Home Courses CEH: Certified Ethical Hacker Course


CEH: Certified Ethical Hacker Course

Length: 5 Days    Cost: $4,250 + GST    Version: Certified Ethical Hacker

= Scheduled class    = Guaranteed to run    = Fully booked
Click on the dates to book online
Virtual Class -- -- -- --

Can't find a class in your area? Contact our sales team and request a class date.

About this Course

This CEHv11 class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student indepth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Exam Voucher included for redemption within 6 months of course.


This course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.


Networking experience
Some Linux experience is beneficial as Linux command line will be covered in the course
ICND1 or equivalent skills
Windows Server Experience
TCP/UDP/IP experience
Experience with virtual machines

At Course Completion

After attending this course:

  • Students are able to apply countermeasure to secure organization_s system against threats and attacks
  • Students are able to test the access to organizational data using ethical hacking techniques
  • Students are able to implement real-world hacking techniques to test the security of organization_s system
  • Students are able to employ complex tools to identify and analyze your company_s risks and weaknesses
  • Students are able to uncover vulnerabilities in a network infrastructure and determine appropriate countermeasures

Course Outline

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography

 Print this page