ITIL® 4 Managing Professional Transition Module (MPT) Retires June 2022 | 30% OFF RRP On All Virtual Classroom Dates Learn more

Certified Ethical Hacker (CEH) Training Course

The Most Comprehensive Ethical Hacking Course In The World


Our 5-day Certified Ethical Hacker (CEH) fully accredited, practitioner-led training course equips you to plan and perform Ethical Hacking (penetration testing). You can now achieve this industry-recognised qualification in just one week.

This course is provided by IT Governance in cooperation with the EC council.

Please Note

You can book this course and hold it in credit until you have decided on a specific course date. Alternatively, please view our other course dates.
Exam Included
5 Days
£1995Excl. VAT

Course Outline

  • Types of penetration testing, security audit, vulnerability assessment and testing roadmap.
  • Footprinting, footprinting tools and countermeasures.
  • Network scanning techniques and countermeasures.
  • Enumeration techniques and countermeasures.
  • System hacking methodology, steganography, steganalysis attacks and covering tracks.
  • Trojans, Trojan analysis and Trojan countermeasures.
  • Viruses, virus analysis, computer worms, malware analysis procedure and countermeasures.
  • Packet-sniffing techniques and how to defend against sniffing.
  • Social engineering techniques, identify theft and countermeasures.
  • DoS/DDoS attack techniques, botnets and attack tools.
  • Session hijacking techniques and countermeasures.
  • Types of web server and web application attacks, attack methodology and countermeasures.
  • SQL injection attacks and injection detection tools.
  • Wireless encryption, wireless hacking methodology and wireless hacking tools.
  • Mobile platform attack vectors, Android vulnerabilities, jailbreaking iOS, Windows 8 mobile vulnerabilities, mobile security guidelines, and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools and countermeasures.
  • Cloud computing concepts, threats, attacks, security techniques and tools.
  • Cryptography ciphers, public key infrastructure (PKI), cryptography attacks and cryptanalysis tools.


      Ethical Hacking or penetration testing refers to the exploitation of an IT system with the permission of its owner in order to determine its vulnerabilities. It results in recommendations for preventive and corrective countermeasures to mitigate the risk of cyber attacks.

      A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems, and uses the same knowledge and tools as those used by malicious hackers. Launched in 2003 by the EC-Council, the Certified Ethical Hacker (CEH) certification is globally recognised as the vendor-neutral qualification of choice for developing a senior career in penetration testing and Digital Forensics.

      About the Course

      Our Certified Ethical Hacker (CEH) training session is delivered by an approved EC-Council tutor and experienced penetration tester features:

      • Practical hands-on training which introduces the five essential testing phases: Reconnaissance, Gaining Access, Enumeration, Maintaining Access and Avoiding Detection.
      • Complete coverage of the CEH syllabus, which covers over 270 commonly used attack technologies and software tools, and demonstrates how they can be used in real-life scenarios.
      • Access to the EC-Council iLabs, which allows students to practise their skills in a safe and fully functional network at any time. This consists of a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts.
      • Unique post-course support with online access to EC-Council iLabs for a period of 6 months.

      Who Should Attend

      The Certified Ethical Hacker training course will significantly benefit Security Officers, Auditors, Security Professionals, Site Administrators and anyone who is concerned about the integrity of network infrastructure. It is an ideal first qualification for building a career as a penetration testing or Digital Forensics Professional.

      Materials Provided

      • Professional Training Venue With Refreshments
      • Comprehensive Documentation
      • Certified Ethical Hacker (ANSI) Exam Voucher
      • 6-Months Access To EC-Council iLabs.
      • Certificate Of Attendance

      Organisational Benefits

      It Can Protect Your Business From Data Breach Fines – The biggest advantage is that you can provide comprehensive protection from data breach fines being imposed on your business.

      Protect Personal Info – One of the most valuable commodities in the digital age is personal information. If a cyber criminal is able to obtain personal information regarding your employees or customers, they are quite capable of selling that information on, or even using it to steal their money.

      Allows Employees to Work Safely – Without the best cyber security systems for your business, you and your employees are constantly at risk from a potential cyber-attack. If your system, or even individual computers, become infected than that can really hamper their productivity and even force you to replace computers.

      Inspire Confidence in Your Customers! – If you can prove that your business is effectively protected against all kinds of cyber threats, then you can inspire trust in your customers and clients. They will then feel more confident when purchasing your products or making the most of your services.

      Individual Benefits

      Thinking Like A Hacker – The CEH course gives IT professionals a glimpse into the mindset of a typical hacker. The focus of an IT professional is always on keeping bad guys out and maintaining secure systems. Over time, many IT pros develop a reactionary mindset. Battling with the bad guys will always involve reacting to threats and events as they occur, but it’s far more valuable and powerful to understand how the bad guys think and to be able to anticipate their moves. By learning the hacker mindset, you’ll be able to take a more proactive approach and see beyond current security tools and policies to know where and how an attacker might try to gain access to your network.

      Learning How Exploits Evolve – Besides demonstrating the hacker mindset, the CEH course also provides valuable insight into the entire life cycle of an exploit. For many security professionals, the way exploits evolve to take advantage of vulnerabilities is a mystery. While security pros are trained to prevent and respond to known vulnerabilities, little attention is paid to the life cycle of the exploit itself, from its conception to its destructive use in the real world. The level of insight gained by becoming a CEH allows you to look at exploits and vulnerabilities objectively and to spot potential attack vectors and weaknesses before the hackers do.

      Learning About Tools Of The Trade – Another overlooked benefit of the CEH certification is the amount of knowledge you can get regarding the tools of the hacker trade. While most IT pros have experience with at least some of the tools used by a CEH, they often lack the in-depth knowledge that’s required to use these tools for criminal purposes. Learning how malicious attackers use various tools allows you to better secure your networks, applications, and other assets.


      You are expected to have a minimum of 2 years’ working experience of IT networks and systems. While there are no prerequisite qualifications, Microsoft MCSE or CCNA equivalent knowledge is highly recommended.

      As the course offers a number of practical labs for hands on practice, you are required to bring your personal electronic device to the course. Laptops are recommended as tablets cannot support full functionality and access to the online labs and exercises. Further details and advance information will be provided prior to attendance on the course.


      There is no prereading associated with this training session.

      Exam Overview

      Certified Ethical Hacker (CEH) Examination:

      You are provided with an examination voucher that allows you to sit the Certified Ethical Hacker (312-50 VUE) examination at any Pearson VUE exam centre in the UK after the course.

      This exam consists of 125 multiple-choice questions which be must completed in a 4-hour time period. Please note that the cost of the exam voucher is included in the purchase price of the course.

      Exam Type

      Prometric Exam

      Professional Development Units - PDUs

      There are no Professional Qualification Credits associated with this training session.


      Certified Ethical Hacker (CEH) Certificate

      Next Steps

      Our Certified Information Systems certificates have emerged as key qualifications for Security Professionals. More and more organisations are demanding experienced Information Security Professionals with the qualifications to prove that you can protect their valuable information and assets. It is the ideal time to achieve and maintain up to date qualifications. Purple Griffon currently offer the following Certified Information Systems classroom-based training courses:


      Ethical Hacking is a profession that is becoming popular. Our Certified Ethical Hacker (CEH) training course will get you certified and you will be able to hack or enter in the systems of organisations to determine the problems of the security network and find suitable solutions. You will become a Certified Hacking Professional.

      Certified Ethical Hacker (CEH) Course Dates

      Course Filter

      DD/MM/YYY - e.g. 31/12/2015
      Showing 1 to 5 of 6 Total Course Dates.
      Course Date

      Certified Ethical Hacker (CEH)

      Course Date

      Certified Ethical Hacker (CEH)

      Course Date

      Certified Ethical Hacker (CEH)

      Course Date

      Certified Ethical Hacker (CEH)

      Course Date

      Certified Ethical Hacker (CEH)

      Scroll Table to View Content