The Certified Ethical Hacker Online Course covers the EC-Councils vendor-neutral exam syllabus and is designed for students wanting to learn about the latest developments in hacking techniques and technology from an offensive perspective.

To master hacking technologies, you need to think like a hacker… only an ethical one! The CEH v8 certification is proof of a person's competence across a spectrum of skills including Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation and more.

About EC-Council:

The International Council of Electronic Commerce Consultants (EC-Council) curriculum provides a comprehensive range of skills and knowledge needed to effectively utilize numerous resources to achieve operation excellence and to build and manage security and networking operations of an organization.

Elearning Portal:

This course is delivered through our online course portal and will give students 12 months access to the materials. The course includes interactive activities that to keep the student engaged and each lesson includes Flash Cards, a short quiz and exercises to confirm your understanding of the subject. When returning to your studies you to return to the last point or to the furthest point you have read.

Free Trial:We recommend that students register and access a free trial of this course prior to enrolment to make sure the course is suitable for their needs as refunds cannot be issued once the course materials have been accessed. The free trial will give you access to the first lesson of the course materials.

Certified Ethical Hacker v8 Online Course includes the following contents:


The pre-assessment is designed as a guide to assess the students’ knowledge of the course topics before they begin the course. The results will help them to understand what you need to learn and after going through the course contents they will be able to score higher on this and the other practice tests in the course.

Chapters & Lessons:

  • Lesson 1: Introduction to Ethical Hacking

This lesson covers the following subjects: Gain knowledge on various hacking terminologies; and Understand the different types and implications of hacker attacks.

  • Lesson 2: Footprinting and Reconnaissance

This lesson covers the following subjects: Understand the term footprinting; Understand how traceroute is used in footprinting; and Google hacking, Website mirroring, and email tracking.

  • Lesson 3: Scanning Networks

This lesson covers the following subjects: Understand the term port scanning, network scanning, and vulnerability scanning; Understand ping sweeping, firewalk tool, and nmap command switches; Understand scans; Learn TCP communication flag types, and gain knowledge on War dialing techniques; Understand banner grabbing using fingerprinting and other techniques and tools; Learn vulnerability scanning using BidiBlah and other hacking tools; and Understand proxy servers, anonymizers, HTTP tunneling techniques, and IP spoofing techniques.

  • Lesson 4: Enumeration

This lesson covers the following subjects: Learn the system hacking cycle, and understand enumeration and its techniques; Understand null sessions and their countermeasures; and Understand SNMP enumeration and its countermeasures.

  • Lesson 5: System Hacking

This lesson covers the following subjects: Understand the different types of passwords, password attacks, and password cracking techniques; Authentication mechanism, password sniffing, various password cracking tools, and countermeasures; Understand privilege escalation, key loggers, and other spyware technologies; Identify different ways to hide files, understand rootkits, and understand alternate data streams; Understand steganography technologies and tools used; and Understand covering tracks, tools used and erase evidences.

  • Lesson 6: Trojans and Backdoors

This lesson covers the following subjects: Define a Trojan; Identify the ports used by a Trojan; Identify listening ports using netstat; Understand wrapping , reverse shell Trojan, and ICMP tunnelling; Understand Windows start up monitoring tools, and the Trojan horse constructing kit; and Learn Trojan detection and evading techniques.

  • Lesson 7: Viruses and Worms

This lesson covers the following subjects: Virus, characteristics of a virus, working of a virus, and virus hoaxes; Understand the difference between a virus and a worm, and understand the life cycle of virus; Virus writing technique and virus construction kits; Understand antivirus evasion techniques, and understand virus detection methods and countermeasures; and Understand worm analysis.

  • Lesson 8: Sniffers

This lesson covers the following subjects: Sniffers, identify types of sniffing, and understand active and passive sniffing; Understand Address Resolution Protocol (ARP), and the process of ARP spoofing; Understand MAC duplicating; Learn ethereal capture and display filters; Understand MAC flooding, understand DNS spoofing techniques, and DNS spoofing countermeasures; and Know various sniffing tools, identify sniffing detection and defensive techniques.

  • Lesson 9: Social Engineering

This lesson covers the following subjects: Understand social engineering; Identify the different types of social engineering; Understand dumpster diving, human-based social engineering, and insider attack; Understand phishing attacks, identify online scams, and understand URL obfuscation; and Identify social engineering countermeasures.

  • Lesson 10: Denial of Service

This lesson covers the following subjects: Understand a Denial of Service attack, and analyze symptoms of a DoS Attack; Understand Internet Chat Query (ICQ), Internet Relay Chat (IRC), and botnets; Assess DoS/DDoS attack tools; and Identify DoS/DDoS countermeasure, post-attack forensics, and Penetration Testing.

  • Lesson 11: Session Hijacking

This lesson covers the following subjects: Understand session hijacking and session hijacking techniques; Understand session hijacking process and session hijacking in the OSI Model; Understand the brute forcing attack, and HTTP referrer attack; Understand application level session hijacking, and discuss session sniffing; Describe man-in-the-middle, man-in-the-browser, Client-side, and cross-site script attacks; Understand session fixation attack, and describe network level session hijacking; and Understand TCP/IP hijacking, session hijacking tools, and countermeasures of session hijacking.

  • Lesson 12: Hacking Webservers

This lesson covers the following subjects: Web server attacks; Examine webserver misconfiguration, and understand directory traversal attacks; Learn regarding HTTP response splitting attack, and understand Web cache poisoning attack; Understand HTTP response hijacking, and discuss SSH bruteforce attack; Examine man-in-the-middle attack, and learn webserver password cracking techniques; Understand webserver attack methodology; Identify webserver attack tools, and identify countermeasures against webserver attacks; and Understand patch management, assess webserver security tools.

  • Lesson 13: Hacking Web applications

This lesson covers the following subjects: Understand Web applications, Web application components, and working of Web applications; Understand Web application architecture, parameter/form tampering, and injection flaws; Discuss hidden field manipulation, cross-site scripting (XSS), and Web services attacks; Identify Web application hacking and Web application security tools; and Understand Web application firewalls, and gain insights on Web application pen testing.

  • Lesson 14: SQL Injection

This lesson covers the following subjects: Understand SQL injection and SQL injection black box penetration testing; Understand types of SQL injection and blind SQL injection; Learn SQL injection methodology; Examine advanced enumeration, describe password grabbing, and discuss grabbing SQL Server hashes; SQL injection tools; and Understand defensive strategies against SQL injection attacks.

  • Lesson 15: Hacking Wireless Networks

This lesson covers the following subjects: Understand wireless networks, various types of wireless networks, and Wi-Fi authentication modes; Identify types of wireless encryption, and understand WEP encryption and WPA/WPA2; Understand wireless hacking methodology, and assess wireless hacking tools; Understand Bluetooth hacking, and understand how to defend against Bluetooth hacking; Understand how to defend against wireless attacks, and identify Wi-Fi security tools; and Examine Wireless Penetration Testing Framework.

  • Lesson 16: Hacking Mobile Platform

This lesson covers the following subjects: Mobile Platform Attack Vectors; Hacking Android OS; Hacking iOS; Hacking Windows Phone OS; Hacking BlackBerry; Mobile Device Management (MDM); Mobile Security Guidelines and Tools; and Mobile Pen Testing.

  • Lesson 17: Evading IDS, Firewalls, and Honeypots

This lesson covers the following subjects: Understand Intrusion Detection Systems (IDS); Understand what is a firewall, types of firewalls, and identify firewall identification techniques; Understand honeypot; Examine evading IDS, understand evading firewalls, and learn detecting honeypots; and Identify firewall evading tools.

  • Lesson 18: Buffer Overflow

This lesson covers the following subjects: Understand buffer overflows (BoF); Reasons for buffer overflow attacks, and skills required to program buffer overflow exploits; Testing for heap overflow conditions: heap.exe, and understand OllyDbg debugger; andUnderstand buffer overflow countermeasures tools and buffer overflow pen testing.

  • Lesson 19: Cryptography

This lesson covers the following subjects: Understand cryptography, learn various types of cryptography, and understand ciphers; Understand AES, RC4, RC5, RC6 algorithms, RSA, Message Digest Function: MD5, and SHA; Identify cryptography tools, and understand Public Key Infrastructure (PKI), and digital signature; and Understand SSL, disk encryption, and cryptography attacks.

  • Lesson 20: Penetration Testing

This lesson covers the following subjects: Understand penetration testing (PT); Understand automated testing, manual testing, and penetration testing techniques; and Understand enumerating devices.

Practice Exams:

Prepare for your exam with 15 pre-assessment questions, 6 full length tests and 100+ post-assessment questions. Practice tests comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.

Post Assessment:

This is final indicator to gauge a student’s readiness and should be attempted after all of the exercises and practice tests have been completed.


There are no prerequisites for this course or exam. Students should have a reasonable amount of IT knowledge with it being an online course. An understanding of computer systems and network technologies is recommended.

Course Duration & Support:

Students may register at any time and have 12 months access to the course materials. This home study course is designed as a self-study course but email support is available for the 12 month period. As the course is self-study you can complete in as little or as long a time as you prefer.


Assessment is from the E-C Council Certified Ethical Hacker 312-50-v8 Examination. The Examination has 125 questions in a multiple choice / multiple answer format, and can be completed over a 4 hour period. The passing score is 70%.


On completion of the Certified Ethical Hacker online course, you can apply for the Internationally Recognised EC-Council Certified Ethical Hacker 312-50-v8 Examination.

Examinations must be sat at registered Pearson VUE or Prometric testing centres and the exam fees are currently $600.00 (Approx. £412.00).

You can find or register for your nearest exam centres from the Pearson Vue Website and Prometric Website.

View Testimonials
Submit a Testimonial