Certified Ethical Hacker (CEH) Training

Level: Intermediate
Rating: 4.7/5 4.67/5 Based on 360 Reviews

In this award-winning Certified Ethical Hacker (CEH) training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

Key Features of this Certified Ethical Hacker Training:

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition fee
  • After-course instructor coaching benefit
  • After-course computing sandbox included

You Will Learn How To:

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyse your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Certifications/Credits:

EC-Council Logo CompTIA

Choose the Training Solution That Best Fits Your Individual Needs or Organisational Goals

ON DEMAND

On Demand + Instructor Coaching

  • On-demand CEH training modules (1-year access)
  • 2 hours of one-on-one after-course instructor coaching
  • Pre-configured EC-Council iLabs (6-month access)
  • Exam voucher included
View Course Details

Standard £1595

Government £1595

ADD TO CART

PRODUCT #2031

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition fee can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard £2895

RESERVE SEAT

PRODUCT #2031

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More on Training with Learning Tree Training Vouchers!

Our flexible, easy-to-redeem training vouchers are available to any employee within your organisation. For details, please call 0800 282 353 or chat live.

On Demand + Instructor Coaching

Certified Ethical Hacker On-Demand Course Information

Certified Ethical Hacker On-Demand Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

In Class & Live, Online Training

  • 29 Apr - 3 May ( 5 Days)
    9:00 AM - 4:30 PM BST
    London / Online (AnyWare) London / Online (AnyWare) Reserve Your Seat

  • 19 - 23 Aug ( 5 Days)
    9:00 AM - 4:30 PM BST
    London / Online (AnyWare) London / Online (AnyWare) Reserve Your Seat

  • 9 - 13 Dec ( 5 Days)
    9:00 AM - 4:30 PM GMT
    London / Online (AnyWare) London / Online (AnyWare) Reserve Your Seat

  • AFTERNOON START: Attend these live courses online via Anyware

    3 - 7 Jun ( 5 Days)
    2:00 PM - 9:30 PM BST
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • 24 - 28 Jun ( 5 Days)
    2:00 PM - 9:30 PM BST
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • 12 - 16 Aug ( 5 Days)
    2:00 PM - 9:30 PM BST
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • 28 Oct - 1 Nov ( 5 Days)
    1:00 PM - 8:30 PM GMT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • 2 - 6 Dec ( 5 Days)
    2:00 PM - 9:30 PM GMT
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • 3 - 7 Feb ( 5 Days)
    2:00 PM - 9:30 PM GMT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Certified Ethical Hacker Course Information

  • Recommended Experience

    • Two years of security-related experience and a strong practical working knowledge of TCP/IP
  • Lab Bundle Available

  • Exam Information

    • This course includes a voucher to take the CEH exam via ProctorU
    • You can request your voucher from Learning Tree at any time after you complete the course
  • Certification Information

Certified Ethical Hacker Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

Team Training

Certified Ethical Hacker Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

Questions about which training is right for you?

call 0800 282 353
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition fee!
  • No advance payment required for most products.
  • Tuition fee can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

London / Online (AnyWare)
London / Online (AnyWare)
London / Online (AnyWare)
New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français