EC-Council Certified Ethical Hacker Security Training Course

Skills covered:


The Certified Ethical Hacker five day course will teach offensive tactics and also defensive countermeasures. This ensures that the CEH professional can have an holistic security perspective of the organisation. During the course you will learn security checklists that will help you audit your organisation's information assets; you will learn which tools will help check for vulnerabilities that can be exploited and above all a methodology to assess the security posture of your organisation by doing a penetration test against it. You will acquire knowledge that has practical value to make your work place a more secure and efficient one. Please note there are strict conditions applied to attendance at the EC-Council Certified Ethical Hacking courses. On the first day of the course, students are required to sign a Liability Agreement form. A copy of this form and relevant links may be found here. Prior to attempting an EC-Council exam, candidates are required to agree to EC-Council Certification Agreement terms and the EC-Council Non-Disclosure Agreement. Candidates should not attempt the exam unless they have read, understood and accepted the terms and conditions in full. By attempting the exam, the candidates signify the acceptance of the EC-Council Candidate Certification Agreement terms. In the event that the candidate does not accept the terms of the agreement, he/she is not authorized by EC-Council to attempt any of its certification exams.  The Certified Ethical Hacker course includes the exam voucher for the CEH certification. The exam voucher must be redeemed within six months of attending the CEH course at DDLS.


This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process.

You will be taught the five phases of Ethical Hacking :

  • Reconnaissance,
  • Gaining Access,
  • Enumeration,
  • Maintaining Access,  and
  • Covering your tracks.


This security training course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

We can also deliver and customise this training course for larger groups saving your organisation time, money and resources. For more information, please make a note when you enquire.


  • Networking experience
  • Some Linux experience is beneficial as Linux command line will be covered in the course
  • Windows Server Experience
  • TCP/UDP/IP experience
  • Experience with virtual machines


  • Introduction to Ethical Hacking
  • Footprinting and reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Cloud Computing
  • Cryptography

Training provider

Teaching mode: Classroom - Instructor Led
Duration: 5 days
Gooroo has partnered with the global leaders in IT training to give you access to quality training, personalised to you, targeted at increasing your job opportunities and salary.

Our pricing

We do not display pricing as Gooroo members qualify for special discounts not available elsewhere. You must enquire through Gooroo to get this benefit.

New courses are happening all the time

Our partner's expert training consultant will provide you with the times and all the details you need. Enquire today.

Top skills covered in this course

White hat
This skill has an average salary of
and is mentioned in
of job ads.