1. Course Overview
A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems. A Ethical Hacker uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.
CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
2. Course Duration
10 Days ( 40 Hours )
3. Target Audience
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
4. During this course you should learn:
5. Course Content
Module 1: Introduction to Ethical Hacking
Lesson 1: Information Security Overview
Lesson 2: Cyber Kill Chain Concepts
Lesson 3: Hacking Concepts
Lesson 4: Ethical Hacking Concepts
Lesson 5: Information Security Controls
Lesson 6: Information Security Laws and Standards
Module 2: Footprinting and Reconnaissance
Lesson 1: Footprinting Concepts
Lesson 2: Footprinting through Search Engines
Lesson 3: Footprinting through Web Services
Lesson 4: Footprinting through Social Networking Sites
Lesson 5: Website Footprinting
Lesson 6: Email Footprinting
Lesson 7: Whois Footprinting
Lesson 8: DNS Footprinting
Lesson 9: Network Footprinting
Lesson 10: Footprinting through Social Engineering
Lesson 11: Footprinting Tools
Lesson 12: Footprinting Countermeasures
Module 3: Scanning Networks
Lesson 1: Network Scanning Concepts
Lesson 2: Scanning Tools
Lesson 3: Host Discovery
Lesson 4: Port and Service Discovery
Lesson 5: OS Discovery (Banner Grabbing/OS Fingerprinting)
Lesson 6: Scanning Beyond IDS and Firewall
Lesson 7: Banner Grabbing
Lesson 8: Draw Network Diagrams
Module 4: Enumeration
Lesson 1: Enumeration Concepts
Lesson 2: NetBIOS Enumeration
Lesson 3: SNMP Enumeration
Lesson 4: LDAP Enumeration
Lesson 5: NTP and NFS Enumeration
Lesson 6: SMTP and DNS Enumeration
Lesson 7: Other Enumeration Techniques
Lesson 8: Enumeration Countermeasures
Module 5: Vulnerability Analysis
Lesson 1: Vulnerability Assessment Concepts
Lesson 2: Vulnerability Classification and Assessment Types
Lesson 3: Vulnerability Assessment Solutions and Tools
Lesson 4: Vulnerability Assessment Reports
Module 6: System Hacking
Lesson 1: System Hacking Concepts
Lesson 2: Gaining Access
Lesson 3: Escalating Privileges
Lesson 4: Maintaining Access
Lesson 5: Clearing Logs
Module 7: Malware Threats
Lesson 1: Malware Concepts
Lesson 2: APT Concepts
Lesson 3: Trojan Concepts
Lesson 4: Virus and Worm Concepts
Lesson 5: Fileless Malware Concepts
Lesson 6: Malware Analysis
Lesson 7: Countermeasures
Lesson 8: Anti-Malware Software
Module 8: Sniffing
Lesson 1: Sniffing Concepts
Lesson 2: Sniffing Technique: MAC Attacks
Lesson 3: Sniffing Technique: DHCP Attacks
Lesson 4: Sniffing Technique: ARP Poisoning
INFORMATECH is the region’s leading provider of in-house custom-designed courses. We have been tailoring in-house solutions for our clients aimed at helping them achieve short term training wins or long term strategic requirements. In addition to being significantly cost effective, these courses are constantly in demand because they:
16 - 20 February 2026
3200 £
Register
15 - 19 March 2026
4250 €
19 - 23 April 2026
3450 €
3 - 7 May 2026
14 - 18 June 2026
19 - 23 July 2026
4500 €
2 - 6 August 2026
6 - 10 September 2026
11 - 15 October 2026
8 - 12 November 2026
13 - 17 December 2026
If you did not find the appropriate date or venue suitable for you, or you would like to join the course online, you can request a custom course from the link below.
We offer group and corporate discounts on many courses. These discounts are available for clients who want to maximize their return on investment.
We offer individual discounts on many courses for people who are self-sponsored and make their payment in full and upfront at the time of registration.
Nominations to our public courses are to be processed by the client’s HR/Training department except for self-nominations which are to be paid in advance using the “payment by self” option on the online registration form. A refund will be issued back to the client in the event of course cancellation or seat unavailability. Registration confirmation is subject to INFORMATECH's review of registration request and seat availability.
Clients are responsible for any type of tax levied in their country.
If you are interested in having a course custom-designed for your organization, please submit a request using the link below. Once we receive your duly completed request, one of our business development professionals or consultants will get in touch with you to understand your requirements with more detail and answer any relevant questions you may have. After all pertinent information has been exchanged, we will work on the custom-designed request and send you the proposal you require and work with you to identify the ideal period and place for delivering the custom-designed solution.