lab Bundle Available

    • Reinforce your skills while practising the CEH exam objectives with CYBRScore Lab Bundles: {course:E002}
  • Exam Information

    • This course includes a voucher to take the CEH exam via ProctorU
    • You can request your voucher from Learning Tree at any time after you complete the course
  • Certification Information

Certified Ethical Hacker Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

Unlimited Access to Everything

Note: This course runs for 5 Days *

*Events with the Partial Day Event clock icon run longer than normal but provide the convenience of half-day sessions.

  • 7 - 11 Dec 9:00 AM - 4:30 PM GMT Online (AnyWare) Online (AnyWare)

  • 1 - 5 Feb 9:00 AM - 4:30 PM GMT London / Online (AnyWare) London / Online (AnyWare)

  • 10 - 14 May 9:00 AM - 4:30 PM BST Online (AnyWare) Online (AnyWare)

  • 2 - 6 Aug 9:00 AM - 4:30 PM BST Online (AnyWare) Online (AnyWare)

  • 30 Nov - 4 Dec 2:00 PM - 9:30 PM GMT Online (AnyWare) Online (AnyWare)

  • 19 - 23 Apr 2:00 PM - 9:30 PM BST Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare)

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.

Partial Day Event

Learning Tree offers a flexible schedule program. If you cannot attend full day sessions, this option consists of four-hour sessions per day instead of the full-day session.

Certified Ethical Hacker Unlimited Access Training Information

  • Course description

    This product offers the most complete CEH training availble on the market today. With unlimited annual access to all ILT course events (2031), EC Council official videos, exam prep, and labs, and your trusted Learning Tree coach, you have everything you need to have a sucessful learning experience and pass the CEH certification exam.

  • How to Schedule Your Instructor-Led Training

    Once payment is received, you will receive details for your Unlimited Access Training Bundle via email. At that time, you may call or email our customer service team for assistance in enrolling in the event date of your choice.

On-Demand Training Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • What background do I need?

    Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.
  • Is the on-demand content the same as the 5-day instructor class?

    Yes, and it's EC-Council official content!
  • What on-demand content will I receive?

    An outline of the content you will receive can be seen above. There is a self-paced video module for each of chapter.
  • How many labs will I receive?

    You get access to the EC-Council official pre-configured lab environment that accompanies the courseware. iLabs are valid for 6 months from the time of activation with the option to extend them, if needed.
  • What is CyberQ Exam Prep?

    CyberQ is an exam prep offering from EC-Council with “Progressive” and “Simulation” modes designed to provide the best possible chance of success on the certification exam.
  • What is the "test pass guarantee"?

    You will receive one retake exam voucher at no additional cost in the event that you don't pass the exam on the first try.
  • How will I access my course materials if I choose this method?

    Once payment is received, you will receive an email from Learning Tree with all the links and information you need to get started.
  • How do I schedule my instructor-led training?

    Once payment is received, you will receive details for your Unlimited Access Training Bundle via email. At that time, you may call or email our customer service team for assistance in enrolling in the event date of your choice.

Team Training

Questions about which training is right for you?

call 0800 282 353
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Online (AnyWare)
London / Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Herndon, VA / Online (AnyWare)
Preferred method of contact:

Please Choose a Language

Canada - English

Canada - Français