The Knowledge Academy Logo
01344 203999
  24 Hours Monday - Sunday
Empty
X

Send us your message.
We'll get back to you as soon as we can.

Please enter Name Please enter valid Email Please enter valid Phone number

Classroom Training

At The Knowledge Academy, our classroom-based training courses allow delegates to study and learn in a friendly, engaging, and interactive environment. We ensure the very best level of teaching, with first-rate instructors, resources, and state-of-the-art facilities. We provide courses of varying durations and can arrange weekend and residential courses in order to suit your requirements.

Furthermore, our classroom courses are carried out in thousands of locations worldwide, making training easily accessible wherever you are. Our courses typically begin at 9.00 am and continue until 5.00 pm each day, with breaks and refreshments provided. , As our most popular form of training available, we pride ourselves in continuously delivering an outstanding learning experience for our delegates in the classroom.

View classroom dates
  • Direct support from our experienced trainers throughout the course
  • Training courses available in thousands of locations globally
  • Partake in engaging and valuable activities in the classroom to boost your learning potential
  • Receive an all-encompassing learning experience

Online Training

Our online-based training courses aim to provide you with a complete training experience. Due to their flexibility, these courses are greatly suited to busy working professionals, or any individual who would prefer the convenience of an online training course.

Our Computer-Based Training (CBT) courses remove the time and cost associated with travelling to course locations. You can complete your chosen course in any location, and work at your own pace, as the learning portal can be accessed 24/7. All of our online training courses have technical and administrative support and mobile access. Furthermore, each course has been carefully designed to incorporate informative, instructive, and engaging content. In this way, online learning can guarantee a valuable and enjoyable training solution.

View online prices
  • Our flexible online courses provide you with 24/7 access
  • Take your time with 90 days from first login to complete the course
  • Enjoy an engaging and interactive learning experience
  • Courses available through our easy-to-use learning portal

In-House Training

Our In-House training option allows you to select any of our courses and receive training at a venue of your choice, by any method of your choice.

In-House courses deliver training to multiple employees at once, thus reducing travel expenses and providing you with the ultimate convenience and value for money. In addition, this option allows you to receive a training course that has been specifically tailored to meet your business needs, ensuring first-class quality, applicability, and value.

By choosing to bring bespoke training to the office, you can improve business performance, and make your organisation more streamlined, resourceful, and profitable. With over 25 years’ of experience, we are the market-leaders of In-House training.

Book onsite
  • Reduce the costs of employees taking time away from the workplace to train
  • Streamline your business with this bespoke training solution
  • Maximise your training budget
  • Monitor your employees’ progress and ensure that they receive applicable qualifications

Virtual Training

Our Virtual training courses provide you with the option to learn using a specialised simulated virtual environment. In this environment, our expert training instructors will be able to convey information and provide you with the all the knowledge you require to earn your qualification with The Knowledge Academy. As the largest global training provider, this method of training allows us to extend our training scope to those who may not be able to attend a classroom course itself, but would like to receive direct training and support from an instructor.
Using this training delivery method, you would benefit from the convenience of remote access and the elimination of the time and cost associated with travelling to a training venue.

View virtual dates
  • Receive direct support from our experienced trainers
  • Acquire the benefits of a classroom course, without the need to travel
  • Train from the comfort of your own home using remote access
  • All virtual training courses come with technical and administrative support
X
IT Security

Certified Ethical Hacker V9

  • Delivered by Highly Experienced Penetration Testing Experts Globally 
  • Prepare for the 4 Hour CEH Exam containing 125 multiple-choice questions
  • Learn to assess the security of computer systems using penetration testing
Popular Course
Accredited:YesAccrediting body:EC-Council Enquire See Prices

Page Menu

Course Information

Module 1: Introduction to Ethical Hacking

  • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
  • Information Security Overview
  • Case Studies - eBay Data Breach & Google Play Hack
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Motives, Goals and Objectives of IS Attacks
  • Information Security Controls
  • Physical Security
  • Incident Management
  • What is Vulnerability Assessment?
  • Penetration Testing
  • Information Security Laws and Standards

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • What is Footprinting?
  • Footprinting Methodology
  • Collect Location Information
  • Determining the Operating System
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Module 3: Scanning Networks

  • Overview of Network Scanning
  • CEH Scanning Methodology
  • TCP Communication Flags
  • Creating Custom Packet Using TCP Flags

Module 4: Enumeration

  • Enumeration Concepts
  • What is Enumeration?
  • NetBIOS Enumeration
  • SNMP Enumeration
  • SNMP Enumeration Tools
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing

Module 5: System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Module 6: Malware Threats

  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing

Module 7: Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Sniffing Tool: Wireshark
  • Follow TCP Stream in Wireshark
  • Display Filters in Wireshark
  • Additional Wireshark Filters
  • Packet Sniffing Tool: Capsa Network Analyzer
  • Network Packet Analyzer
  • Countermeasures
  • Sniffing Detection
  • Sniffing Pen Testing

Module 8: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Penetration Testing

Module 9: Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

Module 10: Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measures
  • Session Hijacking Pen Testing

Module 11: Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

Module 12: Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing
  • Web Application Pen Testing Framework

Module 13: SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures

Module 14: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Counter-measures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

Module 15: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools

Module 16: Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • Intrusion Detection Systems (IDS) and their Placement
  • Firewall
  • Types of Firewall
  • Stateful Multilayer Inspection Firewall
  • Honeypot
  • IDS, Firewall and Honeypot System
  • Intrusion Detection Tool: Snort
  • Evading IDS
  • Firewall Identification
  • HTTP Tunneling Tools
  • Detecting HoneypotsDetecting HoneypotsHoneypot Detecting Tool: Send-Safe Honeypot Hunter
  • IDS/Firewall Evasion Counter-measuresCountermeasures
  • Penetration Testing

Module 17: Cloud Computing

  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing
  • What is Cloud Pen Testing?
  • Key Considerations for Pen Testing in the Cloud
  • Scope of Cloud Pen Testing
  • Cloud Penetration Testing
  • Recommendations for Cloud Testing

Module 18: Cryptography

  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
  • Government Access to Keys (GAK)
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools
Back to top

As the world's largest cyber-security training provider, our proven interactive training methods, including live-hacks, ensure that your business's systems are secure, responsive, and impenetrable. Our market-leading EC-Council accredited course includes interactive lab testing environments and hands-on system deployments to fully equip skilled professionals to instinctively diagnose and overcome system weaknesses.

 

System hacks are becoming more and more frequent - hence the requirement for businesses to transform their security platforms has never been more paramount. This detailed, meticulous, and world-leading course educates Certified Ethical Hackers of how to enhance their structural capability, to protect against malicious intrusions. Upon the completion of this all-inclusive 5-day Certified Ethical Hacker course, professionals will be fully prepared to adapt vulnerable and weak systems into digital-forensic market leaders.

 

This Certified Ethical Hacker v9 course transmits the most up-to-date system protection information. CEH v9 is the updated version of CEH v8, hence it provides delegates with the most current and necessary material that allows them to secure against system intrusions and costly breaches. Individuals will be launched into the world of hacking, by applying mechanisms and methods used by illegal hackers for the enhancement of security.

 

CEH v9 will teach delegates about the different types of hacking, and how to implement ethical hacking techniques to prohibit the assaults of illegal hackers via unauthorised system infrastructures. Delegates will learn how to scan, test, hack, and defend their security systems from infiltration. In addition, individuals will learn about the five domains of ethical hacking, which act as a basis for their hacking.

 

Adopting the mentality of an illegal hacker is valuable in identifying weaknesses within security systems, as such a mindset will draw ethical hackers to the areas illegal hackers would target. As such, these areas will be strengthened, thus achieving more powerful blockades to tackle. Certified Ethical Hacker v9 is taught within an interactive environment, to provide individuals with essential practical skills

Back to top

Certified Ethical Hacker v9 is designed for:

  • Security Officers
  • Security Professionals
  • Auditors, Site Administrators
  • Professionals involved in network infrastructure stability

Prerequisites

No prior certifications are required, but delegates will thrive if they possess experience or knowledge of:

  • Network Security Administration
  • MCSE (Microsoft Certified Systems Engineer)
  • CCNA (Cisco Certified Network Associate) ​

 

Our interactive course ensures that delegates possess the required skills to pass the Official Certified Ethical Hacker Exam (312-50 VUE), available at any Pearson Vue Exam Centre of their choice. Our all-inclusive course fee includes the much sought-after exam voucher. The CEH v9 Exam consists of:

  • 125 Multiple Choice Questions
  • 4 Hours
  • 70% Pass Rate Required

Available delivery methods for this course:

Classroom

In-house

Online

Virtual

Upcoming classes

Speak to a member of our team

Call now

01344 203999 >

Or

Enquire Now

Dates & Prices for Certified Ethical Hacker v9

Select your preferred delivery method

Filter your results

Why choose Virtual?

Attend your course from the office or home
Interactive support from experienced trainers
Simple to setup and easy to use on any device

Complete the steps below to receive a quote or more information

How will you be funding your training?

Self funding

Company funding

Not sure

Speak to a member of our team

Call now

01344 203999 >

Or

Enquire Now

Best Price in the Industry

We have the guaranteed best price for our courses in the industry

Trusted & Approved

The Knowledge Academy's Certified Ethical Hacker training courses are accredited by EC-Council

Resources Included

Resources are included for a comprehensive learning experience

Various Delivery Methods

Flexible delivery methods are available depending on your learning style


Certified Ethical Hacker v9 FAQs

Certified Ethical Hacker uses hacking techniques to uncover weaknesses within security systems. These flaws are then improved upon to boost the strength of security processes, which in turn protects systems from vicious cyber attacks. For more information, visit our Certified Ethical Hacker topic page.
CEH v9 is an updated version of CEH v8, not a follow-on training course. Certified Ethical Hacker v9 focuses more on new Attack Vectors and new vulnerabilities, and provides delegates will the most up-to-date content.
CEH v9 is appropriate today due to the constant progression of technology. Such continual developments mean illegal hackers are always finding new ways to carry out their activities, thus protection against these attacks is vital for the conversation of a business. Attacks can hit any company at any time, so preparation is crucial.
No prior certifications are required - this course is open to professionals that wish to become ethical hackers and cybersecurity experts
This official EC Council accredited Ethical Hacking course is primarily targeted at security professionals that want to acquire a well-rounded body of knowledge to enhance their employability prospects. Acquiring this Certified Ethical Hacking Certification means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organisations can rest assured that they have a candidate that is proficient and is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester.
This CEH course is invaluable due to its interactive but varied tuition style. Covering over 18 domains, students are exposed to business risks and the potential damage that can occur due to negligence or intrusion. Students will be able to make an informed decision regarding the amount of risk a company can face if it chooses to address a security concern.

Some of our clients

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."

Diane Gray, Shell


Back to top

Trustpilot

BLACK FRIDAY

Click here or call 01344 203999
First come, first served, so you better hurry!