• Courses
    • IT Networking
      • Comptia Network+
      • CISCO CCNA Enterprise 200-301
      • CCNP (ENCOR)
      • Juniper JNCIA
    • Cyber Security
      • Comptia Security+
      • Comptia Pentest+
      • CompTIA Cysa+
      • CEH – Ethical Hacking
      • Cisco Cyber Ops Associate
    • Network Security
      • Palo Alto
        • Palo Alto Next-Gen Firewall Boot Camp
        • Palo Alto Manage Multiple Palo Alto Firewalls with Panorama
        • Palo Alto Certified Network Security Administrator
        • PCNSE
      • Checkpoint
        • Check Point Next-Gen Firewall Bootcamp
        • Check Point Certified Security Admin | CCSA
        • Check Point Certified Security Expert | CCSE
      • Fortinet
        • Fortinet Next-Gen Firewalls with FortiManager BootCamp
        • Fortinet Next-Gen Firewall Bootcamp
        • NSE 4 – FortiGate Network Security Engineer | Hands-on
      • CISCO
        • Cisco CCNP Security – SCOR (350-701) | Hands-on
        • Cisco CCNP Security – SNCF (300-710) | Hands-on
        • Cisco Firepower Threat Defence (FTD) Hands-on Bootcamp
        • Cisco ASA Instructor-Led Hands on Bootcamp
        • Cisco Next-Gen Intrusion Prevention Systems (IPS) Bootcamp – Instructor Led Hands on
        • Cisco Firepower Next-Gen Firewall with FireSIGHT | Instructor Led Hands-on
      • Juniper
        • Juniper SRX Firewall Hands-on Bootcamp | Instructor-Led
        • Juniper Security JNCIS-SEC – JN0-332 | Instructor-Led Hands-on
      • F5
        • F5 BIGIP Local Traffic Management LTM | Instructor-Led Hands-on
        • F5 GTM Global Traffic Manager Hands-on Bootcamp |Instructor-Led
    • IT Infrastructure
      • Microsoft
        • MCSA-Identity with Windows Server 2016 – Exam 70-742 | Instructor-Led
        • MTA 98-365 Windows Server Administration Fundamentals
    • Cloud Architect
    • Cyber Security Expert
    • DevOps Engineer
    • Artificial Intelligence Engineer
    • Digital Marketing Specialist
    • Big Data Engineer
    • Business Analyst
    • Lean Six Sigma Expert
    • Full Stack Web Developer – MEAN Stack
    • Digital Project Manager
    • Automation Test Engineer
    • Quality Management
    • Project Management
  • About Us
    • Services
    • Terms & Conditions
    • Careers
  • IT Services
    • IT Infrastructure
    • End-User Support
    • Cyber Security
    • IT Consultancy
    • Managed Hosting
    • Cloud Transformation
  • Job Guarantee
    • Traineeships
      • IT Support Technician Engineer
    • Cyber Security
      • Network Cyber Security Engineer
      • Network Cyber Security Expert
      • Cyber Security Pen Test Engineer
      • Cyber Security Engineer
      • Network Security Analyst
    • Cloud Security
      • Cloud Security Consultant
    • Cloud Expert
      • AWS cloud Architect
      • Azure Cloud Architect
      • Cloud Solution Architect
    • IT Infrastructure
      • IT Support Engineer
    • Coding
      • Data Scientist
      • Data Analyst
      • DevOps Engineer
      • Artificial Intelligence
      • Full Stack Web Developer
    • Business Analyst
    • Success Stories
  • OFFER
    • Self Paced Learning
      • Check Point Digital Learning
      • Cisco ASA Digital Learning
      • F5 Digital Learning
      • Palo Alto Digital Learning
    • Entry
      • Network Analyst Program
      • Network Engineer / Security Analyst Program
      • Network Security Analyst
    • Professional
      • Network Security Firewall Engineer
    • Expert
      • Cloud Architect
      • Cyber Security Expert
      • Digital Marketing Specialist
      • Big Data Engineer
      • Business Analyst
      • Lean Six Sigma Expert
      • Digital Project Manager
      • Automation Test Engineer
  • RESOURCES
    • Kandoo (5 – 7 Year Finance)
    • Fortray Training Feedback
    • Career in IT
    • Direct Debit with Fortray
    • Payment Link
  • Contact
    • Cart

      0
    +4402079934928
    info@fortray.com
    Fortray Global Services LTD
    • Courses
      • IT Networking
        • Comptia Network+
        • CISCO CCNA Enterprise 200-301
        • CCNP (ENCOR)
        • Juniper JNCIA
      • Cyber Security
        • Comptia Security+
        • Comptia Pentest+
        • CompTIA Cysa+
        • CEH – Ethical Hacking
        • Cisco Cyber Ops Associate
      • Network Security
        • Palo Alto
          • Palo Alto Next-Gen Firewall Boot Camp
          • Palo Alto Manage Multiple Palo Alto Firewalls with Panorama
          • Palo Alto Certified Network Security Administrator
          • PCNSE
        • Checkpoint
          • Check Point Next-Gen Firewall Bootcamp
          • Check Point Certified Security Admin | CCSA
          • Check Point Certified Security Expert | CCSE
        • Fortinet
          • Fortinet Next-Gen Firewalls with FortiManager BootCamp
          • Fortinet Next-Gen Firewall Bootcamp
          • NSE 4 – FortiGate Network Security Engineer | Hands-on
        • CISCO
          • Cisco CCNP Security – SCOR (350-701) | Hands-on
          • Cisco CCNP Security – SNCF (300-710) | Hands-on
          • Cisco Firepower Threat Defence (FTD) Hands-on Bootcamp
          • Cisco ASA Instructor-Led Hands on Bootcamp
          • Cisco Next-Gen Intrusion Prevention Systems (IPS) Bootcamp – Instructor Led Hands on
          • Cisco Firepower Next-Gen Firewall with FireSIGHT | Instructor Led Hands-on
        • Juniper
          • Juniper SRX Firewall Hands-on Bootcamp | Instructor-Led
          • Juniper Security JNCIS-SEC – JN0-332 | Instructor-Led Hands-on
        • F5
          • F5 BIGIP Local Traffic Management LTM | Instructor-Led Hands-on
          • F5 GTM Global Traffic Manager Hands-on Bootcamp |Instructor-Led
      • IT Infrastructure
        • Microsoft
          • MCSA-Identity with Windows Server 2016 – Exam 70-742 | Instructor-Led
          • MTA 98-365 Windows Server Administration Fundamentals
      • Cloud Architect
      • Cyber Security Expert
      • DevOps Engineer
      • Artificial Intelligence Engineer
      • Digital Marketing Specialist
      • Big Data Engineer
      • Business Analyst
      • Lean Six Sigma Expert
      • Full Stack Web Developer – MEAN Stack
      • Digital Project Manager
      • Automation Test Engineer
      • Quality Management
      • Project Management
    • About Us
      • Services
      • Terms & Conditions
      • Careers
    • IT Services
      • IT Infrastructure
      • End-User Support
      • Cyber Security
      • IT Consultancy
      • Managed Hosting
      • Cloud Transformation
    • Job Guarantee
      • Traineeships
        • IT Support Technician Engineer
      • Cyber Security
        • Network Cyber Security Engineer
        • Network Cyber Security Expert
        • Cyber Security Pen Test Engineer
        • Cyber Security Engineer
        • Network Security Analyst
      • Cloud Security
        • Cloud Security Consultant
      • Cloud Expert
        • AWS cloud Architect
        • Azure Cloud Architect
        • Cloud Solution Architect
      • IT Infrastructure
        • IT Support Engineer
      • Coding
        • Data Scientist
        • Data Analyst
        • DevOps Engineer
        • Artificial Intelligence
        • Full Stack Web Developer
      • Business Analyst
      • Success Stories
    • OFFER
      • Self Paced Learning
        • Check Point Digital Learning
        • Cisco ASA Digital Learning
        • F5 Digital Learning
        • Palo Alto Digital Learning
      • Entry
        • Network Analyst Program
        • Network Engineer / Security Analyst Program
        • Network Security Analyst
      • Professional
        • Network Security Firewall Engineer
      • Expert
        • Cloud Architect
        • Cyber Security Expert
        • Digital Marketing Specialist
        • Big Data Engineer
        • Business Analyst
        • Lean Six Sigma Expert
        • Digital Project Manager
        • Automation Test Engineer
    • RESOURCES
      • Kandoo (5 – 7 Year Finance)
      • Fortray Training Feedback
      • Career in IT
      • Direct Debit with Fortray
      • Payment Link
    • Contact
      • Cart

        0

      Cyber Security

      • Home
      • All courses
      • Cyber Security
      • EC-Council – Certified Ethical Hacker (CEH)

      EC-Council – Certified Ethical Hacker (CEH)

      Muhammad Ali Minhas
      Cyber Security
      (0 review)
      £1,500.00 £1,000.00
      ethical_hacker_fortray_2
      • Overview
      • Curriculum
      • Instructor
      • Why Fortray
      • FAQs
      • Schedule

      EC-Council Certified Ethical Hacker CEH with Subject Matter Expert Trainer and Consultant

      Fortray’s EC-Council Ethical Hacker (CH) course covers the EC-Council CEH exams.

      The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

      “Learn Today Apply Tomorrow”

      Watching boring videos, reading books or practicing on your PC with VM Images is helpful but first-hand experience on live Network Equipment with our expert trainers and consultants will give enough confidence and expertise to someone who is new to technology and who has never touched any real / live device, resulting in enhanced productivity and hence giving the trainee a massive competitive advantage in interviews.

      The unique combination of Expert Trainers and next generation “Network Security” LAB setup ensures not only the maximum exposure to the entire Technology but also facilitates learning in a distinctly conducive environment with our highly skilled and Industry experienced, CCIE and EC-Council CEH Certified Trainers.

      During and after the class, every candidate will have access to his dedicated network device/topology, Task List based on the real-world scenario, which will be assessed and verified with our subject matter expert.

      There are a lot of topics covered.
      Please click on show curriculum Tabs for details.

      Jobs Demand Trends for pen Testing

      Earn up to £400- 450/- per day
      (source:
      EC-Council Pen Testing on ITJOBWATCH.COM)

      Course Duration:

      • Instructor-led training: 5 days in the classroom with hands-on lab practice,
      • Virtual instructor-led training: 5 days of web-based classes with hands-on lab practice.

      Pre-requisites

      To fully benefit from this course, you should have:

        • Knowledge of TCP/IP and basic routing protocols
        • Familiarity with firewall, VPN, and Intrusion Prevention System (IPS) concepts

      Target Audience:

      • Information Security Analyst / Administrator
      • Information Assurance (IA) Security Officer
      • Information Security Manager / Specialist
      • Information Systems Security Engineer / Manager
      • Information Security Professionals / Officers
      • Information Security / IT Auditors
      • Risk / Threat/Vulnerability Analyst
      • System Administrators • Network Administrators and Engineers

      Delivery:

      • Virtual Instructor-Led with Remote LAB access
      • On-site
      • Classroom – Instructor-Led

      Lab Access & Lab Guide:

      Work at your own pace and time and enjoy the 24/7 LAB access during and after the class via the Secured Remote VPN.



      Course Features

      • Lectures 150
      • Quizzes 0
      • Duration 40 hours
      • Skill level Professtional
      • Language English
      • Students 650
      • Certificate Yes
      • Assessments Yes
      CoursesCyber SecurityEC-Council – Certified Ethical Hacker (CEH)
      • Module 01: Introduction to Ethical Hacking
        7
        • Lecture1.1
          Information Security Overview
        • Lecture1.2
          Information Security Threats and Attack Vectors
        • Lecture1.3
          Hacking Concepts
        • Lecture1.4
          Ethical Hacking Concepts
        • Lecture1.5
          Information Security Controls
        • Lecture1.6
          Penetration Testing Concepts
        • Lecture1.7
          Information Security Laws and Standards
      • Module 02: Footprinting and Reconnaissance
        14
        • Lecture2.1
          Footprinting Concepts
        • Lecture2.2
          Footprinting through Search Engines
        • Lecture2.3
          Footprinting through Web Services
        • Lecture2.4
          Footprinting through Social Networking Sites
        • Lecture2.5
          Website Footprinting
        • Lecture2.6
          Email Footprinting
        • Lecture2.7
          Competitive Intelligence
        • Lecture2.8
          Whois Footprinting
        • Lecture2.9
          DNS Footprinting
        • Lecture2.10
          Network Footprinting
        • Lecture2.11
          Footprinting through social Engineering
        • Lecture2.12
          Footprinting Tools
        • Lecture2.13
          Countermeasures
        • Lecture2.14
          Footprinting Pen Testing
      • Module 03: Scanning Networks
        7
        • Lecture3.1
          Network Scanning Concepts
        • Lecture3.2
          Scanning Tools
        • Lecture3.3
          Scanning Techniques
        • Lecture3.4
          Scanning Beyond IDS and Firewall
        • Lecture3.5
          Banner Grabbing
        • Lecture3.6
          Draw Network Diagrams
        • Lecture3.7
          Scanning Pen Testing
      • Module 04: Enumeration
        9
        • Lecture4.1
          Enumeration Concepts
        • Lecture4.2
          NetBIOS Enumeration
        • Lecture4.3
          SNMP Enumeration
        • Lecture4.4
          LDAP Enumeration
        • Lecture4.5
          NTP Enumeration
        • Lecture4.6
          SMTP and DNS Enumeration
        • Lecture4.7
          Other Enumeration Techniques
        • Lecture4.8
          Enumeration Countermeasures
        • Lecture4.9
          Enumeration Pen Testing
      • Module 05: Vulnerability Analysis
        5
        • Lecture5.1
          Vulnerability Assessment Concepts
        • Lecture5.2
          Vulnerability Assessment Solutions
        • Lecture5.3
          Vulnerability Scoring Systems
        • Lecture5.4
          Vulnerability Assessment Tools
        • Lecture5.5
          Vulnerability Assessment Reports
      • Module 06: System Hacking
        6
        • Lecture6.1
          Cracking Passwords
        • Lecture6.2
          Escalating Privileges
        • Lecture6.3
          Executing Applications
        • Lecture6.4
          Hiding Files
        • Lecture6.5
          Covering Tracks
        • Lecture6.6
          Penetration Testing
      • Module 07: Malware Threats
        7
        • Lecture7.1
          Malware Concepts
        • Lecture7.2
          Trojan Concepts
        • Lecture7.3
          Virus and Worm Concepts
        • Lecture7.4
          Malware Analysis
        • Lecture7.5
          Countermeasures
        • Lecture7.6
          Anti-Malware Software
        • Lecture7.7
          Malware Penetration Testing
      • Module 08: Sniffing
        10
        • Lecture8.1
          Sniffing Concepts
        • Lecture8.2
          Sniffing Technique: MAC Attacks
        • Lecture8.3
          Sniffing Technique: DHCP Attacks
        • Lecture8.4
          Sniffing Technique: ARP Poisoning
        • Lecture8.5
          Sniffing Technique: Spoofing Attacks
        • Lecture8.6
          Sniffing Technique: DNS Poisoning
        • Lecture8.7
          Sniffing Tools
        • Lecture8.8
          Countermeasures
        • Lecture8.9
          Sniffing Detection Techniques
        • Lecture8.10
          Sniffing Pen Testing
      • Module 09: Social Engineering
        7
        • Lecture9.1
          Social Engineering Concepts
        • Lecture9.2
          Social Engineering Techniques
        • Lecture9.3
          Insider Threats
        • Lecture9.4
          Impersonation on Social Networking Sites
        • Lecture9.5
          Identity Theft
        • Lecture9.6
          Countermeasures
        • Lecture9.7
          Social Engineering Pen Testing
      • Module 10: Denial-of-Service
        8
        • Lecture10.1
          DoS/DDoS Concepts
        • Lecture10.2
          DoS/DDoS Attack Techniques
        • Lecture10.3
          Botnets
        • Lecture10.4
          DDoS Case Study
        • Lecture10.5
          DoS/DDoS Attack Tools
        • Lecture10.6
          Countermeasures
        • Lecture10.7
          DoS/DDoS Protection Tools
        • Lecture10.8
          DoS/DDoS Penetration Testing
      • Module 11: Session Hijacking
        6
        • Lecture11.1
          Session Hijacking Concepts
        • Lecture11.2
          Application Level Session Hijacking
        • Lecture11.3
          Network Level Session Hijacking
        • Lecture11.4
          Session Hijacking Tools
        • Lecture11.5
          Countermeasures
        • Lecture11.6
          Penetration Testing
      • Module 12: Evading IDS, Firewalls, and Honeypots
        8
        • Lecture12.1
          IDS, Firewall and Honeypot Concepts
        • Lecture12.2
          IDS, Firewall and Honeypot Solutions
        • Lecture12.3
          Evading IDS
        • Lecture12.4
          Evading Firewalls
        • Lecture12.5
          IDS/Firewall Evading Tools
        • Lecture12.6
          Detecting Honeypots
        • Lecture12.7
          IDS/Firewall Evasion Countermeasures
        • Lecture12.8
          Penetration Testing
      • Module 13: Hacking Web Servers
        8
        • Lecture13.1
          Web Server Concepts
        • Lecture13.2
          Web Server Attacks
        • Lecture13.3
          Web Server Attack Methodology
        • Lecture13.4
          Web Server Attack Tools
        • Lecture13.5
          Countermeasures
        • Lecture13.6
          Patch Management
        • Lecture13.7
          Web Server Security Tools
        • Lecture13.8
          Web Server Pen Testing
      • Module 14: Hacking Web Applications
        7
        • Lecture14.1
          Web App Concepts
        • Lecture14.2
          Web App Threats
        • Lecture14.3
          Hacking Methodology
        • Lecture14.4
          Web App Hacking Tools
        • Lecture14.5
          Countermeasures
        • Lecture14.6
          Web App Security Testing Tools
        • Lecture14.7
          Web App Pen Testing
      • MoSQL Injection Concepts
        5
        • Lecture15.1
          Types of SQL Injection
        • Lecture15.2
          SQL Injection Methodology
        • Lecture15.3
          SQL Injection Tools
        • Lecture15.4
          Evasion Techniques
        • Lecture15.5
          Countermeasuresdule 15: SQL Injection
      • Module 16: Hacking Wireless Networks
        9
        • Lecture16.1
          Wireless Concepts
        • Lecture16.2
          Wireless Encryption
        • Lecture16.3
          Wireless Threats
        • Lecture16.4
          Wireless Hacking Methodology
        • Lecture16.5
          Wireless Hacking Tools
        • Lecture16.6
          Bluetooth Hacking
        • Lecture16.7
          Countermeasures
        • Lecture16.8
          Wireless Security Tools
        • Lecture16.9
          Wireless Pen Testing
      • Module 17: Hacking Mobile Platforms
        7
        • Lecture17.1
          Mobile Platform Attack Vectors
        • Lecture17.2
          Hacking Android OS
        • Lecture17.3
          Hacking iOS
        • Lecture17.4
          Mobile Spyware
        • Lecture17.5
          Mobile Device Management
        • Lecture17.6
          Mobile Security Guidelines and Tools
        • Lecture17.7
          Mobile Pen Testing
      • Module 18: IoT Hacking
        6
        • Lecture18.1
          IoT Concepts
        • Lecture18.2
          IoT Attacks
        • Lecture18.3
          IoT Hacking Methodology
        • Lecture18.4
          IoT Hacking Tools
        • Lecture18.5
          Countermeasures
        • Lecture18.6
          IoT Pen Testing
      • Module 19: Cloud Computing
        6
        • Lecture19.1
          Cloud Computing Concepts
        • Lecture19.2
          Cloud Computing Threats
        • Lecture19.3
          Cloud Computing Attacks
        • Lecture19.4
          Cloud Security
        • Lecture19.5
          Cloud Security Tools
        • Lecture19.6
          Cloud Penetration Testing
      • Module 20: Cryptography
        8
        • Lecture20.1
          Cryptography Concepts
        • Lecture20.2
          Encryption Algorithms
        • Lecture20.3
          Cryptography Tools
        • Lecture20.4
          Public Key Infrastructure (PKI)
        • Lecture20.5
          Email Encryption
        • Lecture20.6
          Disk Encryption
        • Lecture20.7
          Cryptanalysis
        • Lecture20.8
          Countermeasures
      Muhammad Ali Minhas

      Training with Fortray

      Fortray Networks (formerly known as Corvit Networks UK) since 2000 have trained 1000s of people and successfully transformed them into IT consultants.

      We are the only institute, who have dual and Triple CCIE trainers with minimum of
      15 to 20 years’ real world consultancy background, where all topics covered with the extensive hands-on training and real-world perspective.

      Many IT training providers focus on getting students ready for the certification exams. There is no doubt about the value of certifications for career development and getting a job in the industry, but it is the extensive hands-on skills that will help you retain not only your job but also proficiency in the technology.

      Real-life situations can be a lot more challenging. There is less room for error in the industry and so getting the essential life skills with our subject matter expert trainers & consultants who have years of working experience is pivotal for a successful career.

      We are your partner in preparing you for the right skill set and the development you deserve. Whether it is core networking concepts or vendor-specific training, come and join us and experience the boost in confidence that our students feel after completing courses with us.

      “Some of the highlights make us distinctive in the industry.”

      Fortray Next Gen LAB

      We are always adding the latest next-generation real network equipment in our LAB.
      We have spent 100s of hours designing our lab, where students are gaining extensive hands-on experience, and lab relates to the real and live network environment, giving the opportunity to the candidate to gain valuable industry experience and sharpen their Skills.

      • Hands-on training is on Real & Licensed Equipment.
      • 24/7 Secure Remote LAB access.
      • Separate LAB Kit for Each candidate.
      • Real world Scenario Environment.

      Fortray NextGen Network Equipment

      Below are the devices in our state of the art Network and Security LAB available 24/7 via Forticlient secure VPN.

      • Cisco 6 x 3750-X and 6 x Cisco 2800 Running Latest IOS 15.X
      • 2 x Fortinet 60E in HA environment and FortiManager, FortiAnalyzer
      • 2 x Cisco ASA 5506-X Firepower in HA environment and FireSIGHT System
      • 2 x Palo Alto PA-200 Firewall in HA environment and Panorama Platform
      • 2 x Check Point Firewall in HA environment and Security Management Platform
      • 2 X Juniper SRX Firewall in HA environment and JUNOS Space Network Management
      • 2 X F5 Load balancer in HA environment BIG-IP Central Management
      • 2 x Cisco ASA 5510 in Multi context environment
      • 2 x Blue Coat Proxy 800 SG
      • 2 x Riverbed Steelhead 250 250H Desktop WAN Application Accelerator

      Subject Matter Expert Trainers

      • 15 - 20 years Industry Experienced Dual and Triple CCIE & CCNP Security Subject Matter Expert Trainers & Consultants.
      • Innovative Training Methodology
      • Extensive Hands-on Experience

      Fortray Support

      • Class Recorded Session
      • Flexible Timing (Morning, Evening, & Weekend)
      • CV and Recruitment Support
      • Continued Support during and after the training
      • 5 Star Trustpilot & Google Rating
      • Pass 1st time or Free Re-Take (Conditions Apply)
      • Instructor-Led Online, Onsite, & Classroom.

      Trustpilot

      How I can get more details about EC-Council CEH?

      Click on the link below

      EC-Council 

      How will I be getting access to the LAB?

      Ans: We use FortiClient remote VPN Client, which can be installed on Windows, MAC, and even mobile devices. Once you connect to our VPN, you can access our lab remotely from any location.

      How long will the lab access be provided for?

      Ans: Interest-free LAB access for all the candidates during the class and 1-week extra lab access is part of all our packages. Extra access can be provided if needed (please contact our support team).

      How do trainers provide continued support?

      Ans: During and after the class, Trainer is available via phone, WhatsApp, and email.

      I have an interview, can you help?

      Ans: Give us a 24 to 48-hour notice before your interview and one of our consultants would be happy to help.

      My LAB access is not working, who should I contact?

      Ans: Contact our support team and we would try to respond ASAP.

      What if I miss a class?

      Ans: Alert your trainer and support team before your leave and we will try to provide a meeting ID to join anywhere.

      Moreover, our classes are recorded, and someone can easily pick up. In some cases, you can join our later class as well.

      Do you provide a Task to perform?

      Ans: Our Trainers and consultants have Industry experience; every trainer utilizes his experience, and we create a Task List for every candidate which is verified by our Trainers as well.

      How can you test a Task which I have performed?

      Ans: Inform your Trainers, via WhatsApp, email, or phone that you have completed your assigned Task and he will verify and respond to it. Where needed, 1 to 1 meeting can be arranged as well.

      How I can test my configuration?

      Ans: During the training, trainer will show how to test. Also, every candidate will be provided a test PC connected to our live Network.

      How long will it take to share the Recorded Class Session?

      Ans: Video conversion always takes some time; we aim to share in 2 hours, however, allow up to a maximum of 12 to 24 hours. There is always an option to contact the support.

      Can I connect two PCs with the VPN?

      Ans: Fortray has a strict policy to connect one PC at a time. We don’t allow anyone to share his VPN user / password details with anyone. If found guilty, Fortray has the right to remove you from VPN list and will not refund the fee. However, in exceptional circumstances we can provide alternative solutions. Please contact our support team.

      What if I share video or other details with anyone?

      Ans: We will not allow anyone to share or tamper our material. All our material has a copyright and if found guilty, the concerned person will be prosecuted.

      How can I book a Cisco Exams?

      Click on the link below

      Book CEH Exam

      What is the job prospect for EC-Council CEH?

      Click on the link below and search the keyword “pen tester”

      EC-Council CEH on JobServe

      Start Date Timing Days Duration Mode of Training
       

       

       

      • Overview
      • Curriculum
      • Instructor
      • Why Fortray
      • FAQs
      • Schedule
      £1,500.00 £1,000.00
      • Share:

      You May Like

      CompTIA Official A+ Instructor-Led Hands-on | Classroom/Online Read More
      mazhar minhas

      CompTIA Official A+ Instructor-Led Hands-on | Classroom/Online

      120
      0
      £800.00 £499.00
      CompTIA Official ITF+ Instructor-Led Hands-on | Classroom/Online Read More
      mazhar minhas

      CompTIA Official ITF+ Instructor-Led Hands-on | Classroom/Online

      120
      0
      £800.00 £499.00
      CompTIA Official CySA+ CS0-002 Hands-on | Instructor-Led Read More
      mazhar minhas

      CompTIA Official CySA+ CS0-002 Hands-on | Instructor-Led

      548
      0
      £800.00 £699.00
      CompTIA Official Security+ (PT-01/02) Hands-on | Instructor-Led Read More
      mazhar minhas

      CompTIA Official Security+ (PT-01/02) Hands-on | Instructor-Led

      548
      0
      £800.00 £699.00
      Palo Alto Certified Network Security Administrator (PCNSA) EDU-210 Read More
      Muhammad Ali Minhas

      Palo Alto Certified Network Security Administrator (PCNSA) EDU-210

      2549
      0
      £1,600.00 £1,195.99

      All Courses

      • Check Point
      • Cisco
      • Comptia
      • Cyber Security
      • F5 - Load Balancer
      • Fortinet
      • Industry Specific
      • Juniper
      • Microsoft
      • Palo Alto
      • Riverbed

      Latest Courses

      CompTIA Official A+ Instructor-Led Hands-on | Classroom/Online

      CompTIA Official A+ Instructor-Led Hands-on | Classroom/Online

      £800.00 £499.00
      CompTIA Official ITF+ Instructor-Led Hands-on | Classroom/Online

      CompTIA Official ITF+ Instructor-Led Hands-on | Classroom/Online

      £800.00 £499.00
      CompTIA Official CySA+ CS0-002 Hands-on | Instructor-Led

      CompTIA Official CySA+ CS0-002 Hands-on | Instructor-Led

      £800.00 £699.00
      CompTIA Official Security+ (PT-01/02) Hands-on | Instructor-Led

      CompTIA Official Security+ (PT-01/02) Hands-on | Instructor-Led

      £800.00 £699.00
      Palo Alto Certified Network Security Administrator (PCNSA) EDU-210

      Palo Alto Certified Network Security Administrator (PCNSA) EDU-210

      £1,600.00 £1,195.99

      Latest Posts

      Palo Alto Firewall vs. Fortinet Firewall
      13Apr2018
      Join Cisco Training Program and Build Career in IT and Networking
      09Mar2018
      Why should you opt for check point training program?
      31Jan2018

      +4402079934928

      info@fortray.com

         

      About Fortray

      • About Us
      • Terms
      • Careers

      IT Training

      • Courses
      • Offer & Packages
      • Job Guarantee
      • Expert

      Solution

      • IT Services
      • IT Infrastructure
      • Cyber Security
      • Cloud

      Why Fortray

      Fortray networks boasts of a highly experienced & certified team of network, security, Consultants & recruiters with several years of real world problem solving in multivendor environment. We are happy to pass-on our expertise and share our knowledge. Join our broad range of services in training, solution and recruitment.

      Copyright ©2021 Fortray.com. All rights reserved. Company House: 07611690

      Cookie Policy | Privacy Policy | Refund Policy | Rescheduling Policy

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
      Cookie SettingsAccept AllReject All
      Manage consent

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
      CookieDurationDescription
      cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
      cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
      cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
      cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
      cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
      viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
      Functional
      Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
      Performance
      Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
      Analytics
      Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
      Advertisement
      Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
      Others
      Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
      SAVE & ACCEPT
      Modal title

      Message modal

      • ←
      • WhatsApp
      • +4402079934928