Certified Ethical Hacker (CEH) Training Course

Provided by

Enquire about this course




Training course outline"

In this course, you will gain all the knowledge and skills needed to pass the CEH v12 and CEH v12 Practical exams to then gain CEH Master status.

The CEH Training Course is delivered by our expert instructors (rated world class) in just five intensive days, focusing on the key areas required by industry to pass the theoretical and practical exams.

You will reinforce your learning with practical exercises on the online EC-Council iLabs and further develop your real-world experience with our unique battle labs."

Why is CEH (Certified Ethical Hacker) important?

CEH is a widely recognised ethical hacking qualification that was introduced in 2003. It is regularly updated, and the latest version (CEH v12) covers Parrot OS, enhanced Cloud security, IoT threats, operational technology attacks and fileless malware.

Awarded by the EC-Council, CEH is globally recognised as a foundation qualification for anyone who wishes to develop a career as a penetration tester, SOC (security operations centre) team member or cyber security analyst."

CEH also provides an essential up-to-date understanding of cyber threats, vulnerabilities and countermeasures for every technical cyber security professional."

CEH is accredited by the NCSC Certified Training scheme as a Courseware-level qualification that supports the career and skills development of UK cyber security professionals."

The average salary for UK jobs requiring CEH certification in 2023 is £45,000 per annum (source: itjobswatch.co.uk ).

Our unique five-day intensive CEH Training Course"

Our course is designed to deliver learning in just five days. It is delivered by instructors rated world class, building skills through both theory and hands-on practical labs.

All the key content required to pass the theory exam is covered. The highly interactive delivery includes discussions, Q&As, labs and practice questions.

After the course, you can continue to build your skills with our battle labs to get you ready to sit the CEH Practical exam to become a CEH Master.

Become a CEH Master with CEH Elite v12 training"

This course is based on the CEH Elite v12 package that features a Learn, Certify, Engage and Compete approach."

  • Learn - instructor-led training and digital courseware on 20 subject modules, each with extensive hands-on exercises featuring software tools hosted on iLabs.
  • Certify - intensive exam preparation to help you pass the CEH and CEH Practical exams on the first attempt and achieve the highly valued CEH Master certification.
  • Engage - develop real-world experience using emulated ethical hacking engagements in a controlled online practice environment.
  • Compete - EH Global Challenges delivered every month after the course to provide 'capture-the-flag'-style competitions that introduce new technologies and platforms such as web applications, OT, IoT, SCADA, ICS systems and Cloud environments.


  • Learn the basic skills with iLabs"

    A key element of the course is the practical online labs (iLabs) that support learning and skills- building with more than 220 exercises and access to more than 3,500 software hacking tools.

    Aligned with subject modules, the exercises provide the opportunity to safely practise every learning objective on live virtual machines with fully patched operating systems. Access to iLabs for six months after the course allows learners to continue to practise, and test and use the software tools."

    Build your red and blue team skills with battle labs"

    Our unique battle labs will provide you with a unique interactive opportunity to apply and develop your skills to attack or defend an organisation."

    Choose to join a red team and play the role of an attacker by finding and exploiting vulnerabilities. Or choose to be in a blue team to defend against the attacks and respond to the incidents as they happen."

    Delivered quarterly, our battle labs use the EC-Council CyberQ cyber range platform to offer the following challenges, in which you can participate in as either an attacker or a defender:"

  • ArbFile - Attempt to gain administrative access and exploit vulnerabilities in web applications and services, or to prevent such attacks.
  • Attentive - This 'pwn the target' challenge uses reverse shell exploits, privilege escalation and password cracking.
  • Zig - This challenge uses unauthenticated RCE (remote code execution), ZIP password cracking and red team methodologies.
  • SWAT - Attempt to identify and exploit the flaws in the services and systems of a Microsoft Windows network and Windows 10 client machine, or to prevent such attacks.


  • Course features

    Expert instructor-led tuition"

    Five days of intensive training on twenty CEH subject modules together with group discussions, Q&A sessions and hands-on exercises."

    Practical learning with iLabs"

    Reinforce your knowledge and practise your skills during and after the course using online iLabs that support more than 220 exercises and host more than 3,500 software hacking tools."

    Test and demonstrate your skills"

    Apply your new skills and engage in an emulated four-phase ethical hacking exercise with vulnerability assessment, gaining access, and exploits of web and mobile applications."

    Develop real-world experience with unique battle labs"

    Join a red team and participate in our custom-built simulated 'capture-the-flag' battle labs that reproduce the challenges of attacking a real organisation. ."

    First-time exam pass strategy"

    Extensive final exam preparation focused on the best strategy to pass the CEH v12 exam and prepare for the challenging CEH Practical exam."

    Exam pass guarantee

    We are confident you will pass the CEH exam on your first attempt. If you don't, we will train you again for free and offer you an unlimited number of CEH exam retakes, with a maximum of four exam retakes per year allowed. T&Cs apply ."

    Who should attend this course?

    This course is suitable for IT professionals who are working towards or have already achieved a position such as:"

  • Cyber security manager
  • Information security manager
  • Information security auditor
  • Cyber security auditor
  • Security administrator
  • Infosec administrator
  • IT security administrator
  • Cyber defence analyst
  • Vulnerability assessment analyst"


  • Information security analyst
  • Cyber security analyst - levels 1-3
  • Network security engineer
  • SOC security analyst
  • SOC analyst
  • Network engineer
  • Senior security consultant
  • Solutions architect"


  • See what our previous learners think about this course

    8/10

    would recommend this course to a friend or colleague

    100%

    found the course content met their expectations

    Michael was excellent, his vast experience made the course very engaging and demonstrated the real world application. While this course was delivered via webex, I found it worked very well and didn't detract from the learning - it was very good and I think Michael did a cracking job delivering it like this.

    - Matt Ball, Consultant, WPM Education

    Michael was thorough, helpful and very attentive to our queries and need for information. He was very helpful with the course materials too. I couldn't have wanted a better trainer!

    - Naiya, Information Security Compliance Manager

    Course delivery was excellent. Instructor method of personal slides followed by using the iLabs was very effective as I already had performed the demos and had better understanding before even using iLabs. If I had just jumped into using the iLabs without the instructor interaction I would have learnt less from the Course. I am very happy that we did not learn this course in parrot fashion. Thanks for the course, Michael.

    - Anonymous

    Really enjoyed the course. The trainer was lovely and provided relevant examples that made learning a lot easier

    - Sharmeen, Senior Compliance Manager

    Michael is a very engaging trainer, full of knowledge and made the course enjoyable through interaction and sharing his experiences.

    - Joanne Coveney, Test Consultant, Paramount Testing

    It was a great experience with Michael. His knowledge of the material is impressive. I would definitely love to take another class with him. Highly recommend.

    - Oluyemi Abayomi Farinde, IT Helpdesk, NPDC (Nigerian Petroleum Development Company)

    Michael is a great tutor, very informative and goes the extra mile when giving content to his students.

    - Aaron Penfold, Full time Student

    I felt the delivery of the course was excellent and engaging, no death by power point. The trainer was very knowledgeable, and I prefer an interactive off the book approach to the standard 1-1 delivery.

    - Anonymous

    Who should attend this course?"

    This course is suitable for IT professionals who are working towards or have already achieved a position such as:"

  • Cyber security manager
  • Information security manager
  • Information security auditor
  • Cyber security auditor
  • Security administrator
  • Information security administrator
  • IT security administrator
  • Cyber defence analyst
  • Vulnerability assessment analyst"


  • Information security analyst
  • Cyber security analyst - levels 1-3
  • Network security engineer
  • SOC security analyst
  • SOC analyst
  • Network engineer
  • Senior security consultant
  • Solutions architect"


  • Your Learning Path

    Find out how the CEH Training Course will help you start or enhance your career and boost your knowledge.

    This course is an essential component of the following learning path:

  • Cyber Security roles


  • ×

    Why choose IT Governance for your training needs?

  • We are the global specialists"- As global specialists in information security, cyber security and privacy, we pride ourselves on being market leaders and keeping one step ahead. Our expert instructors use their working knowledge to bring the course content to life, while covering all the essential and technical content.
  • Built and delivered by experts"- Our courses are built and delivered by subject-matter experts and innovative instructional design specialists with years of practical, hands-on experience.
  • Learn your way"- We have the training methods and solutions to suit your business or personal learning style. We offer instructor-led (classroom, Live Online or hybrid), blended, self-paced, elearning, in-house and bespoke training options.
  • Our service levels are exemplary"- From the sales team that pays close attention to your development needs, to the operations team that makes things tick like a Swiss watch, to the energy and skill of the instructors. We are all passionate about what we do and want to
  • Enquire

    Start date Location / delivery
    No fixed date United Kingdom Book now

    Related article

    At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...