Certified Ethical Hacker v10 (CEH v10) Training

EC-Council Certified
Approved Training Centre(ATC)
CEH Training South Africa and World Wide!

Certified Ethical Hacker training v10 (CEH) is in increasing demand across the world as cyber terrorism, state sponsored cyber warfare, organized crime syndicates, and legislation to enforce protection of customer data, increases the risk that poorly implemented cyber security can have on an organizations. This past year alone has seen significant data breaches at large international corporates such as E-Bay and Target.

Jumping Bean's Certified Ethical Hacker v10 hands on training by certified instructors can give you the edge to pass the exam and learn how to protect your IT assets. The Certified Ethical Hacker v10 (CEH) course will enable students to master ethical hacking methodology, tools and techniques that can be used in a penetration testing and IT security reviews.

C|EH is the world’s most advanced ethical hacking course covering 20 of the most important security domains any individual will need when they are planning to beef-up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security professionals. To provide employers with the confidence that you not only know your stuff, but can do the job, challenge the C|EH (Practical) exam to proof your skills.


Who should attend Certified Ethical Hacker (CEH) Training?

Audience:This course will significantly benefit

  • security officers and professionals,

  • auditors,

  • site administrators,

  • computer forensic investigators and

  • anyone who is concerned about the integrity of their IT assets and network infrastructure.

Description Days Price (ex vat)

Certified Ethical Hacker v10 Training Course



R 17,800 (excl vat)

$1,800 (excl vat)

Additional Labs (iLabs) *Optional




(excl vat)

  • Lunch, refreshments and training material included.
  • Class start at 9:00am for 9:30am
  • South Africa training locations: Johannesburg, Cape Town, Durban
  • Global training locations: USA, Candana, UK, Dubai, Europe


Pre-requisites:Solid networking knowledge and operating system knowledge (Windows or Linux) as well as familiarity with OSI network model and TCP/IP. We recommend our Linux fundamentals course if you need to attain these skills first.


Course Outline

  • Introduction to Ethical Hacking

  • Security 101

    • Basic Networking

    • Security Essentials

  • Introduction to Ethical Hacking

    • Hacking Terminology

    • The Ethical Hacker

  • Reconnaissance: Information Gathering

  • Getting Started

    • Vulnerability Research

  • Footprinting

    • Passive Footprinting

    • Active Footprinting

    • DNS Footprinting

    • Determining Network Range

    • Google Hacking

    • Footprinting Tools

  • Scanning and Enumeration

  • Scanning Fundamentals

    • Scanning Methodology

    • The TCP Handshake

    • Identifying Targets

    • Port Scanning

  • Enumeration

    • Windows System Basics

    • Enumeration Techniques

  • Sniffing and Evasion

  • Fundamentals

    • How It All Works

    • Passive and Active Sniffing

  • Sniffing Tools and Techniques

    • Wireshark

    • Other Tools

  • Evasion

    • IDS

    • Firewalls

  • IOT Hacking

    Vulnerability Analysis

    Attacking a System

  • Getting Started

    • Methodology

    • Windows Security Architecture

    • Linux Security Architecture

  • Cracking Passwords

    • Passwords 101

    • Password Attacks

  • Privilege Escalation and Executing Applications

    • Privilege Escalation

    • Executing Applications

  • Stealth

    • Hiding Files and Activity

    • Covering Your Tracks

  • Web-Based Hacking: Servers and Applications

  • Attacking Web Servers

    • Web Server Architecture

    • Attack Methodology

    • Web Server Attacks

  • Attacking Web Applications

    • Web Application Architecture

    • Application Attacks

    • SQL Injection

  • Wireless Network Hacking

  • Wireless 101

    • Wireless Architecture and Standards

    • Finding and Identifying Wireless Networks

  • Wireless Hacking

    • Wireless Attacks

    • Mobile Platform Attacks

  • Trojans and Other Attacks

  • Malware” Attacks

    • Trojans, Backdoors, Viruses, and Worms

  • Remaining Attacks

    • Denial of Service

    • Session Hijacking

  • Cryptography

  • Cryptography and Encryption Overview

    • Encryption Algorithms and Techniques

  • PKI, the Digital Certificate, and Digital Signatures

    • The PKI System

    • Digital Certificates

    • Digital Signatures

  • Encrypted Communication and Cryptography Attacks

    • Data Encryption: At Rest and While Communicating

    • Cryptography Attacks

  • Social Engineering & Physical Security

  • Social Engineering

    • Human-Based Attacks

    • Computer-Based Attacks

    • Mobile-Based Attacks

  • Physical Security

  • The Penetration Test

  • Methodology and Steps

  • Security Assessment

  • Security Assessment Deliverables

  • Guidelines