Training course outline
This training course will give you a detailed understanding of ethical hacking phases, attack vectors and preventive countermeasures. You will learn how criminal hackers think and act so that you can advise on how to set up an effective security infrastructure and defend against attacks.
CEH is a widely recognised ethical hacking qualification that was introduced in 2003. It is regularly updated, and the latest version (CEH v11) covers Parrot OS, enhanced Cloud security, IoT threats, operational technology attacks and fileless malware.
With this course, you will have access to:
labs that mimic real scenarios
months' access to EC-Council iLabs
COVID-19: remote delivery options
We would like to reassure our clients that all training courses will go ahead as scheduled during COVID-19. Our classroom/Live Online delivery option enables you to attend either in person or online. Please also refer to our COVID-19 policy.
Certified Ethical Hacker (CEH) Training Course benefits
Become a master in ethical hacking
Learn the tools and techniques required to become an ethical hacker, and improve your knowledge of risks and vulnerabilities.
Delivered by professionals
Delivered by an information security professional with extensive industry experience.
Learn to identify, assess and mitigate risks posed by various types of attacks through hands-on study of vulnerabilities and exploitation techniques.
Malicious hacker insight
Understand the mindset of a cyber criminal and learn how to defend your organisation.
Advance your career
Gain the necessary skills and knowledge to perform ethical hacking tasks.
In-depth and thought-provoking
Increase your knowledge of cyber security risks and vulnerabilities.
Learn from anywhere
Choose whether you attend Live Online or in person at one of our training venues throughout the UK.
See what our previous learners think about this course
would recommend this course to a friend or colleague
found the course content met their expectations
“Michael was excellent, his vast experience made the course very engaging and demonstrated the real world application. While this course was delivered via webex, I found it worked very well and didn't detract from the learning - it was very good and I think Michael did a cracking job delivering it like this.”
- Matt Ball, Consultant, WPM Education
“Michael was thorough, helpful and very attentive to our queries and need for information. He was very helpful with the course materials too. I couldn't have wanted a better trainer!”
- Naiya, Information Security Compliance Manager
“Course delivery was excellent. Instructor method of personal slides followed by using the iLabs was very effective as I already had performed the demos and had better understanding before even using iLabs. If I had just jumped into using the iLabs without the instructor interaction I would have learnt less from the Course. I am very happy that we did not learn this course in parrot fashion. Thanks for the course, Michael.”
“Really enjoyed the course. The trainer was lovely and provided relevant examples that made learning a lot easier”
- Sharmeen, Senior Compliance Manager
“Michael is a very engaging trainer, full of knowledge and made the course enjoyable through interaction and sharing his experiences.”
- Joanne Coveney, Test Consultant, Paramount Testing
“It was a great experience with Michael. His knowledge of the material is impressive. I would definitely love to take another class with him. Highly recommend.”
- Oluyemi Abayomi Farinde, IT Helpdesk, NPDC (Nigerian Petroleum Development Company)
“Michael is a great tutor, very informative and goes the extra mile when giving content to his students.”
- Aaron Penfold, Full time Student
“I felt the delivery of the course was excellent and engaging, no death by power point. The trainer was very knowledgeable, and I prefer an interactive off the book approach to the standard 1-1 delivery.”
Who should attend this training course?
The CEH training course is ideal for people who work in the field of information security, or who are looking to start a career in this field. The course is also beneficial for those who want to learn more about ethical hacking and how to protect their organisation from cyber attacks.
Your learning path
Find out how the Certified Ethical Hacker (CEH) Training Course will help you start or enhance your knowledge and career.
This course is an essential component of the following learning path:
Why choose IT Governance for your training needs?
* Terms and conditions apply.
What does this training course cover?
What’s included in this course?
What equipment do I need?
You will need a laptop for the duration of your course. Please make sure your computer has:
Course duration and times
Day 1: 10:00am – 5:00pm
Day 2: 9:00am – 5:30pm
Day 3: 9:00am – 5:30pm
Day 4: 9:00am – 5:30pm
Day 5: 9:00am – 4:30pm
Are there any prerequisites for this course?
Before taking this course, we recommend that participants have:
Candidates are only eligible to take the EC-Council CEH exam once they have completed the course.
Exams and qualifications
Certified Ethical Hacker (CEH) exam
The exam consists of 125 multiple-choice questions that must be completed in four hours.
All course attendees receive an exam voucher that allows them to sit the CEH (312-50 (ECC EXAM), 312-50 (VUE)) exam. Please note that the cost of the exam voucher is included in the course purchase price.
The exam voucher is valid for one year from the date of receipt. Candidates may take this exam either at an ECC Exam Centre or Pearson VUE centre.
Your access to the EC-Council iLabs will be given to you during the course and will be available for six months after the course.
This course is equivalent to:
What qualifications will I receive?
This course provides you with the internationally recognised EC Council Certified Ethical Hacker certification.
How will I receive my exam results and certificates?
Can exams be retaken?
Yes, if you are unsuccessful on the first attempt, we will train you again for free. You can then retake the exam for an additional fee. Exam retake requests can only be purchased by contacting