CEH Course Overview

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.

Ethical hacking is a profession that is becoming popular. With NST’s Ethical Hacker training, candidates will get certified and will be able to hack or enter in the systems of organisations and companies and determine the problems of the security network and find suitable solutions. Become Certified as an Ethical Hacking professional.

Book your course


Not sure which course is right for you?

Call us on
020 8840 4496 and we’ll help you try and find the best course for you.




Course Booking

March 20-24, 2017


£2,995.00 + vat


May 08-12, 2017


£2,995.00 + vat


July 17-21, 2017


£2,995.00 + vat


Sep 18-22, 2017


£2,995.00 + vat


Nov 27-Dec 01, 2017


£2,995.00 + vat


                                   We Accept



Email us with the discount code wQ234yt for best price.

Math Captcha47 + = 53

Course Syllabus

Certified Professional Ethical Hacker  – CEH modules

01 Security Fundamentals

02 Access Controls

03 Protocols

04 Cryptography

05 Why Vulnerability Assessments?

06 Vulnerability Tools of the Trade

07 Output Analysis and Reports

08 Reconnaissance, Enumeration & Scanning

09 Gaining Access

10 Maintaining Access

11 Covering Tracks

12 Malware

13 Buffer Overflows

14 Password Cracking

15 Economics and Law


1  Economics and Law

2  Vulnerability Types

3  Assessing Web Servers

4  Assessing Remote & VPN Services

5  Denial of Services

These course will interest you too!

CRT Boot Camp

CREST Registered Tester

CLFE Boot Camp

Certified Lead Forensics Examiner

WebApp Boot Camp

Web Application Security

Additional Information


Candidates with verified experience of minimum two years in information security domain are eligible for this training.

Who should attend

This training is intended for professionals concerned with the network infrastructure and preparing for the CEH certification exam.