- Home
- Training Areas Catalogue
- Cybersecurity and Forensics
- CEH Ethical Hacker
CEH Ethical Hacker Course prepares professionals for the CEH certification exam by EC-Council, through intensive and practical training in Ethical Hacking and Penetration Testing. The course develops competences to identify, test, exploit and mitigate vulnerabilities in systems and networks, with official labs and a focus on attack and defence techniques, tools and methodologies.
Quick Access: Introduction· Why this course exists· What this course enables· Frameworks and models· Value· Objectives· Target audience· Prerequisites· Programme· Exam & Certification· Other information· Benefits· Logistics· FAQs· Registration
Upcoming dates
Public dates on the website.
Synchronous, live training. Interaction with the trainer and the group.
Live Online • next edition
Live Online • base price
Language: available in Portuguese or English
Training: ethical hacking with official labs
Exam: 4h (125 questions) • exam included
SPECIALIST LEVEL – The depth that matters. Expertise that transforms.
Why this course exists
To develop practical ethical hacking and offensive security competences, with method, labs and globally recognised language.
In many organisations, controls and tools exist, but the ability to think like an attacker is missing: identifying attack surfaces, validating exposures, prioritising remediation and testing control effectiveness. The CEH course creates a practical basis to assess security, perform tests and reduce real risk, supporting SOC, audit, vulnerability and security operations teams.
What this course enables you to do
Recognise and exploit attack vectors
Apply reconnaissance, scanning and enumeration techniques to identify exploitation opportunities and misconfigurations.
Assess vulnerabilities with method
Perform vulnerability analysis and interpret results, prioritising remediation and validating risk in a controlled environment.
Test applications and infrastructures
Understand and apply attack approaches to web, networks, wireless, cloud, mobile and IoT, with techniques and countermeasures.
Improve defence through practice
Translate results into recommendations and countermeasures, strengthening security posture and operational effectiveness.
Frameworks, models and structures addressed throughout the course
Footprinting & Reconnaissance
Scanning & Enumeration
Vulnerability Analysis
System Hacking
Malware, Sniffing and Session Hijacking
Web / SQL Injection
Wireless / Mobile / IoT
Cloud & Cryptography
CEH preparation
Value for the organisation
- Greater ability to identify vulnerabilities and validate exposures with practical evidence.
- Improved effectiveness in remediation prioritisation and hardening, reducing real risk.
- Strengthened competences for SOC, Vulnerability Management and Audit teams.
- Ability to support internal testing and technical communication with teams and suppliers.
Introduction
The CEH Ethical Hacker Course is a professional cybersecurity training course focused on practical and lab-based learning in ethical hacking, with the aim of preparing participants for the CEH exam by EC-Council.
During the training, participants are exposed to a hands-on environment where they learn how to verify, test, hack and protect systems, applying recognised tools and techniques, with a focus on methodologies and countermeasures.
The programme covers 20 modules, addressing essential technologies, tactics and procedures, balancing knowledge-based training with practical application through labs and cyber range.
This Training Plan and all associated documents are protected by Copyright and registered by EC-COUNCIL®.
General Objectives
At the end of the course, participants should be able to:
- Apply security fundamentals and best practices, including principles, relevant laws and standard procedures.
- Perform reconnaissance and information-gathering techniques (footprinting & reconnaissance).
- Apply scanning and enumeration techniques, understanding countermeasures.
- Perform vulnerability analysis and interpret results, prioritising mitigation.
- Understand system hacking, malware, sniffing and session hijacking methodologies, with countermeasures.
- Apply attack and mitigation approaches in web, applications, SQL injection, wireless, mobile, IoT, cloud and cryptography.
Target Audience
- Security Officers, auditors and security professionals.
- Network/system administrators and engineers with security responsibilities.
- SOC analysts, Cyber Defense Analysts and Vulnerability Assessment profiles.
- Cybersecurity consultants and professionals who wish to take the CEH exam.
Prerequisites
There are no mandatory formal prerequisites. However, basic knowledge of networks, systems and fundamental security concepts is recommended to maximise learning outcomes.
Other specific requirements may apply, where relevant, depending on the quotation or proposal presented (please consult the proposal).
Programme
Modules (CEH v13)
- Module 01: Introduction to Ethical Hacking
- Module 02: Foot Printing and Reconnaissance
- Module 03: Scanning Networks
- Module 04: Enumeration
- Module 05: Vulnerability Analysis
- Module 06: System Hacking
- Module 07: Malware Threats
- Module 08: Sniffing
- Module 09: Social Engineering
- Module 10: Denial-of-Service
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography
Labs and practice
- Hands-on labs and cyber range (remote access), for practical application and consolidation
- Access to official tools and resources, supporting exam preparation
- Practical simulation/engagement (where applicable) for guided training
Exam(s) and Certification
Exam “CEH”
The CEH certification exam is included in the course price and is scheduled after the training.
Number of questions: 125.
Duration: 4 hours.
Format: Multiple Choice.
Pass mark: between 60% and 85% (depending on the exam version).
Issuing entity: EC-Council
Mode: Online Proctoring (according to exam conditions).
Certification (framework)
After passing the exam, the CEH certification diploma/certificate is issued, with access to associated benefits, according to EC-Council rules.
Other Information
General Information
- Live Online training in Portuguese or English.
- CEH online materials in English, with access for 11 months from the course start date.
- Access to a private area to download tools.
- Hands-on-Labs with remote access to official CEH iLabs, during and after the course, for a period of 6 months.
- Hacking simulator with self-directed assessments (CEH Engage).
- Behaviour digital Training Attendance Certificate with 40 CPD/CPE credits.
- Online CEH exam included, available up to 11 months after the start of the training.
- 1 CEH exam retake voucher. A €100 fee applies to the second attempt and is only paid if the exam needs to be retaken.
Trainer(s)
Benefits
View benefits
- Specialised and practical ethical hacking training, with labs and cyber range.
- Exposure to tools, techniques and methodologies used in real contexts.
- Ability to identify vulnerabilities and strengthen security posture through controlled testing.
- Structured preparation for the CEH exam with guided training and official resources.
- Development of competences valued in SOC, audit, testing and consulting roles.
Logistics
Useful information
- Live Online (synchronous time): 09h30–17h30 (Lisbon time), with lunch break and short breaks
- Classroom (synchronous time): 09h30–17h30 (Lisbon time), with lunch break and short breaks
- 35 hours of synchronous training, distributed across 4 consecutive days
- Estimated 5 hours of guided autonomous work, intended for content consolidation, carried out flexibly outside synchronous sessions
- Requirements: computer with stable internet, browser, PDF reader and audio/video
Hotels in Lisbon
Frequently Asked Questions
Objective answers to common questions about the CEH Ethical Hacker Course.
What is the difference between CEH and CHFI?
In which professional roles and contexts is this course most useful?
Is the course focused on “real” penetration testing or on ethical hacking fundamentals?
Is CEH more suitable for those entering offensive security or for those already working in the field?
Does this course help work with blue team (SOC/IR) teams and improve detection and mitigation?
For general questions about registration, delivery modes, exams, certification and recertification, please consult the BEHAVIOUR® FAQs.
Registration
Complete the form to request your registration for the preferred edition. Check the upcoming dates.
Request more information
If you would like help to frame the course within your professional or organisational context, contact us and we will indicate the most suitable path.
Request Information
Companies: request a proposal
For team registrations, we provide volume conditions and a proposal tailored to the organisational need.
Request Proposal
This course may be attended by individual professionals. It may also be integrated into technical capability-building pathways in vulnerability identification, ethical hacking practices and defence reinforcement.