Certified Ethical Hacker (CEH) Training

Level: Intermediate
Rating: 4.7/5 4.66/5 Based on 335 Reviews

In this award-winning Certified Ethical Hacker (CEH) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your course tuition fee is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

Key Features of this Certified Ethical Hacker Training:

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition fee
  • After-course computing sandbox included

You Will Learn How To:

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyse your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Certifications/Credits:

EC-Council Logo CompTIA

Choose the Training Solution That Best Fits Your Individual Needs or Organisational Goals

BLENDED LEARNING

On Demand & Live Review Session

  • On-demand CEH training modules (1-year access)
  • Pre-configured EC-Council iLabs (6-month access)
  • Exam voucher included
View Course Details

Standard £1495

Government £1495

ADD TO CART

PRODUCT #2031

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition fee can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard £2895

RESERVE SEAT

PRODUCT #2031

PREMIUM TRAINING

Unlimited Access to Everything

Unlimited annual access to:

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox included
  • Self-paced lecture videos
  • Pre-configured EC-Council iLabs
  • Exam Voucher included
  • CyberQ Exam Prep
  • Test Pass Guarantee
View Bundle Details & Schedule

Standard £3195/Year

ADD TO CART

PRODUCT #70H5

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More on Training with Learning Tree Training Vouchers!

Our flexible, easy-to-redeem training vouchers are available to any employee within your organisation. For details, please call 0800 282 353 or chat live.

On Demand & Live Review Session

Certified Ethical Hacker On-Demand Course Information

Certified Ethical Hacker On-Demand Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

In Class & Live, Online Training

  • 29 Apr - 3 May ( 5 Days)
    9:00 AM - 4:30 PM BST
    London / Online (AnyWare) London / Online (AnyWare) Reserve Your Seat

  • 19 - 23 Aug ( 5 Days)
    9:00 AM - 4:30 PM BST
    London / Online (AnyWare) London / Online (AnyWare) Reserve Your Seat

  • 9 - 13 Dec ( 5 Days)
    9:00 AM - 4:30 PM GMT
    London / Online (AnyWare) London / Online (AnyWare) Reserve Your Seat

  • AFTERNOON START: Attend these live courses online via Anyware

    3 - 7 Jun ( 5 Days)
    2:00 PM - 9:30 PM BST
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • 24 - 28 Jun ( 5 Days)
    2:00 PM - 9:30 PM BST
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • 12 - 16 Aug ( 5 Days)
    2:00 PM - 9:30 PM BST
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • 28 Oct - 1 Nov ( 5 Days)
    1:00 PM - 8:30 PM GMT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • 2 - 6 Dec ( 5 Days)
    2:00 PM - 9:30 PM GMT
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • 3 - 7 Feb ( 5 Days)
    2:00 PM - 9:30 PM GMT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Certified Ethical Hacker Course Information

  • Recommended Experience

    • Two years of security-related experience and a strong practical working knowledge of TCP/IP
  • Lab Bundle Available

  • Exam Information

    • This course includes a voucher to take the CEH exam via ProctorU
    • You can request your voucher from Learning Tree at any time after you complete the course
  • Certification Information

Certified Ethical Hacker Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

Unlimited Access to Everything

  • 29 Apr - 3 May ( 5 Days)
    9:00 AM - 4:30 PM BST
    London / Online (AnyWare) London / Online (AnyWare)

  • 19 - 23 Aug ( 5 Days)
    9:00 AM - 4:30 PM BST
    London / Online (AnyWare) London / Online (AnyWare)

  • 9 - 13 Dec ( 5 Days)
    9:00 AM - 4:30 PM GMT
    London / Online (AnyWare) London / Online (AnyWare)

  • AFTERNOON START: Attend these live courses online via Anyware

    3 - 7 Jun ( 5 Days)
    2:00 PM - 7:30 AM BST
    New York / Online (AnyWare) New York / Online (AnyWare)

  • 24 - 28 Jun ( 5 Days)
    2:00 PM - 7:30 AM BST
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare)

  • 12 - 16 Aug ( 5 Days)
    2:00 PM - 7:30 AM BST
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare)

  • 28 Oct - 1 Nov ( 5 Days)
    1:00 PM - 4:30 AM GMT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare)

  • 2 - 6 Dec ( 5 Days)
    2:00 PM - 7:30 AM GMT
    New York / Online (AnyWare) New York / Online (AnyWare)

  • 3 - 7 Feb ( 5 Days)
    2:00 PM - 7:30 AM GMT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare)

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Certified Ethical Hacker Unlimited Access Training Information

This product offers the most complete CEH training availble on the market today. With unlimited annual access to all ILT course events (2031), EC Council official videos, exam prep, and labs, and your trusted Learning Tree coach, you have everything you need to have a sucessful learning experience and pass the CEH certification exam.

On-Demand Training Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analysing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analysing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognising key indicators of a virus attack
    • Analysing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognising symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • What background do I need?

    Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.
  • Is the on-demand content the same as the 5-day instructor class?

    Yes, and it's EC-Council official content!
  • What on-demand content will I receive?

    An outline of the content you will receive can be seen above. There is a self-paced video module for each of chapter.
  • How many labs will I receive?

    You get access to the EC-Council official pre-configured lab environment that accompanies the courseware. iLabs are valid for 6 months from the time of activation with the option to extend them, if needed.
  • What is CyberQ Exam Prep?

    CyberQ is an exam prep offering from EC-Council with “Progressive” and “Simulation” modes designed to provide the best possible chance of success on the certification exam.
  • What is the "test pass guarantee"?

    You will receive one retake exam voucher at no additional cost in the event that you don't pass the exam on the first try.
  • How will I access my course materials if I choose this method?

    Once payment is received, you will receive an email from Learning Tree with all the links and information you need to get started.

Team Training

Questions about which training is right for you?

call 0800 282 353
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition fee!
  • No advance payment required for most products.
  • Tuition fee can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

London / Online (AnyWare)
London / Online (AnyWare)
London / Online (AnyWare)
New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français