Associated Courses

Windows Server 2016 Server Administration

Windows Server 2016 Active Directory and Group Policy

Advanced Network Practices

pdfCourse Outline


5 Days


£2500 per person


Delegates should have a good working knowledge of Windows Servers and TCP/IP as can be gained from our Windows 2016 Server Administration, and Advanced Network Practices courses. Delegates should also have a basic familiarity of Linux and/or Unix as can be gained from our Linux Essentials course.

Course tailoring service

Our tailoring service is a luxury you can afford, allowing you to combine elements of related courses producing a bespoke
solution, designed specifically to fulfil your training needs. Is there any better way to meet all of your training objectives and maximise your training ROI?

Kit supply

Running a course at your facilities might sound like a good idea until you start thinking about the practicalities of equipment usage and the
impact this could have on day to day business, so why not let us bring the necessary
equipment with us?

Certified Ethical Hacker v10

About the Course

The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The CEH exam is ANSI 17024 compliant adding credibility and value to credential members.

This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you in a "Hacker Mindset" in order to teach you how to think like a hacker and better defend against future attacks.

It puts you in the driver's seat with a hands-on training environment employing a systematic ethical hacking process.

You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the CEH v10 program.


About the course

Key issues plaguing the information security world, incident management process, and penetration testing

Various types of footprinting, footprinting tools, and countermeasures

Network scanning techniques and scanning countermeasures

Enumeration techniques and enumeration countermeasures

System hacking methodology, steganography, steganalysis attacks, and covering tracks

Different types of Trojans, Trojan analysis, and Trojan countermeasures

Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures

Packet sniffing techniques and how to defend against sniffing

Social Engineering techniques, identify theft, and social engineering countermeasures

DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures

Session hijacking techniques and countermeasures

Different types of webserver attacks, attack methodology, and countermeasures

Different types of web application attacks, web application hacking methodology, and countermeasures

SQL injection attacks and injection detection tools

Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools

Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools

Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures

Various cloud computing concepts, threats, attacks, and security techniques and tools

Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems

Different threats to IoT platforms and learn how to defend IoT devices securely

Course Modules

Introduction to Ethical Hacking

Footprinting and Reconnaissance

Scanning Networks


Vulnerability Analysis

System Hacking

Malware Threats


Social Engineering


Session Hijacking

Evading IDS, Firewalls, and Honeypots

Hacking Web Servers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Hacking Mobile Platforms

IoT Hacking

Cloud Computing