0 Items Total: $0
Certified Ethical Hacker v9
Certified Ethical Hacker v9
Certified Ethical Hacker v9
Digital transformation is set to revolutionise the economic landscape in the Middle East.

At PwC, we help our clients unlock the potential of digital to transform what they do, and how they do it. We have a proven track record of helping solve tomorrow’s problems today and we believe training and ongoing education is at the heart of this.

PwC’s Academy, the education and training business of PwC, has designed a suite of digital training courses for all levels of staff. Our goal is simple: to equip our clients with the knowledge and skills to embrace the many challenges of this new digital age.

Certified Ethical Hacker v9

The Certified Ethical Hacker v9 is a globally recognised accredited programme by the EC - Council.

In this 5 day course, participants will learn how to become a hacker, but an ethical one! They will get an in-depth insight into the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. In short, particpants will learn how to beat a hacker, by learning how to think like a hacker.

Certified Ethical Hacker v9

This course is ideal for security officers, auditors, security professionals and site administrators. It is suitable for anyone who works in a role concerned with the integrity of network infrastructure.

By the end of this course, participants will be completely immersed in a hacker mindset that will enable them to defend their organisation from potential cyber attacks. They will learn how to achieve optimal information security posture for their organisation and get practical insights on scanning, testing, hacking and securing their own systems.

With the help of a qualified Certified Ethical Hacker V9 training expert, they will understand the 5 phases of ethical hacking and learn ways to target the approach and safeguarding their organisation, irrespective of the degree or intensity of the cyber attack.

Course structure

In this course, participants will cover:

Introduction to Ethical Hacking

Footprinting and Reconnaissance

Scanning Networks


Vulnerability Analysis

System Hacking

Malware Threats


Social Engineering


Session Hijacking

Evading IDS, Firewalls, and Honeypots

Hacking Web Servers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Hacking Mobile Platforms

IoT Hacking

Cloud Computing

Want to run this in-house?
Frequently asked questions

Enquire now