Certified Ethical Hacker Training
Our Certified Ethical Hacker (CEH) training from EC-Council is the perfect way to get started in the world of ethical hacking. Our course covers everything you need to know to become a skilled and certified ethical hacker, including network security, hacking techniques, and information security management. With our training, you'll learn how to use the same tools and techniques as real hackers, but with the added benefit of being a trained and ethical professional.
Our CEH training stands out because of our expert instructors, hands-on approach, and comprehensive curriculum. Our instructors are experienced professionals who have worked in the field of ethical hacking for many years and bring a wealth of real-world knowledge to the classroom. Our hands-on approach ensures you have plenty of opportunities to practice the techniques you learn in class, allowing you to become confident in your abilities. And our comprehensive curriculum covers everything from the basics of hacking to advanced techniques, ensuring you're fully prepared for the CEH certification exam.
Whether you prefer full-time, part-time, or self-paced learning, we have a flexible format that caters to your schedule.
You can choose to attend our courses in person in a classroom setting, at your location or at our training venues in South Africa, or online through our cutting-edge virtual training platform. Our VILT (Virtual Instructor-Led Training) option offers the flexibility to join from anywhere, without compromising on the quality of instruction.
All our remote training programs are delivered in English and at times suitable to our students timezone.
Certified Ethical Hacker (CEH) Course Objectives:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography