EC Council Certified Ethical Hacker

Certified Ethical Hacker is the perfect course and certification for you to begin a career as a ‘White Hat Hacker’ or understand your systems from a hacker’s perspective.
5 day course
Supporting material
A private training session for your team. Groups can be of any size, at a location of your choice including our training centres.

On this five day course you’ll learn the tools and techniques used to compromise networks, systems, applications, and people to gain, maintain, and exploit vulnerabilities so you can mitigate them before someone else does.

The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. As the EC Council puts it, "To beat a hacker, you need to think like a hacker".

This course will immerse the delegate into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organisation must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organisation; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The CEHv10 course is now accredited under the GCHQ Certified Training (GCT) Scheme.

Our Certified Ethical Hacker course is offered as a private training session and can be delivered at our own training facilities in San Francisco or Baltimore, or any location of your choice.

Course overview
Who should attend:

This course benefits security professionals, site administrators, and anyone who is concerned about or interested in the integrity of the network and system infrastructure.

If you are interested in becoming or understanding ethical hacking, this course this is the course for you. You will be taught the methodology used by professional hackers and gain hands-on experience in identifying and exploiting IT security threats.

Walk away with the ability to:
  • Understand hacking terminology and mindset of hackers
  • Master the methodology used by professional hackers
  • Identify the risks faced by organisations on a day to day basis
  • Identify the services, vulnerabilities, and exploits on target systems and understand the threats to your organisation
  • Be able to demonstrate real-world threats to decision-makers and offer mitigating strategies to improve overall IT security in your organisation and beyond

You will achieve this through our lectures, real-world examples, discussions, and demonstrations. Additionally, you will be able to practice your skills in a sandboxed environment for six-months using the CEH iLabs.

The CEH iLabs are a cloud-based system providing delegates 24/7 access to Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts to try, perfect, and master your newly acquired hacking skills during the course, during revision, and after certification.


In one word: An ability to “think out of the box.” While an in-depth knowledge of TCP/IP, OSes, and applications is helpful, our approach is to teach you the basics as we explain the hacks. Assuming delegates have a basic understanding of computing, we feel anyone can learn to hack and we take the time and effort to assure your success.

Delegates will need to bring a laptop in order to participate in the lab exercises that form a large part of the course. Technically any laptop (Windows, macOS, Linux) with a browser and a WiFi connection can be used. However, for the best experience, we recommend a laptop configuration that includes an i5 processor or higher, at least 16Gb of RAM, and an ethernet adapter. Full configuration rights to your browser are necessary so please check with your IT departments to be sure you are able to modify your browser if necessary. Please contact us should you have any enquiries:

Delegates will not be able to access the EC Council CEHv10 course material or iLabs until the first day of the course.

Course agenda

CEHv10 is made up of 20 Domains giving you a comprehensive overview of technology and threats. Over the course of five days, you will gain a hacker’s perspective in the following areas.

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial-of-Service
  1. Session Hijacking
  2. Evading IDS, Firewalls, and Honeypots
  3. Hacking Web Servers
  4. Hacking Web Applications
  5. SQL Injection
  6. Hacking Wireless Networks
  7. Hacking Mobile Platforms
  8. IoT Hacking
  9. Cloud Computing
  10. Cryptography

Our course includes a CEHv10 (ANSI) Pearson Vue exam voucher, allowing you to arrange your exam after sufficient revision. During your revision, you continue to have direct access to your instructor.

  • Exam Title: CEHv10 (ANSI)
  • Language: English
  • Number of Questions: 125
  • Passing Score: 70%
  • Test Duration: 4 hours
  • Test Format: Multiple Choice
Book this course
Call our sales team today
Don't miss out
Keep up to date with news, views and offers from Jellyfish Training.
Your data will be handled in accordance with our Privacy Policy