In recent years, several large companies such as Yahoo and LinkedIn have suffered major security breaches or cyberattacks. As a result, there’s always a need for IT security experts. One of the best ways to prevent security threats is to understand how hackers work. Hackers are innovators and constantly find new ways to attack information systems and exploit system vulnerabilities. Enter ethical hacking - a legal, contracted way to hack systems to help organizations tighten up their security! Sounds cool, doesn’t it?

The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

To master the hacking technologies, you will need to become one, but an ethical one! During this training you will learn the tools and techniques used by hackers and information security professionals alike to break into an organization. This course will immerse you into the hacker mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process. Because if you want to beat a hacker, your need to think like a hacker!


After this training you will know how malicious hackers, sniffers and phishers try to break into your organization. By learning to use their weapons, your defense strategy becomes more intelligent.


  • This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules (like IoT, Android Malware, botnets, Vulerability Analysis...), the course covers over 270 attack technologies, commonly used by hackers.
  • You will have access to 140 virtual labs (ilabs) in which these attacks can be simulated. For this purpose 2200 tools are at your disposal plus more than 40GB of additional material.
  • The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand! The Certified Ethical Hacker (CEH) training is the most up-to-date and in-depth security training of its kind and is platform- and product-independent. The CEH certificate is internationally known as a valuable addition to Microsoft, Cisco or Linux certificates.
  • The price we offer is an all-in price, including the official digital study material, toolkit, CEH exam voucher, registration and administration costs, all lunches, coffee, tea and location costs.

Uw resultaten

The tools and techniques are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets. Why this training is called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and fix the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization.

Bestemd voor

This course will significantly benefit:

  • IT managers,
  • Security officers and managers,
  • IT and security auditors, 
  • Test professionals,
  • System and network administrators,
  • Web administrators and
  • Anyone who is concerned about the integrity of their network security.

Prior knowledge: you do not need any prior knowledge in order to participate in the CEH training. However, some knowledge of IT security principles is an advantage.

Prior to the training, you sign an agreement in which you indicate that you will not misuse the knowledge gained or the tools received.


It was great to learn so many things in so little time. We can use the iLABS platform for several months to practise a whole lot of things ourselfs.

Werner Ertryckx, ICT, CTO en preventieadviseur, Amptec

The balance between theory and practical example/exercises was just right. The trainer was knowledgeable and very friendly. He also made sure that everyone understood what he was explaining during the whole course.

Kevin Roulent, IT auditor en advisor, Sociaal Secretariaat der Notarissen van België


1. Introduction to Ethical Hacking

  • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds?
  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Laws and Standards

2. Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting Tools
  • Footprinting Countermeasures

3. Scanning networks

  • Overview of Network Scanning
  • CEH Scanning Methodology

4. Enumeration

  • Overview of Network Scanning
  • CEH Scanning Methodology
  • Enumeration Concepts NetBIOS
  • Enumeration SNMP
  • Enumeration LDAP
  • Enumeration NTP
  • Enumeration SMTP
  • Enumeration Countermeasures
  • SMB Enumeration
  • Enumeration Countermeasures
  • Enumeration Pen Testing

4. Vulnerability Analysis

5. System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps

6. Malware Threats

  • Introduction to Malware
  • Trojan Concepts
  • Types of Trojans
  • Virus and Worms Concepts
  • Malware Reverse Engineering
  • Malware Detection
  • Countermeasures
  • Anti-Malware Software
  • Penetration Testing

7. Sniffing

  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

8. Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering
  • Countermeasures
  • Penetration Testing

9. Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing

10. Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Session Hijacking Pen Testing

11. Evading IDS, Firewalls and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

12. Hacking Webservers

  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing

13. Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Countermeasures
  • Security Tools
  • Web App Pen Testing

14. SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures

14. Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wi-Fi Pen Testing

15. Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

16. IoT Hacking

17. Cloud Computing

  • Introduction to Cloud Computing
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

18. Cryptography

  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
  • Cryptography Tools
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools

The CEH v10 Exam is not included in the training. After completion of the training, you will receive an exam voucher allowing you to take the exam at the time and place of your choice.


Steven Ramboer

Steven Ramboer has more then 15 years experience in IT audit, PEN-testing, security management and architecture. The past 6 years Steven has worked as Group IT Security Manager with Bekaert. A few months ago he started as Lead CyberSecurity Architect with Assa Abloy Group. Meanwhile he has almost 3 years experience as a trainer: ethical hacking essentials and EC-Council certified ethical hacker (CEH). A few years ago he started his own business Cyberlabs where he does cybersecurity consultancy & training.

Lees meer

Praktische informatie

Prijs: 2 850 EUR (excl btw)

De opleidingen komen in aanmerking voor verschillende subsidies. Handig: zo betaalt u zelf maar een deel van het inschrijvingsgeld.

  • Tot 30% subsidie met kmo-portefeuille op klassikale opleidingen, virtual classrooms en live webinars. Meer info vindt u hier.

Please bring your own laptop to this training.

The CEH v10 Exam is not included in the training. After completion of the training, you will receive an exam voucher allowing you to take the exam at the time and place of your choice.

  • VOV Vlaams Opleidingsverlof, 32 hours
Incompany: Hebben meerdere collega’s behoefte aan deze opleiding? En trekt u liever niet naar een andere plaats? Breng de opleiding naar uw afdeling of onderneming: handig! Bovendien spitst de trainer zich dan toe op uw situatie, op uw sector en op de vragen van uw medewerker. Vraag uw incompany opleiding aan.