EC Council Certified Ethical Hacker

Certified Ethical Hacker is the perfect course and certification for you to begin a career as a ‘White Hat Hacker’ or understand your systems from a hacker’s perspective.
product
5 day course
Supporting material
Classroom, Virtual, Private
Classroom
Face to face, interactive classroom training run from our global training centres.
Virtual Classroom
A convenient and interactive learning experience, that enables you to attend one of our live classroom courses via WebEx from your office or even the comfort of your home.
These can also be booked as Private Virtual Classrooms for exclusive business sessions.
Private
A private training session for your team. Groups can be of any size, at a location of your choice including our training centres.
Certification

On this five day course you’ll learn the tools and techniques used to compromise networks, systems, applications, and people to gain, maintain, and exploit vulnerabilities so you can mitigate them before someone else does.

The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. As the EC Council puts it, "To beat a hacker, you need to think like a hacker".

This course will immerse the delegate into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organisation must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organisation; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The CEHv10 course is now accredited under the GCHQ Certified Training (GCT) Scheme.

Our Certified Ethical Hacker course is available as a private training session and will run over five consecutive days. It can be delivered at our own training venues in the Rosebank Link, Johannesburg or Umhlanga or any location of your choice.

 
Course overview
Who should attend:

This course benefits security professionals, site administrators, and anyone who is concerned about or interested in the integrity of the network and system infrastructure.

If you are interested in becoming or understanding ethical hacking, this course this is the course for you. You will be taught the methodology used by professional hackers and gain hands-on experience in identifying and exploiting IT security threats.

Walk away with the ability to:
  • Understand hacking terminology and mindset of hackers
  • Master the methodology used by professional hackers
  • Identify the risks faced by organisations on a day to day basis
  • Identify the services, vulnerabilities, and exploits on target systems and understand the threats to your organisation
  • Be able to demonstrate real-world threats to decision-makers and offer mitigating strategies to improve overall IT security in your organisation and beyond

You will achieve this through our lectures, real-world examples, discussions, and demonstrations. Additionally, you will be able to practice your skills in a sandboxed environment for six-months using the CEH iLabs.

The CEH iLabs are a cloud-based system providing delegates 24/7 access to Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts to try, perfect, and master your newly acquired hacking skills during the course, during revision, and after certification.

Prerequisites

In one word: An ability to “think out of the box.” While an in-depth knowledge of TCP/IP, OSes, and applications is helpful, our approach is to teach you the basics as we explain the hacks. Assuming delegates have a basic understanding of computing, we feel anyone can learn to hack and we take the time and effort to assure your success.

Delegates will need to bring a laptop in order to participate in the lab exercises that form a large part of the course. Technically any laptop (Windows, macOS, Linux) with a browser and a WiFi connection can be used. However, for the best experience, we recommend a laptop configuration that includes an i5 processor or higher, at least 16Gb of RAM, and an ethernet adapter. Full configuration rights to your browser are necessary so please check with your IT departments to be sure you are able to modify your browser if necessary. Please contact us should you have any enquiries:

Delegates will not be able to access the EC Council CEHv10 course material or iLabs until the first day of the course.

Course agenda

CEHv10 is made up of 20 Domains giving you a comprehensive overview of technology and threats. Over the course of five days, you will gain a hacker’s perspective in the following areas.

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial-of-Service
  1. Session Hijacking
  2. Evading IDS, Firewalls, and Honeypots
  3. Hacking Web Servers
  4. Hacking Web Applications
  5. SQL Injection
  6. Hacking Wireless Networks
  7. Hacking Mobile Platforms
  8. IoT Hacking
  9. Cloud Computing
  10. Cryptography
Examination

Our course includes a CEHv10 (ANSI) Pearson Vue exam voucher, allowing you to arrange your exam after sufficient revision. During your revision, you continue to have direct access to your instructor.

  • Exam Title: CEHv10 (ANSI)
  • Language: English
  • Number of Questions: 125
  • Passing Score: 70%
  • Test Duration: 4 hours
  • Test Format: Multiple Choice
close
Don't miss out
Keep up to date with news, views and offers from Jellyfish Training.
Your data will be handled in accordance with our Privacy Policy
Book this course
Call our sales team today
R2,099 ex VAT
Other options available
Virtual Classrooms
Our virtual classroom solution allows attendees from anywhere in the world to come together for a fully bespoke and customised training session without anyone having to leave their office.
LEARN MORE
Enterprise Solutions
Whether you employ ten or ten thousand employees, our enterprise training solutions can be designed to suit your organisations learning needs.
More about Enterprise Solutions
Related news
& insights
BROWSE ALL ARTICLES
Blog
14 Funny & Weird Collective Nouns...
01 Sep, 2019
Our love for the English language at Jellyfish Training recently took us down a road of collective nouns. We thought we’d create this funny list for you and bring them to life with illustrations....
Blog
How to Create Audience Segments in Google Analytics
10 Sep, 2019
Here's our easy guide to getting started with audience segmentation in Google Analytics....
Blog
Free Keyword Research Template
11 Sep, 2019
Keyword research is the process of finding and analyzing actual search terms that people enter into search engines. Find here our free Keyword Research Template do help get you started....
Blog
A Social Media Plan to save you hours of work
11 Sep, 2019
A strategic marketing activity plan for your social media allows you to focus on the important factors that are going to help you meet your business objectives, and not get weighted down to the unprod...
North America
Europe, Middle East & Africa