Hurry! Our Ho, Ho, Ho-liday savings end in:
4.8 out of 5 based on 14,489 reviews
Virtual Classroom
Start learning from
1,550 Students enrolled
Select your date
Price Match
Guarantee
3 months instalments of: £1,331.67
6 months instalments of: £665.83
9 months instalments of: £443.89
12 months instalments of: £332.92
If you plan to be a competitive and industry-ready Certified Ethical Hacker, this course is the right one for you!
We specially designed our Certified Ethical Hacker (CEH) training for beginners and IT professionals looking to advance their careers by becoming certified in ethical hacking and cybersecurity.
Certified Ethical Hacker (CEH) training is a comprehensive program that equips you with the knowledge and skills to defend computer systems against network breaches. This training involves legal and ethical understanding and using the same techniques as malicious hackers.
Our CEH certification in e-Careers validates your abilities to foresee, react to, and guard against cybersecurity threats. You will master the latest tools and methods in ethical hacking to secure systems effectively.
Our Certified Ethical Hacker (CEH) certification is globally recognised, reflecting the stringent standards set by EC-Council, the renowned organisation responsible for issuing the certification. EC-Council is a trusted cybersecurity training and certification leader respected by professionals and organisations worldwide.
Completing this training opens doors to various rewarding roles in cybersecurity. As a CEH, you could pursue careers as a penetration tester, cybersecurity analyst, network security engineer, or information security consultant. Employers highly value this certification for roles requiring deep knowledge of ethical hacking practices.
Why Choose Us?
You can access dedicated tutor support for any questions or challenges throughout the course, ensuring a smooth learning journey. The training also includes the CEH v12 exam, allowing you to demonstrate your expertise and earn your certification as soon as you're ready. By providing structured learning and personalised assistance, we ensure you're fully supported in becoming an accomplished ethical hacker.
In summary, we offer the following to help you become a certified ethical hacker:
Delivery method: Virtual Classroom
Official exam: CEH v12 exam included
Duration: 5-day instructor-led training course
Available tutor support
Certified & Experienced trainers with a proper understanding of the ethical hacking process
Find out more about the "Additional Benefits" of our Certified Ethical Hacker (CEH) Training course below or learn more about our other cyber security courses here.
The Certified Ethical Hacker (CEH) course covers various aspects of ethical hacking and cybersecurity, preparing you to identify, counter, and prevent security threats effectively. Here is a detailed breakdown of the syllabus:
Module 1: Introduction to Ethical Hacking
The first module introduces you to the critical components of information security, including the basics of ethical hacking and penetration testing. You'll explore hacking concepts, information security controls, and the laws that govern this domain, setting the foundation for becoming a skilled, certified, ethical hacker.
Learning outcomes
Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Penetration Testing Concepts
Information Security Laws and Standards
Module 2: Foot Printing and Reconnaissance
Discover how to identify security loopholes before an attack occurs. In this module, you'll learn the art of footprinting and reconnaissance, which is essential for any cyber security professional. You'll practice gathering critical data that potential attackers could exploit using the latest hacking tools and techniques.
Learning outcomes
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Competitive Intelligence
Whois Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Countermeasures
Footprinting Pen Testing
Module 3: Scanning Networks
Get hands-on with network scanning methodologies to uncover vulnerabilities. This module will show you how to use various scanning tools beyond the capabilities of IDS and firewalls, helping you draw network diagrams and understand the structure of the networks you are defending.
Learning outcomes
Network Scanning Concepts
Scanning Tools
Scanning Techniques
Scanning Beyond IDS and Firewall
Banner Grabbing
Draw Network Diagrams
Scanning Pen Testing
Module 4: Enumeration
Enumeration techniques are vital in discovering detailed information about a target system. Here, you'll learn how to conduct NetBIOS, SNMP, LDAP, and other types of enumeration, providing a deeper insight into the security posture of network infrastructures.
Learning outcomes
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Enumeration Pen Testing
Module 5: Vulnerability Analysis
How do you identify and prioritise threats? This module addresses that by teaching you how to use vulnerability assessment tools to find and report security weaknesses in network and communication infrastructures.
Learning outcomes
Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 6: System Hacking
Explore various system hacking methodologies, including steganography and covering tracks. This module goes deep into how attackers gain and maintain unauthorised access and how you can use this knowledge to strengthen security measures.
Learning outcomes
Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Penetration Testing
Module 7: Malware Threats
Understand the types of malware—from Trojans to worms. You'll dive into malware analysis and learn the countermeasures to defend against these pervasive threats using anti-malware software.
Learning outcomes
Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Countermeasures
Anti-Malware Software
Malware Penetration Testing
Module 8: Sniffing
Sniffing is a technique that intercepts data packets as they travel across a network. In this module, you'll learn about the tools and techniques to detect and defend against sniffing, ensuring the integrity and confidentiality of network data.
Learning outcomes
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Countermeasures
Sniffing Detection Techniques
Sniffing Pen Testing
Module 9: Social Engineering
Master the human element of security breaches. This module covers the psychological tactics attackers use, such as identity theft attempts and insider threats, and teaches you how to audit human-level vulnerabilities. You'll learn to identify and mitigate the risks associated with social engineering attacks, using countermeasures to protect against them and enhance overall security posture.
Learning outcomes
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Countermeasures
Social Engineering Pen Testing
Module 10: Denial-of-Service
DoS and DDoS attacks can cripple networks. Learn about the different attack techniques and the tools to mitigate them, ensuring availability and continuity of service.
Learning outcomes
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
Botnets
DDoS Case Study
DoS/DDoS Attack Tools
Countermeasures
DoS/DDoS Protection Tools
DoS/DDoS Penetration Testing
Module 11: Session Hijacking
Discover how attackers exploit web sessions and the countermeasures you can implement. This module covers application-level and network-level session hijacking, enhancing your skills in defending critical web applications.
Learning outcomes
Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Countermeasures
Penetration Testing
Module 12: Evading IDS, Firewalls, and Honeypots
This module teaches you how to identify and evade intrusion detection systems, firewalls, and honeypots, which are crucial for testing and strengthening a network's defences.
Learning outcomes
IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot Solutions
Evading IDS
Evading Firewalls
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Penetration Testing
Module 13: Hacking Web Servers
Learn about web server vulnerabilities and how to exploit them. This module covers the tools and techniques for auditing and securing web servers against attacks.
Learning outcomes
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Tools
Countermeasures
Patch Management
Web Server Security Tools
Web Server Pen Testing
Module 14: Hacking Web Applications
Web applications are frequent attack targets. Gain insights into web application threats and the hacking methodologies used to exploit these vulnerabilities.
Learning outcomes
Web App Concepts
Web App Threats
Hacking Methodology
Web App Hacking Tools
Countermeasures
Web App Security Testing Tools
Web App Pen Testing
Module 15: SQL Injection
SQL injection remains one of the most devastating attack vectors. This module will equip you with the knowledge to use SQL injection attack techniques and implement robust countermeasures.
Learning outcomes
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
Countermeasures of SQL Injection
Module 16: Hacking Wireless Networks
Wireless networks are everywhere, and securing them is crucial. Learn about Wi-Fi security tools, threats, and countermeasures to protect wireless infrastructures.
Learning outcomes
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Countermeasures
Wireless Security Tools
Wireless Pen Testing
Module 17: Hacking Mobile Platforms
Mobile security is more important than ever. Learn the security guidelines for mobile platforms and teaches you how to secure mobile devices effectively.
Learning outcomes
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Spyware
Mobile Device Management
Mobile Security Guidelines and Tools
Mobile Pen Testing
Module 18: IoT and OT Hacking
As the number of IoT devices we use grows, so do potential security risks. Learn about the various IoT attacks and the methodologies and tools needed to secure these devices.
Learning outcomes
IoT Concepts
IoT Attacks
IoT Hacking Methodology
IoT Hacking Tools
Countermeasures
IoT Pen Testing
Module 19: Cloud Computing
Cloud security techniques are essential in today's IT environments. This module covers the threats and security measures necessary for cloud infrastructure, including container technologies and serverless computing.
Learning outcomes
Cloud Computing Concepts
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing
Module 20: Cryptography
Ending with a deep dive into cryptography, you will explore the encryption algorithms and tools that protect data integrity and confidentiality, which is essential knowledge for any cybersecurity expert.
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Countermeasures
The Certified Ethical Hacker (C|EH) exam is your gateway to a career in cybersecurity. This certification exam assesses your knowledge across 20 modules, ensuring you're ready to tackle real-world security challenges. With scenario-based questions, the C|EH exam prepares you to think and act like a hacker professionally and ethically.
Course Level: Foundational
Types of question: Scenario-based with multiple choices
Total number of questions: 125 questions
Marks required to pass: 70%
The Certified Ethical Hacker (C|EH) course is uniquely designed to welcome participants from diverse backgrounds, including those just entering the world of information technology and seasoned professionals aiming to enhance their skills in cybersecurity.
Beginners and No IT Background
For beginners with little to no IT background, the C|EH course is structured to introduce the foundational concepts of cybersecurity in an easy-to-understand and engaging manner. It ensures that everyone can grasp and apply the principles effectively regardless of their prior knowledge.
This inclusivity makes the Certified Ethical Hacker certification especially appealing to those looking to make a significant career shift or to start a new career path in a high-demand field.
IT Professionals Looking to Upskill
Moreover, for IT security professionals already in the field, the C|EH course offers a valuable opportunity to upskill. As cyber threats evolve and become more sophisticated, continuous learning is essential.
C|EH course provides the advanced skills and cutting-edge techniques required to stay ahead in the fast-paced world of cybersecurity. It covers the latest ethical hacking tools, security laws, and penetration testing methods. This way, participants refresh their existing knowledge and expand it to include the most current and effective practices.
When you enrol in our Certified Ethical Hacker (C|EH) course, you're not just signing up for an educational program — you're investing in a suite of benefits designed to enhance your learning experience and support your career development. We understand the importance of comprehensive support systems and resources in your learning journey and are here to guide you every step.
Official Certification
You will earn the globally recognised Certified Ethical Hacker certification upon completing the course and passing the exam.
Expert Instructors
Learn from the best! Our instructors are seasoned professionals with years of real-world experience in cybersecurity. They bring their depth of knowledge and practical insights into the classroom, ensuring you receive a theoretical and highly applicable education in real-world scenarios.
Career Advancement Support
We are committed to educating you and helping you find your path in the cybersecurity industry. Our career services include CV review, interview preparation, and job placement assistance to help you smoothly transition from learning to employment.
Resource Access
As a student, you will have access to an extensive range of online resources. This includes video lectures, reading materials, and hands-on labs that enhance your understanding and practical application of ethical hacking concepts.
Learn with Confidence from a Trusted Provider
Enrol with eCareers and benefit from a reliable and trusted learning provider backed by over 14,000 positive reviews on Trustpilot. Our commitment to quality education ensures you receive top-notch training and support throughout your learning journey.
Is the Certified Ethical Hacker (CEH) course suitable for beginners?
Absolutely! Our Certified Ethical Hacker (CEH) course accommodates learners at all levels, including those without IT or cybersecurity experience.
This course is a comprehensive introduction to the fundamentals of ethical hacking and cybersecurity for beginners. It methodically guides you through various concepts and practices, ensuring you understand the basics before advancing to more complex topics.
By the end of the course, you will be well-prepared to take the CEH exam and pursue a career as a cybersecurity professional.
How long will it take to complete the CEH course and prepare for the exam?
Completing the Certified Ethical Hacker (CEH) course takes five days, but it can vary depending on the individual's learning pace and prior knowledge. Typically, students can expect to spend approximately 60 to 80 hours of study to prepare thoroughly for the CEH exam.
We offer flexible learning options, allowing you to study at your own pace and access materials anytime, ensuring you can efficiently fit your studies into your personal and professional life.
Is the Certified Ethical Hacker (CEH) certification worth it to advance my cybersecurity career?
Definitely! The Certified Ethical Hacker (CEH) certification is highly respected in cybersecurity. It validates your skills as an ethical hacker. It enhances your employability by demonstrating your commitment and knowledge to potential employers.
Cybersecurity professionals with C|EH certification get more roles, including system security, network security, and penetration testing. The accreditation can significantly impact your career trajectory by opening new opportunities for advancement and increasing your potential salary.
What does a Certified Ethical Hacker do?
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker but lawfully and legitimately to assess the security posture of a target system(s).
This role involves various tasks such as scanning networks, identifying security loopholes, conducting penetration tests, and ensuring that the organisation's systems and applications are secure from potential threats. Certified Ethical Hackers are vital in preventing data breaches and safeguarding against identity theft attempts.
Here are some of the responsibilities of Certified Ethical Hackers:
1. Discover Network Vulnerabilities: Ethical hackers systematically scan networks to detect and report vulnerabilities that malicious attackers could exploit. This involves assessing the network infrastructure, evaluating system configurations, and promptly applying all security patches and updates.
2. Prevent Web Server Attacks: Certified Ethical Hackers protect web server infrastructures from various attacks. This includes assessing potential security issues that could lead to unauthorised access or data leakage.
3. Implement Intrusion Detection System (IDS): Ethical hackers implement and manage intrusion detection systems to detect unauthorised access attempts and other suspicious activities. An IDS is a vital tool in a security professional's arsenal, providing real-time monitoring and alerting on potential threats.
4. Suggest Social Engineering Countermeasures: Social engineering represents a significant threat to organisational security. Certified Ethical Hackers educate and train employees to recognise and respond to social engineering tactics. They develop policies and procedures to mitigate these risks and conduct regular security awareness training sessions to ensure that all team members are prepared.
5. Identify Theft Attempts: A crucial aspect of an ethical hacker's job is protecting sensitive information from theft. This involves setting up systems and protocols to detect and prevent data breaches. Ethical hackers simulate phishing attacks and other identity theft attempts to test the organisation's defences and train staff in identifying suspicious activities that could indicate a security breach.
6. Conduct Penetration Testing: Ethical hackers make authorised attempts to breach the various components of the organisation's systems, such as network devices, applications, and other exposure points.
How relevant is the Certified Ethical Hacker (CEH) certification in the cybersecurity job market?
The relevance of the Certified Ethical Hacker (CEH) certification remains exceptionally high in the current cybersecurity job market. As cyber threats evolve and become more sophisticated, organisations across all industries seek skilled professionals who can protect their systems and data from malicious attacks.
The C|EH certification is recognised globally. It showcases your advanced ethical hacking and cybersecurity skills, making them highly desirable to employers looking to fortify their defences against cyber attacks.
Can I take the C|EH exam without completing the course?
While it is possible to sit for the C|EH exam without completing the course, completing the official training is highly recommended.
The course covers all the material needed for the exam. It provides valuable practical experience through labs and exercises not available to self-studiers. Moreover, completing the course ensures you are well-prepared to handle the questions and scenarios presented in the exam.
Is e-Careers course and CEH certification recognised in the UK?
Yes, e-Careers course and the CEH certification are fully recognised in the UK.
As an accredited provider by the EC-Council, e-Careers is one of the UK's top learning providers, specialising in cybersecurity training. Our Certified Ethical Hacker (CEH) course adheres to the highest standards set by the EC-Council, ensuring that our certification is valued by employers across the country and beyond.
Whether you're looking to advance in your current role or start a new career in cybersecurity, our CEH certification provides a solid foundation and is highly regarded in the industry.