Certified Ethical Hacker

by ID Cyber Solutions Claim Listing

Looking to transition from IT support roles to a career in cyber security? Take a look at our Certified Ethical Hacker (C|EH) course!

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ID Cyber Solutions Logo

img Duration

5 Days

Course Details

Our CEH course will provide you with many of the skills needed to become a certified ethical hacker. You will learn (among many things) an overview of principles involved in  cyber security,  the 5 stages of hacking, and the skill, methodologies and tools needed to safely and securely test systems.

Put theory into practise with iLabs’s range of vulnerable virtual machines and 140 labs which mimic real world scenarios. Examination for this course comes in the form of a multiple choice theory test. Prove your skills to future employers with a globally recognised certification that will help get you in the Cyber door and start your exciting new career today.

 

Benefits

  • Learn baseline skills to test you and your organisation’s IT security

  • Gain a solid understanding of the vast IT security terminologies and methodologies

  • Develop an understanding of the mindset of cyber attackers and the techniques they employ

  • Obtain a firm understanding of preventative countermeasures and incident response, helping you prepare for the worst.

  • Discover and understand a vast range of ethical hacking tools

  • Inform your supply chain that you/your organisation are certified to a minimum standard of cyber knowledge

 

Key Theory/Tools/Techniques Covered

  • Baseline Understanding of the 5 Stages of Hacking –

  • Reconnaissance – Footprinting and Scanning

  • Enumeration – Discovering vulnerabilities

  • Gaining Access – Exploiting Systems

  • Maintaining Access –

  • Covering Tracks – Anti-Forensics/Cleaning up

  • Reporting

  • Glasgow Branch

    29 Eagle Street, Glasgow
  • Teacher's Name
  • Cary
  • Teacher's Experience
  • Cary Hendricks is a highly accomplished security technical investigator, advisor and trainer with over 20 years’ broad experience working with Government Agencies throughout the world. His specialties include lawful interception, security analysis and strategy, network and security architecture, intelligence management and analysis, systems administration and engineering. He is a Certified Ethical Hacker, qualified Computer Forensic Investigator and a Certified Instructor for both. Cary Hendricks has mentored and coached Law Enforcement and members of Homeland Security Agencies on classified projects and regularly trains their security personnel to ensure that they remain at the center of excellence in their tactical roles. He previously held the role of International Technology Manager for Memex Technology with a worldwide client base providing Intelligence Management solutions for law enforcement agencies. He has also worked with various South African technology companies as a specialist security contractor and served in the South African Defence Force (Air Force) from 1987 to 1997, where he worked in different units responsible for electronic warfare, radar and electronic countermeasures and computer security.cae
  • Gender
  • Male
  • Teacher's Nationality
  • N/A

Check out more CEH (Certified Ethical Hacker) courses in UK

Unichrone Ltd Logo

Ethical Hacking and Penetration Testing Certification Training

Ethical Hacking and Penetration Testing (pen test) is an efficient method in cyber security. The bold choice of methods and tools that Ethical Hackers use to detect security holes in computer systems, networks, and apps is diverse.

by Unichrone Ltd [Claim Listing ]
Staffordshire University Logo

Introduction to Ethical Hacking

The Introduction to Ethical Hacking course highlights the need for penetration testing and how it can help businesses identify the flaws within their own IT infrastructure.

by Staffordshire University [Claim Listing ]
Pioneers Academy Logo

CEH

The CEH Certified Ethical Hacker course is designed to enable the participant to understand information systems, networks, protection and security systems.

by Pioneers Academy [Claim Listing ]
Grey Wolf Cyber Security Logo

Advanced Penetration Testing

This advanced penetration testing course provides delegates with advanced concepts when penetration testing clients systems. You will be taken through the principle of a number of simulated penetration tests that mimic real life scenarios.

by Grey Wolf Cyber Security [Claim Listing ]
London IT Training (LIT) Logo

Computer Hacking Forensic Investigator Training

A comprehensive and methodological approach towards digital forensic and evidence is initiated by EC-CHFI (Computer Hacking Forensic Investigator).

by London IT Training (LIT)

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy