Save 64%
Bright Solutions Global PLC

Certified Ethical Hacker CEH V10 - EC Council Online

Bright Solutions Global PLC

Prefer to call the centre directly?

Important information

Typology Short course
Level Intermediate
Methodology Online
Class hours 40h
Duration Flexible
Online campus Yes
  • Short course
  • Intermediate
  • Online
  • 40h
  • Duration:
  • Online campus

CEH v10 Certified Ethical Hacker training certification course provide hands-on classroom training to help you master the same techniques that hackers use to penetrate network systems and leverage them ethically to protect your own infrastructure.

This extensive ethical hacking course focuses on 20 of the most popular security domains to provide a practical approach to essential security systems. You will learn to assess computer system security by using penetration testing techniques; scan, test and hack secure systems and applications, and gain hands-on experience with sniffing, phishing and exploitation tactics. This ethical hacking course will prepare you for the EC-Council Certified Ethical Hacker exam 312- 50.

To take into account

· What marks this course apart?

Exam Voucher included 40 hours of instructor-led training Accredited Training Partner (ATP) of EC-Council Tips and Tricks to clear CEH certification 6 months free access to CEHv10 iLabs Study Material(e-Kit) by EC Council Covers 20 current security domains and 340 attack technologies 12 month access to high-quality self-paced e-learning content curated by industry experts

Questions & Answers

Ask a question and other users will answer you

Achievements for this centre


How do you get the CUM LAUDE seal?

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 2 years

What you'll learn on the course

Ethical Hacking
Security Manager
Pen Testing
Penetration Testing
Secure networks

Teachers and trainers (1)

Bright Solutions
Bright Solutions

Course programme

  • Module 01- Introduction to Ethical Hacking
  • Module 02- Footprinting and Reconnaissance
  • Module 03- Scanning Networks
  • Module 04- Enumeration
  • Module 05- Vulnerability Analysis
  • Module 06- System Hacking
  • Module 07- Malware Threats
  • Module 08- Sniffing
  • Module 09- Social Engineering
  • Module 10- Denial-of-Service
  • Module 11- Session Hijacking

Compare to choose better:
See all