Course overview
On this five day course you’ll learn the tools and techniques used to compromise networks, systems, applications, and people to gain, maintain, and exploit vulnerabilities so you can mitigate them before someone else does.
The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. As the EC Council puts it, “To beat a hacker, you need to think like a hacker”.
This course will immerse the delegate into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organisation must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organisation; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
The CEHv10 course is now accredited under the GCHQ Certified Training (GCT) Scheme.
Our Certified Ethical Hacker course is available at our training centre in The Shard, London and will run over five consecutive days. Lunch and refreshments will be provided throughout the week. We also offer private training at a location of your choice or via a virtual classroom.
Campus locations
What you'll learn
Upon completion of this course, you will walk away with the ability to:
- Understand hacking terminology and mindset of hackers
- Master the methodology used by professional hackers
- Identify the risks faced by organisations on a day to day basis
- Identify the services, vulnerabilities, and exploits on target systems and understand the threats to your organisation
- Be able to demonstrate real-world threats to decision-makers and offer mitigating strategies to improve overall IT security in your organisation and beyond
You will achieve this through our lectures, real-world examples, discussions, and demonstrations. Additionally, you will be able to practice your skills in a sandboxed environment for six-months using the CEH iLabs.
The CEH iLabs is a cloud-based system providing delegates 24/7 access to virtual machines preconfigured with vulnerabilities, exploits, tools, and scripts to try, perfect, and master your newly acquired hacking skills during the course, during revision, and after certification.
Study method
- In-class
- Blended
- Online
Locations
- England
- London

coursesonline.co.uk customers are now eligible to apply for an XO Student Discount Card.
Enrol in a course today to unlock exclusive deals.
Duration study load
- 5 days
Entry requirements
In one word: An ability to “think out of the box.” While an in-depth knowledge of TCP/IP, OSes, and applications is helpful, our approach is to teach you the basics as we explain the hacks. Assuming delegates have a basic understanding of computing, we feel anyone can learn to hack and we take the time and effort to assure your success.
Delegates will need to bring a laptop in order to participate in the lab exercises that form a large part of the course. Technically any laptop (Windows, macOS, Linux) with a browser and a WiFi connection can be used. However, for the best experience, we recommend a laptop configuration that includes an i5 processor or higher, at least 16Gb of RAM, and an ethernet adapter. Full configuration rights to your browser are necessary so please check with your IT departments to be sure you are able to modify your browser if necessary. Please contact us should you have any enquiries:
Delegates will be given access to the EC Council CEHv10 course material and iLabs the first day of the course.
Assessment
Our course includes a CEHv10 (ANSI) Pearson Vue exam voucher, allowing you to arrange your exam after sufficient revision. During your revision, you continue to have direct access to your instructor.
- Exam Title: CEHv10 (ANSI)
- Language: English
- Number of Questions: 125
- Passing Score: 70%
- Test Duration: 4 hours
- Test Format: Multiple Choice
Who's it for?
This course benefits security professionals, site administrators, and anyone who is concerned about or interested in the integrity of the network and system infrastructure.
If you are interested in becoming or understanding ethical hacking, this course this is the course for you. You will be taught the methodology used by professional hackers and gain hands-on experience in identifying and exploiting IT security threats.
Subjects
About Jellyfish Training
Jellyfish is your digital partner. We support and drive digital transformation by providing the right technology, strategy, and training.
Jellyfish Training offer a range of delivery formats to suit all needs. Groups can be of any size, from private team sessions, multi-day workshops for entire organisations, 1-2-1s or even remote/online training catering for teams in different locations, we will be able to create something to suit.
Why Jellyfish Training?
- Industry recognised courses designed and run by experienced
- Professionals who are practitioners in their field
- Global training offering
- Suitable for groups of any size
- Delivered face-to-face, or online
- Google Cloud training partner
- Google Marketing Platform Certified Partner
- LinkedIn virtual course badge
- Corporate packages available
- Special rates for non-profit organisations
- CPD-approved courses
We look forward to teaching you soon.