Course Details


EC Council Certified Ethical Hacking
Peneration Testing


Course ECCEH: Five days; Instructor-led


BT Training’s unique CEH Version 6 programme has won BT Training the EC Council Training Provider of the Year Award 2008 and has won the course instructor the prestigious EC Council Security Trainer of the Year in both 2007 and again in 2008!!

• In-depth technical, Pen Testing skills
• Advanced security controls and countermeasures
• Unique live lab sessions
• Focused exam revision session
• Intensive 10+ classroom hours
• 95%+ First time pass rate for the EC Council CEH exam (included, sat on last day)

You won’t find a more advanced, up-to-the-minute Ethical Hacking course anywhere. BT Trainings unique CEH Workshop covers every possible threat vector seen on a modern network. If you have get up to speed on the risk that faces your network today, you need BT Trainings CEH Workshop.

The EC Council CEH certification can lead on to the highly regard EC Council Security Architect (ECSA) and then to the prestigious Licensed Penetration Tester accreditation (LPT).

Please note that the course starts at 9.30 on the first day but runs to approx 7pm each night (except the last day) and starts at 8.30am every other morning.


This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Course Objectives

An intensive technical baptism into the world of a hacker. Learn how networks are compromised and what you can do protect yours. Hack live web servers, wireless networks, Active Directory logons, Windows desktops, Database, web sites and many more. Don’t be content with just reading or listening, get your hands-on the tools (over 2,500 attack tools) and run the attacks! The following is a small selection to the tools and technique you will learn on BT Training’s unique Certified Ethical Hacking Worskhop:

• Port Scanning
• Root Kits
• Annonymous Proxies
• MiTM’s
• Session Hijacks
• SSL Attacks
• Password cracking
• Finger Printing
• Stenography
• NetBIOS Null Sessions
• Firewalking
• DDoS Attacks
• WEP Cracking
• WPA Cracking
• Active Sniffing
• Writing Trojans
• Deploying Backdoors
• SQL Injection
• UNICODE Injection
• Vulnerability Scanning
• Google Hacking
• Phising
• DNS Poisoning
• Polymorphic Shellcode
• Reverse Shells
• Buffer Overflows
• Remote Code Injection
• DLL Injection
• SNMP Attacks
• AD & LDAP Attacks
• And many, many more.....


Leave fully certified and prove your knowledge and experience back at work. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification.

Due to the accelerated nature of this workshop the hours of training are additional to the normal training day, please contact the office for details. Those delegates wishing to sit the exam on the last day must be willing to study for 2-3 hours every evening.

Who Should Attend?

This course will significantly benefit security officers, Pen Testers, auditors, security professionals, Systems Managers, Sys Admins, Network Admins, Server Operators, Helpdesk managers and anyone who is concerned about the integrity of the network infrastructure.


Advanced working knowledge of TCP/IP v4 networking, recommend 3+ years deep technical experience. Technical knowledge of desktop and server operating systems including Windows, Linux & Unix. Delegates who do not meet the prerequisites can attend the EC Council NSA course. Please contact us for more details.

Course Outline (V6)

Module 1: Introduction to Ethical Hacking
Module 2: Hacking Laws
Module 3: Footprinting
Module 4: Google Hacking
Module 4: Network & Port Scanning
Module 6: Enumeration
Module 7: System Hacking
Module 8: Trojans and Backdoors
Module 9: Viruses and Worms
Module 10: Sniffers
Module 11: Social Engineering
Module 12: Phishing
Module 13: Hacking Email Accounts
Module 14: Denial-of-Service
Module 15: Session Hijacking
Module 16: Hacking Web Servers
Module 17: Web Application Vulnerabilities
Module 18: Web-Based Password Cracking Techniques
Module 19: SQL Injection
Module 20: Hacking Wireless Networks
Module 21: Physical Security
Module 22: Linux Hacking
Module 24: Buffer Overflows
Module 25: Cryptography
Module 26: Penetration Testing
Modules 27-67 Additional Deep Dives

Please see for a full break down of the contents of each module.