UPTO 60% OFF

Hurry! Our Ho, Ho, Ho-liday savings end in:

Days00
Hours00
Minutes00
Seconds00

4.8 out of 5 based on 14,489 reviews

Certified Ethical Hacker (CEH) Training

EC-Council - Electronic Commerce Consultants
Delivery method

Virtual Classroom

Intake dates

Start learning from

1,550 Students enrolled

  • Individual
  • Team

Select your date

Inc. VAT

Price Match
Guarantee

  • Pay Upfront
  • Pay Monthly
Add to Cart
Express checkout
Finance Options
0% interest-free finance

3 months   instalments of: £1,331.67

6 months   instalments of: £665.83

9 months   instalments of: £443.89

12 months   instalments of: £332.92

DivideBuy
Training a team
If you want to train multiple people, our business team will gladly assist you with any questions you may have.​

Company & Course Details

Limited budget?

If you have any budget constraints, let us know in the message above. Our team will strive to work with your limitations to the best of our ability.

If you plan to be a competitive and industry-ready Certified Ethical Hacker, this course is the right one for you!

We specially designed our Certified Ethical Hacker (CEH) training for beginners and IT professionals looking to advance their careers by becoming certified in ethical hacking and cybersecurity.

Certified Ethical Hacker (CEH) training is a comprehensive program that equips you with the knowledge and skills to defend computer systems against network breaches. This training involves legal and ethical understanding and using the same techniques as malicious hackers.

Our CEH certification in e-Careers validates your abilities to foresee, react to, and guard against cybersecurity threats. You will master the latest tools and methods in ethical hacking to secure systems effectively.

Our Certified Ethical Hacker (CEH) certification is globally recognised, reflecting the stringent standards set by EC-Council, the renowned organisation responsible for issuing the certification. EC-Council is a trusted cybersecurity training and certification leader respected by professionals and organisations worldwide.

Completing this training opens doors to various rewarding roles in cybersecurity. As a CEH, you could pursue careers as a penetration tester, cybersecurity analyst, network security engineer, or information security consultant. Employers highly value this certification for roles requiring deep knowledge of ethical hacking practices.

Why Choose Us?

You can access dedicated tutor support for any questions or challenges throughout the course, ensuring a smooth learning journey. The training also includes the CEH v12 exam, allowing you to demonstrate your expertise and earn your certification as soon as you're ready. By providing structured learning and personalised assistance, we ensure you're fully supported in becoming an accomplished ethical hacker.

In summary, we offer the following to help you become a certified ethical hacker:

  • Delivery method: Virtual Classroom

  • Official exam: CEH v12 exam included

  • Duration: 5-day instructor-led training course

  • Available tutor support

  • Certified & Experienced trainers with a proper understanding of the ethical hacking process

Find out more about the "Additional Benefits" of our Certified Ethical Hacker (CEH) Training course below or learn more about our other cyber security courses here.

The Certified Ethical Hacker (CEH) course covers various aspects of ethical hacking and cybersecurity, preparing you to identify, counter, and prevent security threats effectively. Here is a detailed breakdown of the syllabus:

Module 1: Introduction to Ethical Hacking

The first module introduces you to the critical components of information security, including the basics of ethical hacking and penetration testing. You'll explore hacking concepts, information security controls, and the laws that govern this domain, setting the foundation for becoming a skilled, certified, ethical hacker.

Learning outcomes

  • Information Security Overview

  • Information Security Threats and Attack Vectors

  • Hacking Concepts

  • Ethical Hacking Concepts

  • Information Security Controls

  • Penetration Testing Concepts

  • Information Security Laws and Standards

Module 2: Foot Printing and Reconnaissance

Discover how to identify security loopholes before an attack occurs. In this module, you'll learn the art of footprinting and reconnaissance, which is essential for any cyber security professional. You'll practice gathering critical data that potential attackers could exploit using the latest hacking tools and techniques.

Learning outcomes

  • Footprinting Concepts

  • Footprinting through Search Engines

  • Footprinting through Web Services

  • Footprinting through Social Networking Sites

  • Website Footprinting

  • Email Footprinting

  • Competitive Intelligence

  • Whois Footprinting

  • DNS Footprinting

  • Network Footprinting

  • Footprinting through Social Engineering

  • Footprinting Tools

  • Countermeasures

  • Footprinting Pen Testing

Module 3: Scanning Networks

Get hands-on with network scanning methodologies to uncover vulnerabilities. This module will show you how to use various scanning tools beyond the capabilities of IDS and firewalls, helping you draw network diagrams and understand the structure of the networks you are defending.

Learning outcomes

  • Network Scanning Concepts

  • Scanning Tools

  • Scanning Techniques

  • Scanning Beyond IDS and Firewall

  • Banner Grabbing

  • Draw Network Diagrams

  • Scanning Pen Testing

Module 4: Enumeration

Enumeration techniques are vital in discovering detailed information about a target system. Here, you'll learn how to conduct NetBIOS, SNMP, LDAP, and other types of enumeration, providing a deeper insight into the security posture of network infrastructures.

Learning outcomes

  • Enumeration Concepts

  • NetBIOS Enumeration

  • SNMP Enumeration

  • LDAP Enumeration

  • NTP Enumeration

  • SMTP and DNS Enumeration

  • Other Enumeration Techniques

  • Enumeration Countermeasures

  • Enumeration Pen Testing

Module 5: Vulnerability Analysis

How do you identify and prioritise threats? This module addresses that by teaching you how to use vulnerability assessment tools to find and report security weaknesses in network and communication infrastructures.

Learning outcomes

  • Vulnerability Assessment Concepts

  • Vulnerability Assessment Solutions

  • Vulnerability Scoring Systems

  • Vulnerability Assessment Tools

  • Vulnerability Assessment Reports

Module 6: System Hacking

Explore various system hacking methodologies, including steganography and covering tracks. This module goes deep into how attackers gain and maintain unauthorised access and how you can use this knowledge to strengthen security measures.

Learning outcomes

  • Cracking Passwords

  • Escalating Privileges

  • Executing Applications

  • Hiding Files

  • Covering Tracks

  • Penetration Testing

Module 7: Malware Threats

Understand the types of malware—from Trojans to worms. You'll dive into malware analysis and learn the countermeasures to defend against these pervasive threats using anti-malware software.

Learning outcomes

  • Malware Concepts

  • Trojan Concepts

  • Virus and Worm Concepts

  • Malware Analysis

  • Countermeasures

  • Anti-Malware Software

  • Malware Penetration Testing

Module 8: Sniffing

Sniffing is a technique that intercepts data packets as they travel across a network. In this module, you'll learn about the tools and techniques to detect and defend against sniffing, ensuring the integrity and confidentiality of network data.

Learning outcomes

  • Sniffing Concepts

  • Sniffing Technique: MAC Attacks

  • Sniffing Technique: DHCP Attacks

  • Sniffing Technique: ARP Poisoning

  • Sniffing Technique: Spoofing Attacks

  • Sniffing Technique: DNS Poisoning

  • Sniffing Tools

  • Countermeasures

  • Sniffing Detection Techniques

  • Sniffing Pen Testing

Module 9: Social Engineering

Master the human element of security breaches. This module covers the psychological tactics attackers use, such as identity theft attempts and insider threats, and teaches you how to audit human-level vulnerabilities. You'll learn to identify and mitigate the risks associated with social engineering attacks, using countermeasures to protect against them and enhance overall security posture.

Learning outcomes

  • Social Engineering Concepts

  • Social Engineering Techniques

  • Insider Threats

  • Impersonation on Social Networking Sites

  • Identity Theft

  • Countermeasures

  • Social Engineering Pen Testing

Module 10: Denial-of-Service

DoS and DDoS attacks can cripple networks. Learn about the different attack techniques and the tools to mitigate them, ensuring availability and continuity of service.

Learning outcomes

  • DoS/DDoS Concepts

  • DoS/DDoS Attack Techniques

  • Botnets

  • DDoS Case Study

  • DoS/DDoS Attack Tools

  • Countermeasures

  • DoS/DDoS Protection Tools

  • DoS/DDoS Penetration Testing

Module 11: Session Hijacking

Discover how attackers exploit web sessions and the countermeasures you can implement. This module covers application-level and network-level session hijacking, enhancing your skills in defending critical web applications.

Learning outcomes

  • Session Hijacking Concepts

  • Application Level Session Hijacking

  • Network Level Session Hijacking

  • Session Hijacking Tools

  • Countermeasures

  • Penetration Testing

Module 12: Evading IDS, Firewalls, and Honeypots

This module teaches you how to identify and evade intrusion detection systems, firewalls, and honeypots, which are crucial for testing and strengthening a network's defences.

Learning outcomes

  • IDS, Firewall and Honeypot Concepts

  • IDS, Firewall and Honeypot Solutions

  • Evading IDS

  • Evading Firewalls

  • IDS/Firewall Evading Tools

  • Detecting Honeypots

  • IDS/Firewall Evasion Countermeasures

  • Penetration Testing

Module 13: Hacking Web Servers

Learn about web server vulnerabilities and how to exploit them. This module covers the tools and techniques for auditing and securing web servers against attacks.

Learning outcomes

  • Web Server Concepts

  • Web Server Attacks

  • Web Server Attack Methodology

  • Web Server Attack Tools

  • Countermeasures

  • Patch Management

  • Web Server Security Tools

  • Web Server Pen Testing

Module 14: Hacking Web Applications

Web applications are frequent attack targets. Gain insights into web application threats and the hacking methodologies used to exploit these vulnerabilities.

Learning outcomes

  • Web App Concepts

  • Web App Threats

  • Hacking Methodology

  • Web App Hacking Tools

  • Countermeasures

  • Web App Security Testing Tools

  • Web App Pen Testing

Module 15: SQL Injection

SQL injection remains one of the most devastating attack vectors. This module will equip you with the knowledge to use SQL injection attack techniques and implement robust countermeasures.

Learning outcomes

  • Types of SQL Injection

  • SQL Injection Methodology

  • SQL Injection Tools

  • Evasion Techniques

  • Countermeasures of SQL Injection

Module 16: Hacking Wireless Networks

Wireless networks are everywhere, and securing them is crucial. Learn about Wi-Fi security tools, threats, and countermeasures to protect wireless infrastructures.

Learning outcomes

  • Wireless Concepts

  • Wireless Encryption

  • Wireless Threats

  • Wireless Hacking Methodology

  • Wireless Hacking Tools

  • Bluetooth Hacking

  • Countermeasures

  • Wireless Security Tools

  • Wireless Pen Testing

Module 17: Hacking Mobile Platforms

Mobile security is more important than ever. Learn the security guidelines for mobile platforms and teaches you how to secure mobile devices effectively.

Learning outcomes

  • Mobile Platform Attack Vectors

  • Hacking Android OS

  • Hacking iOS

  • Mobile Spyware

  • Mobile Device Management

  • Mobile Security Guidelines and Tools

  • Mobile Pen Testing

Module 18: IoT and OT Hacking

As the number of IoT devices we use grows, so do potential security risks. Learn about the various IoT attacks and the methodologies and tools needed to secure these devices.

Learning outcomes

  • IoT Concepts

  • IoT Attacks

  • IoT Hacking Methodology

  • IoT Hacking Tools

  • Countermeasures

  • IoT Pen Testing

Module 19: Cloud Computing

Cloud security techniques are essential in today's IT environments. This module covers the threats and security measures necessary for cloud infrastructure, including container technologies and serverless computing.

Learning outcomes

  • Cloud Computing Concepts

  • Cloud Computing Threats

  • Cloud Computing Attacks

  • Cloud Security

  • Cloud Security Tools

  • Cloud Penetration Testing

Module 20: Cryptography

Ending with a deep dive into cryptography, you will explore the encryption algorithms and tools that protect data integrity and confidentiality, which is essential knowledge for any cybersecurity expert.

  • Cryptography Concepts

  • Encryption Algorithms

  • Cryptography Tools

  • Public Key Infrastructure (PKI)

  • Email Encryption

  • Disk Encryption

  • Cryptanalysis

  • Countermeasures

The Certified Ethical Hacker (C|EH) exam is your gateway to a career in cybersecurity. This certification exam assesses your knowledge across 20 modules, ensuring you're ready to tackle real-world security challenges. With scenario-based questions, the C|EH exam prepares you to think and act like a hacker professionally and ethically.

Course Level: Foundational

Types of question: Scenario-based with multiple choices

Total number of questions: 125 questions

Marks required to pass: 70%

The Certified Ethical Hacker (C|EH) course is uniquely designed to welcome participants from diverse backgrounds, including those just entering the world of information technology and seasoned professionals aiming to enhance their skills in cybersecurity.

Beginners and No IT Background

For beginners with little to no IT background, the C|EH course is structured to introduce the foundational concepts of cybersecurity in an easy-to-understand and engaging manner. It ensures that everyone can grasp and apply the principles effectively regardless of their prior knowledge.

This inclusivity makes the Certified Ethical Hacker certification especially appealing to those looking to make a significant career shift or to start a new career path in a high-demand field.

IT Professionals Looking to Upskill

Moreover, for IT security professionals already in the field, the C|EH course offers a valuable opportunity to upskill. As cyber threats evolve and become more sophisticated, continuous learning is essential.

C|EH course provides the advanced skills and cutting-edge techniques required to stay ahead in the fast-paced world of cybersecurity. It covers the latest ethical hacking tools, security laws, and penetration testing methods. This way, participants refresh their existing knowledge and expand it to include the most current and effective practices.

When you enrol in our Certified Ethical Hacker (C|EH) course, you're not just signing up for an educational program — you're investing in a suite of benefits designed to enhance your learning experience and support your career development. We understand the importance of comprehensive support systems and resources in your learning journey and are here to guide you every step.

Official Certification

You will earn the globally recognised Certified Ethical Hacker certification upon completing the course and passing the exam.

Expert Instructors

Learn from the best! Our instructors are seasoned professionals with years of real-world experience in cybersecurity. They bring their depth of knowledge and practical insights into the classroom, ensuring you receive a theoretical and highly applicable education in real-world scenarios.

Career Advancement Support

We are committed to educating you and helping you find your path in the cybersecurity industry. Our career services include CV review, interview preparation, and job placement assistance to help you smoothly transition from learning to employment.

Resource Access

As a student, you will have access to an extensive range of online resources. This includes video lectures, reading materials, and hands-on labs that enhance your understanding and practical application of ethical hacking concepts.

Learn with Confidence from a Trusted Provider

Enrol with eCareers and benefit from a reliable and trusted learning provider backed by over 14,000 positive reviews on Trustpilot. Our commitment to quality education ensures you receive top-notch training and support throughout your learning journey.

Is the Certified Ethical Hacker (CEH) course suitable for beginners?

Absolutely! Our Certified Ethical Hacker (CEH) course accommodates learners at all levels, including those without IT or cybersecurity experience. 

This course is a comprehensive introduction to the fundamentals of ethical hacking and cybersecurity for beginners. It methodically guides you through various concepts and practices, ensuring you understand the basics before advancing to more complex topics. 

By the end of the course, you will be well-prepared to take the CEH exam and pursue a career as a cybersecurity professional.

How long will it take to complete the CEH course and prepare for the exam?

Completing the Certified Ethical Hacker (CEH) course takes five days, but it can vary depending on the individual's learning pace and prior knowledge. Typically, students can expect to spend approximately 60 to 80 hours of study to prepare thoroughly for the CEH exam.

We offer flexible learning options, allowing you to study at your own pace and access materials anytime, ensuring you can efficiently fit your studies into your personal and professional life.

Is the Certified Ethical Hacker (CEH) certification worth it to advance my cybersecurity career?

Definitely! The Certified Ethical Hacker (CEH) certification is highly respected in cybersecurity. It validates your skills as an ethical hacker. It enhances your employability by demonstrating your commitment and knowledge to potential employers.

Cybersecurity professionals with C|EH certification get more roles, including system security, network security, and penetration testing. The accreditation can significantly impact your career trajectory by opening new opportunities for advancement and increasing your potential salary.

What does a Certified Ethical Hacker do?

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker but lawfully and legitimately to assess the security posture of a target system(s). 

This role involves various tasks such as scanning networks, identifying security loopholes, conducting penetration tests, and ensuring that the organisation's systems and applications are secure from potential threats. Certified Ethical Hackers are vital in preventing data breaches and safeguarding against identity theft attempts.

Here are some of the responsibilities of Certified Ethical Hackers:

1. Discover Network Vulnerabilities: Ethical hackers systematically scan networks to detect and report vulnerabilities that malicious attackers could exploit. This involves assessing the network infrastructure, evaluating system configurations, and promptly applying all security patches and updates.

2. Prevent Web Server Attacks: Certified Ethical Hackers protect web server infrastructures from various attacks. This includes assessing potential security issues that could lead to unauthorised access or data leakage.

3. Implement Intrusion Detection System (IDS): Ethical hackers implement and manage intrusion detection systems to detect unauthorised access attempts and other suspicious activities. An IDS is a vital tool in a security professional's arsenal, providing real-time monitoring and alerting on potential threats.

4. Suggest Social Engineering Countermeasures: Social engineering represents a significant threat to organisational security. Certified Ethical Hackers educate and train employees to recognise and respond to social engineering tactics. They develop policies and procedures to mitigate these risks and conduct regular security awareness training sessions to ensure that all team members are prepared.

5. Identify Theft Attempts: A crucial aspect of an ethical hacker's job is protecting sensitive information from theft. This involves setting up systems and protocols to detect and prevent data breaches. Ethical hackers simulate phishing attacks and other identity theft attempts to test the organisation's defences and train staff in identifying suspicious activities that could indicate a security breach.

6. Conduct Penetration Testing: Ethical hackers make authorised attempts to breach the various components of the organisation's systems, such as network devices, applications, and other exposure points.

How relevant is the Certified Ethical Hacker (CEH) certification in the cybersecurity job market?

The relevance of the Certified Ethical Hacker (CEH) certification remains exceptionally high in the current cybersecurity job market. As cyber threats evolve and become more sophisticated, organisations across all industries seek skilled professionals who can protect their systems and data from malicious attacks.

The C|EH certification is recognised globally. It showcases your advanced ethical hacking and cybersecurity skills, making them highly desirable to employers looking to fortify their defences against cyber attacks.

Can I take the C|EH exam without completing the course?

While it is possible to sit for the C|EH exam without completing the course, completing the official training is highly recommended. 

The course covers all the material needed for the exam. It provides valuable practical experience through labs and exercises not available to self-studiers. Moreover, completing the course ensures you are well-prepared to handle the questions and scenarios presented in the exam.

Is e-Careers course and CEH certification recognised in the UK?

Yes, e-Careers course and the CEH certification are fully recognised in the UK.

As an accredited provider by the EC-Council, e-Careers is one of the UK's top learning providers, specialising in cybersecurity training. Our Certified Ethical Hacker (CEH) course adheres to the highest standards set by the EC-Council, ensuring that our certification is valued by employers across the country and beyond.

Whether you're looking to advance in your current role or start a new career in cybersecurity, our CEH certification provides a solid foundation and is highly regarded in the industry.

Why choose e-Careers

Credibility Credibility
  • An industry leader with over 10 years experience in the delivery of online professional qualifications.
  • Join a community of over 630,000 individuals and businesses that choose e-Careers as their training provider of choice.
  • e-Careers have won multiple awards and been nominated by industry leaders for their commitment and quality in upskilling.
  • Strategic partner to over 50 colleges, universities, trade unions and government bodies.
Quality Quality
  • Received over 14,489 Trustpilot reviews with an "Excellent" rating.
  • Training programmes are designed and delivered by some of the most acclaimed tutors that have both industry as well as academic experience.
  • Commitment to quality and service is demonstratable as every element of training design, development and delivery is controlled through in-house expertise.
Impact Impact
  • We boast some of the highest pass-marks in the industry.
  • Gain skills that are sought-after by employers, reinforced with an internationally recognised certification.
  • Most up to date curriculum ensuring you learn the most relevant skills.
  • Gain both knowledge and application skills when studying our courses.
Affordability Affordability
  • 0% interest finance and payment plans to suit all budgets, including those with a low credit score.
  • Commitment to offer the best value through our price match guarantee.
  • All prices include VAT, so the price you see is the price you pay.
Flexibility courses/classrooms Flexibility courses/classrooms
  • Flexible online delivery through virtual classrooms. Study from anywhere, saving travel costs and valuable time.
  • Benefit from studying in a group environment, allowing you to learn and network with like minded individuals.
  • Some of our classroom courses benefit from our Exam Pass Guarantee, helping you increase your chances of success.
  • Training delivered by our highly experienced Tutors, who are well versed at delivering engaging classes in a virtual setting.
  • Access your courses from any internet enabled device, including phone, tablet, laptop or desktop.
Appreciation Appreciation
  • Totum Pro student discount card available to all e-Careers students.
  • Gift cards offered when you refer a friend.
Support Support
  • Many of our courses include live classes, unlimited Tutor support, and additional resources, where applicable.
  • Our team of experts will guide and support you right from your initial inquiry.
  • We also, frequently hold virtual events for various industries, covering hot topics like how to get started, what a career in that industry is like, career progression opportunities, and expected salaries at different stages of your career. These events are delivered by our expert Tutors, and they allow you to ask questions and learn more about the industry before deciding to enrol.
credibility
quality
imapct
affordability
flexibility
appreciation
support

We're Trusted by

Hundreds of thousands of individuals, small businesses and large corporations continuously put their trust in e-Careers.​
We are proud to have trained individuals who work for some of the world’s largest companies, including:​
Trusted by Trusted by