Course Introduction

The Datrix 5-day Certified Ethical Hacker V10 course provides essential knowledge and skills required for cyber defence and equips delegates with the necessary training and knowledge of the industry. Gain the Certified Ethical Hacker course certification by mastering an ethical hacking methodology used in an ethical hacking situation or penetration testing. The course enables the delegates to identify the vulnerabilities in target systems and review the target system’s security framework in a lawful and legitimate manner.

The delegates will be introduced to the key issues pertaining to information security, incident management process, network scanning and enumeration techniques and countermeasures, various types of Footprinting and Footprinting tools and cloud computing concepts, threats, attacks, security techniques and tools. By the completion of the course, the delegates will be able to fix vulnerabilities, defend against malware attacks, perform network scanning, system hacking and SQL injection attacks and also conduct a variety of web server and web application attacks.


What's Included

Find out what's included in the training programme.

Course Content

The Certified Ethical Hacker V10 program provides a comprehensive knowledge of ethical hacking and network security domains to fulfil the standard of highly skilled information security professionals. During the security training course, the delegates will explore the advanced hacking tools and techniques used by information security professionals and hackers, countermeasures to defend against future attacks and five phases of ethical hacking. The five phases of hacking are Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks.    

Exam details of Certified Ethical Hacker V10

The Certified Ethical Hacker V10 course prepares the delegates for (312-50 VUE) Certified Ethical Hacker Exam. The exam is formatted as:

  • 4 hours long
  • Total 125 questions
  • Multiple choice questions
  • 70% Pass Rate

Course Outline

Overview of Ethical Hacking

  • Introduction to Information Security
  • Information Security Threats and Attack Vectors
  • Concepts of Hacking
  • Describe Ethical Hacking
  • Information Security Controls
  • Describe Penetration Testing
  • Information Security Laws and Standards

Footprinting and Reconnaissance

  • Overview of Footprinting
  • Footprinting Tools
  • Footprinting through Social Networking Sites
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Website Footprinting
  • Competitive Intelligence
  • Email Footprinting
  • DNS Footprinting
  • Footprinting Pen Testing
  • Network Footprinting
  • Whois Footprinting
  • Footprinting through social Engineering
  • Countermeasures

Scanning Networks

  • Describe Network Scanning
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Draw Network Diagrams
  • Scanning Pen Testing
  • Banner Grabbing
  • Scanning Tools



  • Define Enumeration
  • LDAP Enumeration
  • NetBIOS Enumeration
  • NTP Enumeration
  • SNMP Enumeration
  • SMTP and DNS Enumeration
  • Enumeration Countermeasures
  • Enumeration Pen Testing
  • Explain other Enumeration Techniques

Vulnerability Analysis

  • Overview of Vulnerability Assessment
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Reports

System Hacking

  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Malware Threats

  • Explain Malware
  • Trojan Concepts
  • Concepts of Virus and Worm
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing


  • Explain Sniffing
  • Sniffing Tools
  • Sniffing Techniques
    • DHCP Attacks
    • ARP Poisoning
    • MAC Attacks
    • Spoofing Attacks
    • DNS Poisoning
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

Social Engineering

  • Overview of Social Engineering
  • Social Engineering Techniques
  • Insider Threats
  • Identity Theft
  • Impersonation on Social Networking Sites
  • Countermeasures
  • Social Engineering Pen Testing


  • Concepts of DoS/DDoS
  • DoS/DDoS Attack Tools
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • Countermeasures
  • DoS/DDoS Penetration Testing

Session Hijacking

  • Describe Session Hijacking
  • Session Hijacking Tools
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Countermeasures
  • Penetration Testing

Evading IDS, Firewalls, and Honeypots

  • Overview of IDS, Firewall and Honeypot
  • IDS/Firewall Evading Tools
  • IDS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

Hacking Web Servers

  • Describe Web Server
  • Web Server Attack Tools
  • Web Server Security Tools
  • Web Server Attacks
  • Web Server Attack Methodology
  • Countermeasures
  • Patch Management
  • Web Server Pen Testing

Hacking Web Applications

  • Describe Web App
  • Web App Hacking Tools
  • Web App Security Testing Tools
  • Web App Threats
  • Hacking Methodology
  • Countermeasures
  • Web App Pen Testing

SQL Injection Concepts

  • SQL Injection Tools
  • SQL Injection Types
  • SQL Injection Methodology
  • Evasion Techniques
  • Countermeasures

Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Hacking Tools
  • Wireless Security Tools
  • Wireless Hacking Methodology
  • Wireless Encryption
  • Wireless Threats
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Pen Testing

Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Mobile Security Guidelines and Tools
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Spyware
  • Mobile Pen Testing

IoT Hacking

  • Define IoT
  • IoT Hacking Tools
  • IoT Attacks
  • IoT Hacking Methodology
  • Countermeasures
  • IoT Pen Testing

Cloud Computing

  • Explain Cloud Computing
  • Cloud Security Tools
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Penetration Testing


  • Explain Cryptography
  • Encryption Algorithms
  • Cryptography Tools
  • Cryptanalysis
  • Public Key Infrastructure
  • Email Encryption
  • Disk Encryption
  • Countermeasures

Delivery Methods


Certified Ethical Hacker V10 Enquiry

Enquire Now

----- OR -------

Reach us at 44 161 768 4797 or for more information.


What does Datrix provide me with on the course?

  • The Datrix Courseware Book Manual
  • Certificate
  • Highly skilled and knowledgeable Trainer
  • Refreshments

What is the experience of the instructor(s) delivering my course?

All of our instructors at Datrix are accredited and have over ten years of experience worldwide.

What time shall I arrive at the venue?

Please arrive at the venue for 08:45am.

How can I find more information?

If you would like to know any more information about our courses, please contact us on 0800 781 0626 or send us an e-mail on

What are prerequisites for attending this course?

No prior certifications are required for attending the Certified Ethical Hacker V10 course. However, a basic experience or knowledge of Cisco Certified Network Associate, Network Security Administration and Microsoft Certified Systems engineer would be beneficial.

Who is this course for?

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.