Publication date : 02/04/2026

Course : Certified Lead Ethical Hacker, PECB certification

Practical course - 4d - 28h00 - Ref. CEY
Price : 3460 € E.T.

Certified Lead Ethical Hacker, PECB certification




You will acquire the knowledge and skills needed to plan and carry out internal and external pentests, in compliance with various standards (PTES, OSSTMM), as well as writing reports and proposing countermeasures. The course is compatible with the NICE Protect and Defend rubric.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Available in English on request

Ref. CEY
  4d - 28h00
3460 € E.T.




You will acquire the knowledge and skills needed to plan and carry out internal and external pentests, in compliance with various standards (PTES, OSSTMM), as well as writing reports and proposing countermeasures. The course is compatible with the NICE Protect and Defend rubric.


Teaching objectives
At the end of the training, the participant will be able to:
Understand the mechanism of the main attacks
Detect system weaknesses through knowledge of the different targets of a hacking attack
Apply basic measures and rules to combat hacking
Writing a pentest report

Intended audience
Security managers and architects. System and network technicians and administrators.

Prerequisites
Good knowledge of networks and systems (Microsoft and Linux).

Certification
Once you've acquired the necessary expertise with this course, you'll take the "PECB Certified Lead Ethical Hacker" exam. The 6-hour remote exam consists of two parts: the practical exam and the report. The practical exam requires the candidate to compromise at least two target machines using penetration tests. The process must be documented in a written report. The PECB Certified Lead Ethical Hacker exam is an open-book exam. Candidates are allowed to use course materials and personal notes during the exam. The PECB certificate certifies that you have acquired the necessary skills for penetration testing according to the best standards.
Remote certifications
See the certifier’s official documentation for the list of prerequisites for completing the online certification exam.

Course schedule

1
Cybersecurity and architecture

  • Panorama of cybersecurity and contemporary architecture.
  • Performing an intrusion test, a pentest, the different types of pentest.
  • Architectures, operating systems, known vulnerabilities.

2
Active recognition

  • Active and passive forms of recognition.
  • Recognition, scanning and enumeration.
  • Gather information on vulnerabilities.
  • Port scanning.
  • Exploit known security flaws in port-related services, etc.
Hands-on work
Review of automatic vulnerabilities: Nessus, OpenVAS.

3
System operation

  • Operating frameworks.
  • Understanding CVEs: types (Remote, Local, Web).
  • Process exploits: Buffer Overflow, ROP, Dangling Pointers.
  • Shellcodes and rootkits.
  • Microsoft authentication attack, PassTheHash.
  • Windows: Buffer Overflow by hand, exploits.
Hands-on work
Exploit system vulnerabilities (Microsoft and Linux).

4
Operation and post-operation

  • Document preparation and report writing.
  • Describe the vulnerabilities found.
  • Formulate safety recommendations.
Hands-on work
Report writing and formatting.


Customer reviews
4,7 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
HAMADI AHMED E.
02/12/25
5 / 5

Very good!
ERIC T.
02/12/25
5 / 5

Very competent trainerGood teaching methods. Lots of examples, ...
FOKOU STEVE F.
02/12/25
5 / 5

the course is well delivered and the trainer knows how to answer all questions



Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Last places available
Guaranteed date, in person or remotely
Guaranteed session

REMOTE CLASS
2026 : 24 Mar., 2 June, 9 June, 15 Sep., 22 Sep., 17 Nov., 1 Dec.

PARIS LA DÉFENSE
2026 : 2 June, 15 Sep., 1 Dec.