Certified Ethical Hacker (CEH) is a certification course to learn the basics of ethical and moral technology hacking. The certified hacker can understand the weak points and compositional errors in every system and break their codes efficiently. However, they only do it for reasons that are morally approved and worthy of doing. Petty hacking or personal identity/information hacking does not fall in the category and is a major prohibition for every CEH certified hacker. 


The Cisco Certified Network Associate - Routing and Switching (CCNA - Routing and Switching ) certification title has become the leading entry level network certification available today. The Cisco Certified Network Associate - Routing and Switching (CCNA - Routing and Switching) certification was developed by Cisco to test a candidate's knowledge of networking at entry level. The Cisco Certified Network Associate - Routing and Switching (CCNA - Routing and Switching) certification analyzes the candidate's ability to install, configure, operate, and troubleshoot medium-size routed and switched networks. 

The British Academy for Training and Development presents this course in CEH and CNNA Exam information for help the participants to pass the exam. 

Objectives and target group

 Who should attend?   

  • IT professionals  
  • IT-Auditors 
  • Network engineers and professional  
  • Helpdesk staff 


How attendees will benefit?   

After completion of the programme, delegates will be able to know:   

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures. 
  • Inform the public that credentialed individuals meet or exceed the minimum standards. 
  • Reinforce ethical hacking as a unique and self-regulating profession.   
  • Verify your knowledge of CCNA exam topics 
  • Easily handle the CCNA exam simulations 

Course Content

 Course Content:    

    First: EHC Exam  

    The CEH exam can be attempted after completion of the following domins: 

     Domain 1: Background 

  • Network and Communication Technologies  
  • Information Security Threats and Attack Vectors  
  • Information Security Technologies  
  • Networking technologies (hardware, infrastructure and so on) 
  • Web technologies (Web 2.0, Skype and so on) 
  • Systems technologies 
  • Communication protocols 
  • Malware operations 
  • Mobile technologies (smartphones) 
  • Telecommunication technologies 
  • Backups and archiving (local, network and so on) 

Domain 2: Analysis/Assessment 

  • information Security Assessment and Analysis  
  • Information Security Assessment Process 
  • Data analysis 
  • Systems analysis 
  • Risk assessments 
  • Technical assessment methods 

Domain 3: Security 

  • Information Security Controls  
  • Information Security Attack Detection  
  • Information Security Attack Prevention  
  • Systems security controls 
  • Application/file server 
  • Firewalls 
  • Cryptography 
  • Network security 
  • Physical security 
  • Threat modeling 
  • Verification procedures (false positive/negative validation) 
  • Social engineering (human factor manipulation) 
  • Vulnerability scanners 
  • Security policy implications 
  • Privacy/confidentiality (with regard to engagement) 
  • Biometrics 
  • Wireless access technology (networking, RFID, Bluetooth and so on) 
  • Trusted networks 
  • Vulnerabilities 

Domain 4: Tools/Systems/Programs 

  • Information Security Systems  
  • Information Security Programs  
  • Information Security Tools 
  • Network/host-based intrusion 
  • Network/wireless sniffers (Wireshark, AirSnort and so on) 
  • Access control mechanisms (smartcards and similar) 
  • Cryptography techniques (IPsec, SSL, PGP) 
  • Programming languages (C++, Java, C#, C) 
  • Scripting languages (PHP, JavaScript) 
  • Boundary protection appliances 
  • Network topologies 
  • Subnetting 
  • Port scanning (Nmap) 
  • Domain Name System (DNS) 
  • Routers/modems/switches 
  • Vulnerability scanners (Nessus, Retina and so on) 
  • Vulnerability management and protection systems (such as Foundstone and Ecora) 
  • Operating environments (Windows, Linux, Mac) 
  • Antivirus systems and programs 
  • Log analysis tools 
  • Security models 
  • Exploitation tools 
  • Database structures 

Domain 5: Procedures/Methodology 

  • Information Security Procedures (5 questions) 
  • Information Security Assessment Methodologies  
  • Cryptography 
  • Public Key Infrastructure (PKI) 
  • Security Architecture (SA) 
  • Service-Oriented Architecture (SOA) 
  • Information security incident 
  • N-tier application design 
  • TCP/IP networking (network routing) 
  • Security testing methodology 

Domain 6: Regulation/Policy 

Domain 7: Ethics 


Second: CCNA Exam 

  • Operation of IP Data Networks 
  • LAN Switching Technologies 
  • IP addressing (IPv4 / IPv6) 
  • IP Routing Technologies 
  • IP Services 
  • Network Device Security 
  • Troubleshooting 
  • LAN Switching Technologies 
  • IP Routing Technologies 
  • Troubleshooting 
  • WAN Technologies 

Course Date





Course Cost

Note / Price varies according to the selected city

Members NO. : 1
£3600 / Member

Members NO. : 2 - 3
£2880 / Member

Members NO. : + 3
£2340 / Member

Related Course


Systems Administration





£3600 £3600