CEH: Certified Ethical Hacker Course

Length: 2 Day(s)     Cost:$4250 + GST

= Scheduled class     = Guaranteed to run     = Fully booked

Please wait as we are loading the schedules...
LOCATION September October November December
Auckland
Hamilton
Christchurch
Wellington
Virtual Class

This CEHv11 class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student indepth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Exam Voucher included for redemption within 6 months of course.


This course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

Networking experience
Some Linux experience is beneficial as Linux command line will be covered in the course
ICND1 or equivalent skills
Windows Server Experience
TCP/UDP/IP experience
Experience with virtual machines


  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography