The Knowledge Academy Logo
The Knowledge Academy Logo
01344 203999 - Available 24/7

Send us your message.


Certified Ethical Hacker V10

Key points about this course

Duration: 5 Days*

Accredited: Yes

Dates & Prices Enquire
  • The latest version of Certifed Ethical Hacker V10.
  • Prepare for and take the 4 Hour CEH Exam containing 125 multiple-choice questions.
  • Learn to assess the security of computer systems using penetration testing.

Available delivery methods for this course

Classroom Icon


Onsite Icon


Virtual Icon

Live Virtual

Course Information

Certified Ethical Hacker v10 Training Course Overview

As the world's largest cyber-security training provider, our proven interactive training methods, including live-hacks, ensure that your business's systems are secure, responsive, and impenetrable. Our market-leading EC-Council accredited course includes interactive lab testing environments and hands-on system deployments to fully equip skilled professionals to instinctively diagnose and overcome system weaknesses.

System hacks are becoming more and more frequent - hence the requirement for businesses to transform their security platforms has never been more paramount. This detailed, meticulous, and world-leading course educates Certified Ethical Hackers of how to enhance their structural capability, to protect against malicious intrusions. Upon the completion of this all-inclusive 5-day Certified Ethical Hacker course, professionals will be fully prepared to adapt vulnerable and weak systems into digital-forensic market leaders.

This Certified Ethical Hacker v10 course transmits the most up-to-date system protection information. CEH v10 is the updated version of CEH v10, hence it provides delegates with the most current and necessary material that allows them to secure against system intrusions and costly breaches. Individuals will be launched into the world of hacking, by applying mechanisms and methods used by illegal hackers for the enhancement of security.

CEH v10 will teach delegates about the different types of hacking, and how to implement ethical hacking techniques to prohibit the assaults of illegal hackers via unauthorised system infrastructures. Delegates will learn how to scan, test, hack, and defend their security systems from infiltration. In addition, individuals will learn about the five domains of ethical hacking, which act as a basis for their hacking.

Adopting the mentality of an illegal hacker is valuable in identifying weaknesses within security systems, as such a mindset will draw ethical hackers to the areas illegal hackers would target, these areas will be strengthened. Certified Ethical Hacker v10 is taught within an interactive environment to ensure delegates learn practical skills that they can apply to the workplace.

Certified Ethical Hacker V10 Course Outline​

Module 01: Introduction to Ethical Hacking

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards

Module 02: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through social Engineering
  • Footprinting Tools
  • Countermeasures
  • Footprinting Pen Testing

Module 03: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing

Module 04: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing

Module 05: Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

Module 06: System Hacking

  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Module 07: Malware Threats

  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing

Module 08: Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

Module 09: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing

Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Penetration Testing

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Penetration Testing

Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Countermeasures
  • Patch Management
  • Web Server Security Tools
  • Web Server Pen Testing

Module 14: Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Hacking Methodology
  • Web App Hacking Tools
  • Countermeasures
  • Web App Security Testing Tools
  • Web App Pen Testing

Module 15: SQL Injection Concepts

  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures

Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wireless Pen Testing

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Spyware
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

Module 18: IoT Hacking

  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • Countermeasures
  • IoT Pen Testing

Module 19: Cloud Computing

  • Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

Module 20: Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures

Who should attend this Ethical Hacking Training?

Certified Ethical Hacker v10 is designed for:

  • Security Officers
  • Security Professionals
  • Auditors, Site Administrators
  • Professionals involved in network infrastructure stability

Certified Ethical Hacker v10 Prerequisites

No prior certifications are required, but delegates will thrive if they possess experience or knowledge of:

  • Network Security Administration
  • MCSE (Microsoft Certified Systems Engineer)
  • CCNA (Cisco Certified Network Associate)


Certified Ethical Hacker uses hacking techniques to uncover weaknesses within security systems. These flaws are then improved upon to boost the strength of security processes, which in turn protects systems from vicious cyber attacks. For more information, visit our Certified Ethical Hacker topic page.
CEH v10 is appropriate today due to the constant progression of technology. Such continual developments mean illegal hackers are always finding new ways to carry out their activities, thus protection against these attacks is vital for the conversation of a business. Attacks can hit any company at any time, so preparation is crucial.
No prior certifications are required - this course is open to professionals that wish to become ethical hackers and cybersecurity experts
This official EC Council accredited Ethical Hacking course is primarily targeted at security professionals that want to acquire a well-rounded body of knowledge to enhance their employability prospects. Acquiring this Certified Ethical Hacking Certification means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organisations can rest assured that they have a candidate that is proficient and is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester.
This CEH course is invaluable due to its interactive but varied tuition style. Covering over 18 domains, students are exposed to business risks and the potential damage that can occur due to negligence or intrusion. Students will be able to make an informed decision regarding the amount of risk a company can face if it chooses to address a security concern.

What’s Included in this Ethical hacking Training?

  • The Certified Ethical Hacker V10 Exam Voucher
  • Certified Ethical Hacker v10 Study Guide
  • Certified Ethical Hacker V10 Course Materials
  • Experienced Instructor
  • Certificate on Completion
  • Refreshments

Certified Ethical Hacker Exam Information

Our interactive course ensures that delegates possess the required skills to pass the Official Certified Ethical Hacker Exam (312-50 VUE), available at any Pearson Vue Exam Centre of their choice. Our all-inclusive course fee includes the much sought-after exam voucher. The CEH v10 Exam consists of:

  • 125 Multiple Choice Questions
  • 4 Hours
  • 70% Pass Rate Required



Key points about this course

Duration: 5 Days*

Accredited: Yes

Dates & Prices Enquire

Upcoming classes

Related courses

Dates & Prices

Select your preferred delivery method

Choose a Region

Choose a Location

Choose a Month

Office Icon Attend your course from the office or home
Trainers Icon Interactive support from experienced trainers
Simple Icon Simple to setup and easy to use on any device

Complete the steps below to receive a quote or more information

How will you be funding your training?

Self funding

Company funding

Not sure

Key points about this course

Duration: 5 Days*

Accredited: Yes

Why choose TKA logo

Gold Tag

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

Trusted Icon

Trusted & Approved

The Knowledge Academy's Certified Ethical Hacker training courses are accredited by EC-Council

Delivery Icon

Various delivery methods

Flexible delivery methods are available depending on your learning style.

Resource Icon


Resources are included for a comprehensive learning experience.

Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

Google Logo
Samsung Logo
Shell Logo

"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."

Diane Gray, Shell


Super spring sales now on!