This website uses cookies. View our cookie policy
Close
United Kingdom
Select regional store:

Ethical Hacking

 

What is ethical hacking?

Ethical hacking or penetration testing refers to the exploitation of an IT system with the permission of its owner in order to determine its vulnerabilities and weaknesses. It is an essential process of testing and validating an organisation’s information security measures and maturity. The results of ethical hacking are typically used to recommend preventive and corrective countermeasures that mitigate the risk of a cyber attack.

An ethical hacker is an individual who is trusted to attempt to penetrate an organisation’s networks and/or computer systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner.


Attacking and defending

Protecting current systems and networks requires a broad understanding of attack strategies, and in-depth knowledge of the hacker’s tactics, tools and motivations. Effective ethical hacking is based on knowledge of the system network, equipment, user interaction, policies, procedures, physical security and business culture. The increasing use of social engineering attack methodologies demands that every tester is also aware of the organisation and habits of its IT users (staff).


EC-Council

The International Council of E-Commerce Consultants (EC-Council) is a member-based organisation that certifies individuals in various e-business and information security skills. It is the owner and creator of the renowned Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/Licensed Penetration Tester (LPT) certification, as well as many other certification schemes, that are offered in more than 87 countries globally.

IT Governance Ltd is an EC-Council Accredited Training Center (ATC) and provides the best instructor-led exam preparation experience possible for the Certified Ethical Hacker (CEH) qualification.


Certified Ethical Hacker (CEH) qualification

Launched in 2003 by the EC-Council, the Certified Ethical Hacker (CEH) qualification is globally recognised as the vendor-neutral credential of choice for developing a senior career as an ethical hacker or penetration tester.

The purpose of the CEH credential is to:

  1. Establish and govern minimum standards for qualifying professional information security specialists in ethical hacking measures;
  2. Inform the public that credentialed individuals meet or exceed the minimum standards; and
  3. Reinforce ethical hacking as a unique and self-regulating profession.

How to become a Certified Ethical Hacker (CEH)

To achieve Certified Ethical Hacker qualification, we recommend the following steps:

  • Attend our approved Certified Ethical Hacker (CEH) classroom training course
  • Pass the official CEH Exam which consists of 125 multiple-choice questions, and is taken at any Pearson VUE exam centre in the UK.

Certified Ethical Hacker (CEH) Course

Certified Ethical Hacker (CEH) Course 

This fully accredited, practitioner-led training course equips you with the skills to plan and perform ethical hacking (penetration testing) at an advanced level.

Taught by an information security professional, you can achieve an industry-recognised qualification in just 5 days with this practitioner-led course.

Find out more


Certified Ethical Hacker (CEH) Training Course and CEH Practical Exam

Certified Ethical Hacker (CEH) Training Course and CEH Practical Exam – Combination Package

Get into the mindset of a criminal hacker with this five-day CEH (Certified Ethical Hacker) training course. This combination course will equip you with ethical hacking skills, and improve your knowledge of risks and vulnerabilities.

Achieve the internationally recognised Certified Ethical Hacker certification and CEH Practical. The exam voucher is included in the course, but the exam is taken in your own time. 

Find out more

Discover our range of penetration testing services

IT Governance’s services have been developed to align with your business requirements, your budget and the value of the assets you intend to test. Our level 1 penetration tests are suitable for organisations that want to identify the common exploitable weaknesses targeted by opportunistic attackers using freely available, automated attack tools.

For those with more complex objectives, or that require a more detailed exploration of complex or sensitive environments, our Technical Services team can provide additional expertise. Contact us to talk to one of our consultants.