CEH – Ethical Hacker

CEH Ethical Hacker Course prepares professionals for the CEH certification exam by EC-Council, through intensive and practical training in Ethical Hacking and Penetration Testing. The course develops competences to identify, test, exploit and mitigate vulnerabilities in systems and networks, with official labs and a focus on attack and defence techniques, tools and methodologies.

Upcoming dates

Public dates on the website.
Synchronous, live training. Interaction with the trainer and the group.

20 April 2026
Live Online • next edition
15 June 2026
Live Online • base price
Duration: 5 days / 40h
Language: available in Portuguese or English
Training: ethical hacking with official labs
Exam: 4h (125 questions) • exam included
SPECIALIST LEVEL – The depth that matters. Expertise that transforms.

Why this course exists

To develop practical ethical hacking and offensive security competences, with method, labs and globally recognised language.

In many organisations, controls and tools exist, but the ability to think like an attacker is missing: identifying attack surfaces, validating exposures, prioritising remediation and testing control effectiveness. The CEH course creates a practical basis to assess security, perform tests and reduce real risk, supporting SOC, audit, vulnerability and security operations teams.

What this course enables you to do

Recognise and exploit attack vectors

Apply reconnaissance, scanning and enumeration techniques to identify exploitation opportunities and misconfigurations.

Assess vulnerabilities with method

Perform vulnerability analysis and interpret results, prioritising remediation and validating risk in a controlled environment.

Test applications and infrastructures

Understand and apply attack approaches to web, networks, wireless, cloud, mobile and IoT, with techniques and countermeasures.

Improve defence through practice

Translate results into recommendations and countermeasures, strengthening security posture and operational effectiveness.

Frameworks, models and structures addressed throughout the course

Ethical Hacking Methodology (phases)
Footprinting & Reconnaissance
Scanning & Enumeration
Vulnerability Analysis
System Hacking
Malware, Sniffing and Session Hijacking
Web / SQL Injection
Wireless / Mobile / IoT
Cloud & Cryptography
CEH preparation

Value for the organisation

  • Greater ability to identify vulnerabilities and validate exposures with practical evidence.
  • Improved effectiveness in remediation prioritisation and hardening, reducing real risk.
  • Strengthened competences for SOC, Vulnerability Management and Audit teams.
  • Ability to support internal testing and technical communication with teams and suppliers.

Introduction

The CEH Ethical Hacker Course is a professional cybersecurity training course focused on practical and lab-based learning in ethical hacking, with the aim of preparing participants for the CEH exam by EC-Council.

During the training, participants are exposed to a hands-on environment where they learn how to verify, test, hack and protect systems, applying recognised tools and techniques, with a focus on methodologies and countermeasures.

The programme covers 20 modules, addressing essential technologies, tactics and procedures, balancing knowledge-based training with practical application through labs and cyber range.

This Training Plan and all associated documents are protected by Copyright and registered by EC-COUNCIL®.

General Objectives

At the end of the course, participants should be able to:

  • Apply security fundamentals and best practices, including principles, relevant laws and standard procedures.
  • Perform reconnaissance and information-gathering techniques (footprinting & reconnaissance).
  • Apply scanning and enumeration techniques, understanding countermeasures.
  • Perform vulnerability analysis and interpret results, prioritising mitigation.
  • Understand system hacking, malware, sniffing and session hijacking methodologies, with countermeasures.
  • Apply attack and mitigation approaches in web, applications, SQL injection, wireless, mobile, IoT, cloud and cryptography.

Target Audience

  • Security Officers, auditors and security professionals.
  • Network/system administrators and engineers with security responsibilities.
  • SOC analysts, Cyber Defense Analysts and Vulnerability Assessment profiles.
  • Cybersecurity consultants and professionals who wish to take the CEH exam.

Prerequisites

There are no mandatory formal prerequisites. However, basic knowledge of networks, systems and fundamental security concepts is recommended to maximise learning outcomes.

Other specific requirements may apply, where relevant, depending on the quotation or proposal presented (please consult the proposal).

Programme

Modules (CEH v13)
  1. Module 01: Introduction to Ethical Hacking
  2. Module 02: Foot Printing and Reconnaissance
  3. Module 03: Scanning Networks
  4. Module 04: Enumeration
  5. Module 05: Vulnerability Analysis
  6. Module 06: System Hacking
  7. Module 07: Malware Threats
  8. Module 08: Sniffing
  9. Module 09: Social Engineering
  10. Module 10: Denial-of-Service
  11. Module 11: Session Hijacking
  12. Module 12: Evading IDS, Firewalls, and Honeypots
  13. Module 13: Hacking Web Servers
  14. Module 14: Hacking Web Applications
  15. Module 15: SQL Injection
  16. Module 16: Hacking Wireless Networks
  17. Module 17: Hacking Mobile Platforms
  18. Module 18: IoT Hacking
  19. Module 19: Cloud Computing
  20. Module 20: Cryptography
Labs and practice
  • Hands-on labs and cyber range (remote access), for practical application and consolidation
  • Access to official tools and resources, supporting exam preparation
  • Practical simulation/engagement (where applicable) for guided training

Exam(s) and Certification

Exam “CEH”

The CEH certification exam is included in the course price and is scheduled after the training.

Number of questions: 125.
Duration: 4 hours.
Format: Multiple Choice.
Pass mark: between 60% and 85% (depending on the exam version).
Issuing entity: EC-Council
Mode: Online Proctoring (according to exam conditions).

Certification (framework)

After passing the exam, the CEH certification diploma/certificate is issued, with access to associated benefits, according to EC-Council rules.

Other Information

General Information
  • Live Online training in Portuguese or English.
  • CEH online materials in English, with access for 11 months from the course start date.
  • Access to a private area to download tools.
  • Hands-on-Labs with remote access to official CEH iLabs, during and after the course, for a period of 6 months.
  • Hacking simulator with self-directed assessments (CEH Engage).
  • Behaviour digital Training Attendance Certificate with 40 CPD/CPE credits.
  • Online CEH exam included, available up to 11 months after the start of the training.
  • 1 CEH exam retake voucher. A €100 fee applies to the second attempt and is only paid if the exam needs to be retaken.
Trainer(s)
EC-COUNCIL certified trainers.

Benefits

View benefits
  • Specialised and practical ethical hacking training, with labs and cyber range.
  • Exposure to tools, techniques and methodologies used in real contexts.
  • Ability to identify vulnerabilities and strengthen security posture through controlled testing.
  • Structured preparation for the CEH exam with guided training and official resources.
  • Development of competences valued in SOC, audit, testing and consulting roles.

Logistics

Useful information
  • Live Online (synchronous time): 09h30–17h30 (Lisbon time), with lunch break and short breaks
  • Classroom (synchronous time): 09h30–17h30 (Lisbon time), with lunch break and short breaks
  • 35 hours of synchronous training, distributed across 4 consecutive days
  • Estimated 5 hours of guided autonomous work, intended for content consolidation, carried out flexibly outside synchronous sessions
  • Requirements: computer with stable internet, browser, PDF reader and audio/video
Hotels in Lisbon
Find out where you can stay in Lisbon, near Behaviour, for classroom training.

Frequently Asked Questions

Objective answers to common questions about the CEH Ethical Hacker Course.

What is the difference between CEH and CHFI?
CEH focuses on offensive security: ethical hacking techniques, tools and methodologies, and controlled testing to identify and validate vulnerabilities. CHFI focuses on forensic investigation: collection, preservation, analysis and reporting of digital evidence after incidents. In terms of learning path, CEH is often recommended before CHFI.
In which professional roles and contexts is this course most useful?
It is particularly useful for professionals in SOC, Vulnerability Management, offensive security, technical audit, cyber defence teams and consulting, as well as for network and system administrators/engineers who need to strengthen their ability to assess and practically validate exposures.
Is the course focused on “real” penetration testing or on ethical hacking fundamentals?
CEH is focused on ethical hacking fundamentals and methodology, covering phases, techniques and tools for reconnaissance, analysis, controlled exploitation and countermeasures. It does not replace advanced pentest training, but provides a solid and practical basis to progress towards penetration testing pathways.
Is CEH more suitable for those entering offensive security or for those already working in the field?
CEH is suitable for both, provided there is a minimum technical basis. For those entering the field, it works as a structured basis in methodology and language. For those already working in security, it helps consolidate techniques, strengthen reasoning and standardise team practices and terminology, with a practical component oriented to real contexts.
Does this course help work with blue team (SOC/IR) teams and improve detection and mitigation?
Yes. By understanding attack techniques and patterns, participants improve their ability to validate exposures, interpret technical evidence and collaborate with SOC, IR and operations teams in defining countermeasures, hardening and monitoring improvements, reducing real risk.

For general questions about registration, delivery modes, exams, certification and recertification, please consult the BEHAVIOUR® FAQs.

Registration

Complete the form to request your registration for the preferred edition. Check the upcoming dates.

Contact name
=

Request more information

If you would like help to frame the course within your professional or organisational context, contact us and we will indicate the most suitable path.
Request Information

Companies: request a proposal

For team registrations, we provide volume conditions and a proposal tailored to the organisational need.
Request Proposal

This course may be attended by individual professionals. It may also be integrated into technical capability-building pathways in vulnerability identification, ethical hacking practices and defence reinforcement.