This website uses cookies. View our cookie policy
United Kingdom
Select regional store:
Certified Ethical Hacker (CEH) v9

Certified Ethical Hacker (CEH) Training Course

SKU: 4798

This fully accredited, practitioner-led training course equips you to plan and perform ethical hacking (penetration testing). Achieve an industry-recognised qualification in just one week.


Five days/London


See Course Agenda below for timetable.


Pass the Certified Ethical Hacker exam first time. Exam voucher included in the course.

How to Book:

Simply book online to receive your booking confirmation and full joining instructions within 48 hours. We accept purchase orders from local authorities, government departments and other public-sector organisations, and will consider account facilities for large corporate customers. See our payment options page for details.

Book today

Course Locations

Price: £1,950.00
ex vat
call to book via purchase order


Achieve your CEH qualification with IT Governance

Our Certified Ethical Hacker (CEH) courses are led by information security professionals who practice what they teach.

Aside from holding the necessary professional credentials, our trainers bring up-to-date industry knowledge and experience to enhance IT Governance’s CEH courses. Upon completion of the Certified Ethical Hacker (CEH) training course, attendees not only have the knowledge to pass the CEH exam but also enter the industry with hands-on experience.

Our training course delivers a comprehensive education in the attack strategies, tactics, technology, tools and motivations of hackers. We provide unique post-course support with online access to EC-Council iLabs for a period of six months.


What is a certified ethical hacker?

A certified ethical hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems, and uses the same knowledge and tools as those used by malicious hackers. Launched in 2003 by the EC-Council, the Certified Ethical Hacker (CEH) certification is globally recognised as the vendor-neutral qualification of choice for developing a senior career in penetration testing and digital forensics.

Our trainer is a London-based information security consultant with over ten years experience in leading CEH courses. He is approved by the EC-Council and focuses on making sure you have the skills necessary to make your break in the industry, improve your existing skills, or re-enforce your knowledge to be a successful Ethical Hacker.


This five-day classroom training course features:

  • Coverage of historical and current attack vectors to provide a well-rounded education.
  • Exposure to technologies and software tools and how they can be used in real-life scenarios.
  • Hands-on Hacking from day one to the end of the course.
  • Unique post-course support directly with your tutor to answer questions while you study for the exam.
  • Online access to EC-Council iLabs for 6 months to improve your skills and continue your Ethical Hacking education.


Course Agenda

Course Timetable:

  • Day 1: 10.00 – 17.30
  • Day 2: 09.00 – 17.30
  • Day 3: 09.00 – 17.30
  • Day 4: 09.00 – 17.30
  • Day 5: 09.00 – 16.00

What will you learn on this course?

  • Types of penetration testing, security audit, vulnerability assessment and testing roadmap.
  • Footprinting, footprinting tools and countermeasures.
  • Network scanning techniques and countermeasures.
  • Enumeration techniques and countermeasures.
  • System hacking methodology, steganography, steganalysis attacks and covering tracks.
  • Trojans, Trojan analysis and Trojan countermeasures.
  • Viruses, virus analysis, computer worms, malware analysis procedure and countermeasures.
  • Packet-sniffing techniques and how to defend against sniffing.
  • Social engineering techniques, identify theft and countermeasures.
  • DoS/DDoS attack techniques, botnets and attack tools.
  • Types of web server and web application attacks, attack methodology and countermeasures.
  • SQL injection attacks and injection detection tools.
  • Wireless hacking
  • Firewall, IDS and honeypot evasion techniques, evasion tools and countermeasures.
  • Current trends in information security and much more!

Customer Reviews

(0# of Ratings:)