Add to basket or enquireEnquire now
On this five day course you’ll learn the tools and techniques used to compromise networks, systems, applications, and people to gain, maintain, and exploit vulnerabilities so you can mitigate them before someone else does.
The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. As the EC Council puts it, "To beat a hacker, you need to think like a hacker".
This course will immerse the delegate into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organisation must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organisation; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
The CEHv10 course is now accredited under the GCHQ Certified Training (GCT) Scheme.
Our Certified Ethical Hacker course is available at our training centre in The Shard, London and will run over five consecutive days. Lunch and refreshments will be provided throughout the week. We also offer private training at a location of your choice or via Virtual Classroom.
Who is this course for?
This course benefits security professionals, site administrators, and anyone who is concerned about or interested in the integrity of the network and system infrastructure.
If you are interested in becoming or understanding ethical hacking, this course this is the course for you. You will be taught the methodology used by professional hackers and gain hands-on experience in identifying and exploiting IT security threats.
In one word: An ability to “think out of the box.” While an in-depth knowledge of TCP/IP, OSes, and applications is helpful, our approach is to teach you the basics as we explain the hacks.
Delegates will need to bring a laptop in order to participate in the lab exercises that form a large part of the course. Technically any laptop (Windows, macOS, Linux) with a browser and a WiFi connection can be used. However, for the best experience, we recommend a laptop configuration that includes an i5 processor or higher, at least 16Gb of RAM, and an ethernet adapter.
Walk away with the ability to:
- Understand hacking terminology and mindset of hackers
- Master the methodology used by professional hackers
- Identify the risks faced by organisations on a day to day basis
- Identify the services, vulnerabilities, and exploits on target systems and understand the threats to your organisation.
Questions and answers
Rating and reviews
There haven't been any reviews for this course yet.Leave a review
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.