Certified Ethical Hacker (CEH) v8: Hacking and Penetration Testing

This course is included in our On-demand training solution.


Hacking involves gaining unauthorized access to a computer system. Penetration testing is performed by ethical hackers using the same hacking techniques as an attacker would use, in order to uncover real and potential security vulnerabilities. In this course we discuss hacking concepts, methods, and penetration testing. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the first in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Target Audience

Network and information security professionals



Expected Duration

90 min.

Course Objectives

Information Security Overview

  • match types of information security threats to examples
  • Hacking Concepts

  • put the phases of a hacking attack in order
  • Information Security Controls

  • put the steps for creating and implementing security policies into the correct order
  • Penetration Testing Overview

  • identify ways to assess the effectiveness of security policies and procedures
  • Penetration Testing Techniques

  • determine the type of penetration test to perform in a given situation
  • Penetration Testing Outsourcing

  • identify factors to consider when outsourcing penetration testing
  • Ethical Hacking and Penetration Testing Concepts





    Multi-license discounts available for Annual and Monthly subscriptions.