The Knowledge Academy Logo
01344 203999 - Available 24/7
Empty
X

Send us your message.
We'll get back to you as soon as we can.

Classroom Training

At The Knowledge Academy, our classroom-based training courses allow delegates to study and learn in a friendly, engaging, and interactive environment. We ensure the very best level of teaching, with first-rate instructors, resources, and state-of-the-art facilities. We provide courses of varying durations and can arrange weekend and residential courses in order to suit your requirements.

Furthermore, our classroom courses are carried out in thousands of locations worldwide, making training easily accessible wherever you are. Our courses typically begin at 9.00 am and continue until 5.00 pm each day, with breaks and refreshments provided. , As our most popular form of training available, we pride ourselves in continuously delivering an outstanding learning experience for our delegates in the classroom.

View classroom dates
  • Direct support from our experienced trainers throughout the course
  • Training courses available in thousands of locations globally
  • Partake in engaging and valuable activities in the classroom to boost your learning potential
  • Receive an all-encompassing learning experience

Online Training

Our online-based training courses aim to provide you with a complete training experience. Due to their flexibility, these courses are greatly suited to busy working professionals, or any individual who would prefer the convenience of an online training course.

Our Computer-Based Training (CBT) courses remove the time and cost associated with travelling to course locations. You can complete your chosen course in any location, and work at your own pace, as the learning portal can be accessed 24/7. All of our online training courses have technical and administrative support and mobile access. Furthermore, each course has been carefully designed to incorporate informative, instructive, and engaging content. In this way, online learning can guarantee a valuable and enjoyable training solution.

View online prices
  • Our flexible online courses provide you with 24/7 access
  • Take your time with 90 days from first login to complete the course
  • Enjoy an engaging and interactive learning experience
  • Courses available through our easy-to-use learning portal

In-House Training

Our In-House training option allows you to select any of our courses and receive training at a venue of your choice, by any method of your choice.

In-House courses deliver training to multiple employees at once, thus reducing travel expenses and providing you with the ultimate convenience and value for money. In addition, this option allows you to receive a training course that has been specifically tailored to meet your business needs, ensuring first-class quality, applicability, and value.

By choosing to bring bespoke training to the office, you can improve business performance, and make your organisation more streamlined, resourceful, and profitable. With over 25 years’ of experience, we are the market-leaders of In-House training.

Book onsite
  • Reduce the costs of employees taking time away from the workplace to train
  • Streamline your business with this bespoke training solution
  • Maximise your training budget
  • Monitor your employees’ progress and ensure that they receive applicable qualifications

Virtual Training

Our Virtual training courses provide you with the option to learn using a specialised simulated virtual environment. In this environment, our expert training instructors will be able to convey information and provide you with the all the knowledge you require to earn your qualification with The Knowledge Academy. As the largest global training provider, this method of training allows us to extend our training scope to those who may not be able to attend a classroom course itself, but would like to receive direct training and support from an instructor.
Using this training delivery method, you would benefit from the convenience of remote access and the elimination of the time and cost associated with travelling to a training venue.

View virtual dates
  • Receive direct support from our experienced trainers
  • Acquire the benefits of a classroom course, without the need to travel
  • Train from the comfort of your own home using remote access
  • All virtual training courses come with technical and administrative support
X
IT Security

Certified Ethical Hacker V10

  • New Release: Certifed Ethical Hacker v10
  • Prepare for the 4 Hour CEH Exam containing 125 multiple-choice questions
  • Learn to assess the security of computer systems using penetration testing
Popular Course
Accredited:YesAccrediting body:EC-Council Enquire See Prices

Page Menu

Course Information

Certified Ethical Hacker V10 Course Outline​

Module 01: Introduction to Ethical Hacking

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards

Module 02: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through social Engineering
  • Footprinting Tools
  • Countermeasures
  • Footprinting Pen Testing

Module 03: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing

Module 04: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing

Module 05: Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

Module 06: System Hacking

  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Module 07: Malware Threats

  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing

Module 08: Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

Module 09: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing

Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Penetration Testing

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Penetration Testing

Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Countermeasures
  • Patch Management
  • Web Server Security Tools
  • Web Server Pen Testing

Module 14: Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Hacking Methodology
  • Web App Hacking Tools
  • Countermeasures
  • Web App Security Testing Tools
  • Web App Pen Testing

MoSQL Injection Concepts

  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasuresdule 15: SQL Injection

Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wireless Pen Testing

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Spyware
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Module 18: IoT Hacking

  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • Countermeasures
  • IoT Pen Testing

Module 19: Cloud Computing

  • Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

Module 20: Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures
Show more Back to top

Certified Ethical Hacker v10 Training Course Overview

As the world's largest cyber-security training provider, our proven interactive training methods, including live-hacks, ensure that your business's systems are secure, responsive, and impenetrable. Our market-leading EC-Council accredited course includes interactive lab testing environments and hands-on system deployments to fully equip skilled professionals to instinctively diagnose and overcome system weaknesses.

System hacks are becoming more and more frequent - hence the requirement for businesses to transform their security platforms has never been more paramount. This detailed, meticulous, and world-leading course educates Certified Ethical Hackers of how to enhance their structural capability, to protect against malicious intrusions. Upon the completion of this all-inclusive 5-day Certified Ethical Hacker course, professionals will be fully prepared to adapt vulnerable and weak systems into digital-forensic market leaders.

This Certified Ethical Hacker v10 course transmits the most up-to-date system protection information. CEH v10 is the updated version of CEH v10, hence it provides delegates with the most current and necessary material that allows them to secure against system intrusions and costly breaches. Individuals will be launched into the world of hacking, by applying mechanisms and methods used by illegal hackers for the enhancement of security.

CEH v10 will teach delegates about the different types of hacking, and how to implement ethical hacking techniques to prohibit the assaults of illegal hackers via unauthorised system infrastructures. Delegates will learn how to scan, test, hack, and defend their security systems from infiltration. In addition, individuals will learn about the five domains of ethical hacking, which act as a basis for their hacking.

Adopting the mentality of an illegal hacker is valuable in identifying weaknesses within security systems, as such a mindset will draw ethical hackers to the areas illegal hackers would target. As such, these areas will be strengthened, thus achieving more powerful blockades to tackle. Certified Ethical Hacker v10 is taught within an interactive environment, to provide individuals with essential practical skills

Show more Back to top

Who should attend this Ethical Hacking Training?

Certified Ethical Hacker v10 is designed for:

  • Security Officers
  • Security Professionals
  • Auditors, Site Administrators
  • Professionals involved in network infrastructure stability

Certified Ethical Hacker v10 Prerequisites

No prior certifications are required, but delegates will thrive if they possess experience or knowledge of:

  • Network Security Administration
  • MCSE (Microsoft Certified Systems Engineer)
  • CCNA (Cisco Certified Network Associate)

 

What’s Included in this Ethical hacking Training?

  • The Certified Ethical Hacker V10 Exam Voucher
  • Certified Ethical Hacker v10 Study Guide ISBN: 978-1119252245
  • The Knowledge Academy’s Certified Ethical Hacker V10 Course Materials
  • Experienced Instructor
  • Certificate on Completion
  • Refreshments

Certified Ethical Hacker Exam Information

Our interactive course ensures that delegates possess the required skills to pass the Official Certified Ethical Hacker Exam (312-50 VUE), available at any Pearson Vue Exam Centre of their choice. Our all-inclusive course fee includes the much sought-after exam voucher. The CEH v10 Exam consists of:

  • 125 Multiple Choice Questions
  • 4 Hours
  • 70% Pass Rate Required

 

 

Available delivery methods for this course:

Classroom

In-house

Virtual

Upcoming classes

Speak to a member of our team

Call now

01344 203999 >

Or

Enquire Now

Best Value

special offer ribbon CURRENT DEAL - Save £350

Certified Ethical Hacker Spring Special Offer +
Free CISSP Training

Limited Spaces Remaining - Ends 30th April 2018
RRP: £1795

From: £1445

Enquire Now

Dates & Prices for Certified Ethical Hacker v10

Select your preferred delivery method

Filter your results

Why choose Virtual?

Attend your course from the office or home
Interactive support from experienced trainers
Simple to setup and easy to use on any device

Complete the steps below to receive a quote or more information

How will you be funding your training?

Self funding

Company funding

Not sure

Speak to a member of our team

Call now

01344 203999 >

Or

Enquire Now

Best Price in the Industry

We have the guaranteed best price for our courses in the industry

Trusted & Approved

The Knowledge Academy's Certified Ethical Hacker training courses are accredited by EC-Council

Resources Included

Resources are included for a comprehensive learning experience

Various Delivery Methods

Flexible delivery methods are available depending on your learning style


Certified Ethical Hacker v10 FAQs

Certified Ethical Hacker uses hacking techniques to uncover weaknesses within security systems. These flaws are then improved upon to boost the strength of security processes, which in turn protects systems from vicious cyber attacks. For more information, visit our Certified Ethical Hacker topic page.
CEH v10 is appropriate today due to the constant progression of technology. Such continual developments mean illegal hackers are always finding new ways to carry out their activities, thus protection against these attacks is vital for the conversation of a business. Attacks can hit any company at any time, so preparation is crucial.
No prior certifications are required - this course is open to professionals that wish to become ethical hackers and cybersecurity experts
This official EC Council accredited Ethical Hacking course is primarily targeted at security professionals that want to acquire a well-rounded body of knowledge to enhance their employability prospects. Acquiring this Certified Ethical Hacking Certification means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organisations can rest assured that they have a candidate that is proficient and is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester.
This CEH course is invaluable due to its interactive but varied tuition style. Covering over 18 domains, students are exposed to business risks and the potential damage that can occur due to negligence or intrusion. Students will be able to make an informed decision regarding the amount of risk a company can face if it chooses to address a security concern.

Some of our clients

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."

Diane Gray, Shell


Back to top

Trustpilot

CISSP 2018 UPDATE
Now Available

Limited time offer to celebrate the launch
Click here or call 01344 203999 to find out more