Skip to main content

Certified Cybersecurity Technician

Certified Ethical Hacker (CEH) is a globally recognised certificate developed by EC-Council, aimed at those wanting to develop or prove their knowledge of a wide range of cyber security topics.


The current version (v13) includes over 550 attack techniques and builds on earlier iterations by incorporating material on AI.


The course balances structured online or classroom learning (with our lead instructor Cary Hendricks) with practical experience via more than 200 hands-on labs.

Who Is It For?

Certified Ethical Hacker is aimed at those who already have some cyber security knowledge and experience and would like to further develop those skills, or those with a firm grasp of many cyber security topics who would like to prove those skills with certification.


It is useful for both red and blue team professionals, to support them in developing their practical skills or gaining a deeper understanding of the types of attacks their clients may experience.


If you're unsure whether Certified Cybersecurity Technician is the right course for you, please get in touch—we'd be happy to discuss the various options.

Learn

Structured sessions with our lead instructor, covering 20 modules and 550 attack techniques, and access to over 200 labs

Certify

Multiple choice exam, with optional practical exam for higher-level certification

Engage

Optional: Carry out a mock hacking engagement against an emulated organisation

Compete

Optional: Take part in global CTF challenges to keep practising and developing your skills

Course Contents

Information Security Threats and Vulnerabilities


Information Security Attacks


Network Security Fundamentals


Identification, Authentication, and Authorization


Network Security Controls—Administrative Controls


Network Security Controls—Physical Controls


Network Security Controls—Technical Controls


Network Security Assessment Techniques and Tools


Application Security


Virtualization and Cloud Computing


Wireless Network Security


Mobile Device Security


IoT and OT Security


Cryptography


Data Security


Network Troubleshooting


Network Traffic Monitoring


Network Logs Monitoring and Analysis


Incident Response


Computer Forensics


Business Continuity and Disaster Recovery


Risk Management


Hands-On Labs

Access to more than 200 labs, allowing you to practise your skills in a controlled and secure environment

Scanning Networks

Labs include host, port, service, and OS discovery, scanning beyond IDS and firewall, and scanning using AI

System Hacking

Labs include privilege escalation, hiding data with steganography, clearing logs, and buffer overflow attacks

Cryptography

Labs include creating self-signed certificates, cryptanalysis, disk encryption, and cryptography using AI

...and dozens more!

Labs throughout the 20 modules, covering social engineering, sniffing, SQL injection, mobile platforms, IoT and OT hacking, and much more

Assessment

Assessment is via an online multiple choice exam, with 125 questions and lasting 4 hours.