Ethical Hacking Course

EC-Council Certification

The EC-Council Certification program is the most desired security training course around. You will be provided with advanced hacking tools and techniques popular among the hackers.Earn ethical hacking degree after our ethical hacking course. 

After completing the training you will be a skilled professional who will use the same tools as a malicious hacker and find vulnerabilities in target systems. You will be certified in the specific network security discipline of Ethical Hacking.

Filters Sort results
Start date
Add to cart
5 Days
9th December 2019

Who should attend for Ethical Hacking Course

IT Professionals

IT professionals working as:

• Junior/Associate Network Engineer
• Support/Field Network Engineers
• Network Administrators

Career Changers

Career changers who are looking to start a Career in Cyber Security.

Aspiring to work in IT

Anyone hoping to gain a world-renowned certification in Cyber Security entry level roles.


Although anyone can take this course, it is a technical and requires:

  • Computer literacy
  • Knowledge of PC operating systems
  • Basic IP addressing skills
  • An understanding of network fundamentals
  • Basic IT infrastructure 


We strongly believe in classroom delivery and would present the course over 8 days, by a leading EC Council Trainer.

The certified ethical hacker course training is from 9.30am to 5.30pm every day, and you will be provided with courseware and labs to enable to you to practice during and after the course, until you are ready to complete your exam.


312-50 (ECC EXAM) is 4 hours long and consists of 125 multiple choice, multiple answer and in some instances simulation questions.

Other Courses

Ethical Hacking Course Overview

Introduction to Ethical Hacking

Overview of Current Security Trends

Understanding the Elements of Information Security

Understanding Information Security Threats and Attack Vectors

Overview of Hacking Concepts, Types, and Phases

Understanding Ethical Hacking Concepts and Scope

Footprinting and Reconnaissance

Understanding Footprinting Concepts

Foorprinting through Search Engines and Advanced Google Hacking Techniques

Footprinting through Web Services and Social Network Sites

Uderstanding Website Footprinting, Email Footprinting, and Competitive Intelligence

Understanding WHOISm DNSm and Network Footprinting

Scanning Networks

Understanding Network Scanning Concepts

Understanding various Scanning Tools

Understanding various Scanning Techniques

Understanding various Techniques to Scan Beyond IDS and Firewall

Understanding Banner Grabbing

Drawing Network Diagram


Understanding Enumeration Concepts

NetBIOS Enumeration

SNMP Enumeration

LDAP and NTP Enumeration

SMTP and DNS Enumeration

IPsec, VoIP, RPC, and Linux/Unix enumeration

Overview of Enumeration Pen Testing

Vulnerability Analysis

Overview of Vulnerability Research and Vulnerability Classification

Overview of Vulnerability Assessment

Vulnerability Management Life Cycle

Vulnerability Assessment Solutions

Vulnerability Assessment Tools

System Hacking

Overview of CEH Hacking Methodology

Understanding Techniques to Gain Access to the System

Understanding Privilege Escalation Techniques

Create and Maintain Remote Access to the System

Overview of Different Types of Rootkits

Overview of Steganography and Steganalysis Techniques

Malware Threats

Understanding Malware and Malware Propagation Techniques

Overview of Trojans, Their Types, and How they infect Systems

Overview of Computer Worms

Understanding the Malware Analysis Process

Understanding Different Techniques to Detect Malware

Understanding Different Malware Countermeasure


Overview of Sniffing Concepts

Understanding Various Sniffing Techniques

Overview of Various Sniffing Tools

Understanding Different Sniffing Countermeasure

Overview of Sniffing Penetration Testing

Social Engineering

Social Engineering Concepts

Social Engineering Techniques

Understanding Insider Threats

Impersonation on Social Networking Sites

Understanding Identity Theft

Social Engineering Countermeasures

Overview of Social Engineering Penetration Testing


Denial-of-Service (Dos) and Distributed Denial-of-Service (DDoS) Attacks

DoS/DDoS Attack Techniques

Botnet Network

Various DoS and DDoS Attack Tools

Different Techniques to Detect DoS and DDoS Attacks

DoS/DDoS Countermeasures

Overview of DoS Attack Penetration Testing

Session Hijacking

Session Hijacking Concepts (DDoS) Attacks

Application Level Session Hijacking

Network Level Session Hijacking

Session Hijacking Tools

Different Session Hijacking Countermeasures

DoS/DDoS Countermeasures

Hijacking Penetration Testing

Evading IDS, Firewall, and Honeypots

Understanding IDS, Firewall and Honeypot Concepts

Firewall and Honeypot Solutions

different Techniques to Bypass IDS

Techniques to Bypass Firewalls

IDS/Firewall Evading Tools

Techniques to Detect Honeypots

IDS/Firewall Evasion Countermeasures

Hacking Web Servers

Understanding Web Server Concepts

Understanding Web Server Attacks

Web Server Attack Methodology

Web Server Attack Tools

Web Server Attack Countermeasures

Patch management Concepts

Web Server Security Tools

Hacking Web Applications

Web Application Concepts

Web Application Threats

Web Application Hacking Methodology

Web Application Hacking Tools

Web Application Attack's Countermeasures

Find out more?

If you want to find out more please call us on 020 3965 1966, leave us a message through live chat (09.00 – 18.00) or fill out the form bellow. Our experienced career advisors will be able to answer your questions and explain our professional courses in more detail.