
Become a
Certified Ethical Hacker (C|EH)
CERTIFIED PROFESSIONALS
IN 145 COUNTRIES






Cybersecurity Incidents Are Exploding.
So Are Cyber Jobs!
Build Your Career With the Most In-Demand Ethical Hacking Certification in the World, Certified Ethical Hacker
The World’s Number 1 Ethical Hacking Certification
A Structured Professional Course for Aspiring Cyber Professionals
Work Anywhere With C|EH- It’s Globally Recognized
Comprehensive Program to Master the 5 Phases of Ethical Hacking
Hands-On Learning With CyberQTM
Flexible Learning Options : Live, Online, or Hybrid
NEED TRAINING?EC-Council’s Official delivery platform includes your study material, virtual labs and gives you the most flexible options for training to fit your busy work schedule! |
Training Options Talk to an Expert |
The Encyclopedia of Ethical Hacking
How C|EH v12 Empowers You:
Unique Learn, Certify, Engage and Compete Methodology for Aspiring Cyber Professionals
Learn Ethical Hacking in a Structured Setting Across 20 Domains
Build Skills With over 220 Challenge-Based, Hands-On Labs with CyberQ™ Labs
Gain Experience With over 500 Unique Attack Techniques
Learn Commercial-Grade Hacking Tools and Techniques
Engage: “Hack” a Real Organization With C|EH® Elite to Get Experience
Compete With Hackers Around the World as Part of the C|EH® Elite Program
Attain the Most Recognized Credential in the Cybersecurity Industry :C|EH®
A Revolutionary Way to Learn Ethical Hacking
Our exclusive Learn | Certify | Engage | Compete framework covers not only a comprehensive training program to prepare you for the certification exam, but also the industry’s most robust, in-depth, hands-on lab experience of any cybersecurity program available. C|EH v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organizations.
Gain Skills
- 5 days of training
- 20 modules
- Over 220 hands-on-labs with competition flags
- Over 3,500 hacking tools
- Learn how to hack multiple operating systems
(Windows 11, Windows Servers, Linux, Ubuntu, Android)
Gain Experience
C|EH Knowledge Exam
- 125 multiple-choice questions
- 4 hours
- ANSI 17024 accredited
C|EH Practical Exam
- 6 hours practical exam
- 20 scenario based questions
- Prove your skills and abilities
Gain Recognition
- Conduct a real-world ethical hacking assignment
- Apply the 5 phases
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Your Tracks
Gain Respect
- New challenges every month
- 4 hour competition
- Compete with your peers all over the world
- Hack your way to the top of the Leaderboard
- Gain recognition
- Challenges
Select Your Course Kit
While all C|EH course kits have complete access to eCourseware and include an exam voucher, a few additional features and learning materials can be added to build deeper expertise and gain practical experience. This means that there is a C|EH package to suit everyone’s learning requirements.

Engage & Compete
eCourseware | ![]() |
Exam Voucher* | ![]() |
Next Version of eCourseware | ![]() |
6 Months of Official Labs | ![]() |
C|EH Engage | ![]() |
Global C|EH Challenges | ![]() |
Exam Preparation | ![]() |
C|EH Practical Exam | ![]() |
Ethical Hacking Video Library | 10 |
Exam Retakes** | Unlimited# |

& Engage
eCourseware | ![]() |
Exam Voucher* | ![]() |
Next Version of eCourseware | ![]() |
6 Months of Official Labs | ![]() |
C|EH Engage | ![]() |
Global C|EH Challenges | ![]() |
Exam Preparation | ![]() |
C|EH Practical Exam | ![]() |
Ethical Hacking Video Library | 5 |
Exam Retakes** | 3 |

eCourseware | ![]() |
Exam Voucher* | ![]() |
Next Version of eCourseware | ![]() |
6 Months of Official Labs | ![]() |
C|EH Engage | ![]() |
Global C|EH Challenges | ![]() |
Exam Preparation | ![]() |
C|EH Practical Exam | ![]() |
Ethical Hacking Video Library | 2 |
Exam Retakes** | 1 |
*Exam Vouchers: New to C|EH, EC-Council now includes a free retake voucher for EVERY courseware package: 1 exam retake for standard C|EH courseware, 3 retakes for C|EH Pro, and unlimited retakes for C|EH Elite. Candidates may activate this benefit through the EC-Council student portal (ASPEN).
**Exam Retakes: This benefit provides candidates with the respective exam voucher on the ECC EXAM portal but excludes proctor administration fees which will apply for each attempt of the examination. Applicable to CEH Exam only. Please contact your training provider for details.
#Maximum 4 exam retakes allowed per year as per exam policy.
Select Your Course Kit
While all CEH course kits have complete access to e-courseware and include an exam voucher, a few additional features and learning materials can be added to build deep expertise and gain practical experience. This ensures that there is a CEH package to suit everyone’s learning requirements.

Engage & Compete
eCourseware | ![]() |
Exam Voucher* | ![]() |
Next Version of eCourseware | ![]() |
6 Months of Official Labs | ![]() |
C|EH Engage | ![]() |
Global C|EH Challenges | ![]() |
Exam Preparation | ![]() |
C|EH Practical Exam | ![]() |
Ethical Hacking Video Library | 10 |
Exam Retakes** | Unlimited# |

& Engage
eCourseware | ![]() |
Exam Voucher* | ![]() |
Next Version of eCourseware | ![]() |
6 Months of Official Labs | ![]() |
C|EH Engage | ![]() |
Global C|EH Challenges | ![]() |
Exam Preparation | ![]() |
C|EH Practical Exam | ![]() |
Ethical Hacking Video Library | 5 |
Exam Retakes** | 5 |

eCourseware | ![]() |
Exam Voucher* | ![]() |
Next Version of eCourseware | ![]() |
6 Months of Official Labs | ![]() |
C|EH Engage | ![]() |
Global C|EH Challenges | ![]() |
Exam Preparation | ![]() |
C|EH Practical Exam | ![]() |
Ethical Hacking Video Library | 2 |
Exam Retakes** | 1 |
*Exam Vouchers: New to C|EH, EC-Council now includes a free retake voucher for EVERY courseware package: 1 exam retake for standard C|EH courseware, 3 retakes for C|EH Pro, and unlimited retakes for C|EH Elite. Candidates may activate this benefit through the EC-Council student portal (ASPEN).
**Exam Retakes: This benefit provides candidates with the respective exam voucher on the ECC EXAM portal but excludes proctor administration fees which will apply for each attempt of the examination. Applicable to CEH Exam only. Please contact your training provider for details.
#Maximum 4 exam retakes allowed per year as per exam policy.
What You Will Learn
C|EH is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module offers extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time on live machines.
Ethical Hacking Labs
With over 220 hands-on labs, conducted in our cyber range environment, you will have the opportunity to practice every learning objective in the course on live machines and vulnerable targets. Pre-loaded with over 3,500 hacking tools and a variety of operating systems, you will gain unprecedented exposure to and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems on the market. Our range is web accessible, allowing you to study and practice from anywhere with a connection.
How You Will Get Certified
Prove Your Skills and Abilities With Online, Practical Examinations
Certified Ethical Hacker Certification
The C|EH exam is a 4-hour exam with 125 multiple-choice questions. This knowledge-based exam will test your skills in Information Security Threats and Attack Vectors, Attack Detection, Attack Prevention, Procedures, Methodologies and more!

C|EH Practical is a 6-hour, rigorous exam that requires you to demonstrate the skills and abilities of ethical hacking techniques such as:
- Port scanning tools (e.g., Nmap, Hping)
- Vulnerability detection
- Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
- SQL injection methodology and evasion techniques
- Web application security tools (e.g., Acunetix WVS)
- SQL injection detection tools (e.g., IBM Security AppScan)
- Communication protocols

This is the next step to becoming a C|EH Master after you have achieved your C|EH certification. Within C|EH Practical, you have a limited amount of time to complete 20 challenges that test your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VMs and applications with solutions to uncover vulnerabilities.
Upon Completing the C|EH (Master) program, which consists of C|EH and C|EH (Practical), the C|EH (Master) designation is awarded. C|EH Masters have shown proficiency at a master level in the knowledge, skills, and abilities of ethical hacking with a total 6 hours of testing to prove their competency. Top top 10 performers in both C|EH and C|EH Practical exams are showcased on the C|EH Master Global Ethical Hacking Leaderboard.

The C|EH Exam at a Glance
How You Will Engage
The C|EH v12 program helps you develop real-world experience in ethical hacking through the hands-on C|EH practice environment. C|EH Engage equips you with the skills to prove that you have what it takes to be a great ethical hacker.
Your security assessment objectives will be presented as a series of flags (questions you must answer in the Cyber Range by performing ethical hacking activities on the target organization).
New to C|EH v12, students will embark on their first emulated ethical hacking engagement. This 4-phase engagement requires students to think critically and test the knowledge and skills gained by capturing a series of flags in each phase, demonstrating the live application of skills and abilities in a consequence-free environment through EC-Council’s new Cyber Range.
As you complete your training and hands-on labs, C|EH Engage lets you apply everything you have learned in a mock ethical hacking engagement. This 4-part security engagement gives you a real ethical hacking engagement experience from start to finish against an emulated organization. Using our capture-the-flag-style range, you will complete your engagement by answering “flag” questions as you progress.
PHASE 1 | PHASE 2 | PHASE 3 | PHASE 4 |
---|---|---|---|
Vulnerability Assessment | Gaining Access | Perimeter and Web App Exploitation | Mobile, IoT, OT Exploitation |
|
|
|
|
Where You Will Compete
The C|EH Global Challenges occur every month, providing capture-the-flag style competitions that expose students to various new technologies and platforms, from web applications, OT, IoT, SCADA, and ICS systems to cloud and hybrid environments. Our Compete structure lets ethical hackers fight their way to the top of the leaderboard each month in these 4-hour curated CTFs. Objective-based flags are designed around the ethical hacking process, keeping skills current, testing critical thinking abilities, and covering the latest vulnerabilities and exploits as they are discovered. Hosted 100% online in EC-Council’s Cyber Range, candidates race the clock in scenario-based engagements against fully developed network and application environments with real operating systems, real networks, tools, and vulnerabilities to practice, engage, compete, build, and hone their cyber skills against various new target organizations.
New Challenges Every Month
Month | Skill Challenge |
---|---|
October 2022 | OWASP Top 10 Web Application Threat Vectors |
November 2022 | Ransomware/Malware Analysis |
January 2023 | System Hacking and Privilege Escalation |
February 2023 | Web Application Hacking and Pen Testing |
March 2023 | Cloud Attack/Hacking |
April 2023 | Social Engineering/Phishing attacks |
May 2023 | IoT Attack/Hacking |
June 2023 | Wi-Fi Network Attack/Hacking |
July 2023 | DOS/DDoS Attack |
August 2023 | Mobile Attack/Hacking |
September 2023 | Supply Chain Cyber Attacks |
Course Outline
20 Modules that help you master the foundations of
Ethical Hacking and prepare to challenge the CEH certification exam.
Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Over 30 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform foot printing on the target network using search engines, web services, and social networking sites
- Perform website, email, whois, DNS, and network foot printing on the target network
Over 10 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform host, port, service, and OS discovery on the target network
- Perform scanning on the target network beyond IDS and firewall
Over 20 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, RPC, SMB, and FTP Enumeration
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform vulnerability research using vulnerability scoring systems and databases
- Perform vulnerability assessment using various vulnerability assessment tools
Over 25 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform Online active online attack to crack the system’s password
- Perform buffer overflow attack to gain access to a remote system
- Escalate privileges using privilege escalation tools
- Escalate privileges in linux machine
- Hide data using steganography
- Clear Windows and Linux machine logs using various utilities
- Hiding artifacts in Windows and Linux machines
Over 20 hands-on exercises with real-life simulated targets to build skills on how to:
- Gain control over a victim machine using Trojan
- Infect the target system using a virus
- Perform static and dynamic malware analysis
Over 10 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform MAC flooding, ARP poisoning, MITM and DHCP starvation attack
- Spoof a MAC address of Linux machine
- Perform network sniffing using various sniffing tools
- Detect ARP poisoning in a switch-based network
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform social engineering using Various Techniques
- Spoof a MAC address of a Linux machine
- Detect a phishing attack
- Audit an organization’s security for phishing attacks
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform a DoS and DDoS attack on a target host
- Detect and protect against DoS and DDoS attacks
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform session hijacking using various tools
- Detect session hijacking
Over 7 hands-on exercises with real-life simulated targets to build skills on how to:
- Bypass Windows Firewall
- Bypass firewall rules using tunneling
- Bypass antivirus
Over 8 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform web server reconnaissance using various tools
- Enumerate web server information
- Crack FTP credentials using a dictionary attack
Over 15 hands-on exercises with real-life simulated targets to build skills on how to:
-
- Perform web application reconnaissance using various tools
- Perform web spidering
- Perform web application vulnerability scanning
- Perform a brute-force attack
- Perform Cross-Site Request Forgery (CSRF) Attack
- Identify XSS vulnerabilities in web applications
- Detect web application vulnerabilities using various web application security tools
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform an SQL injection attack against MSSQL to extract databases
- Detect SQL injection vulnerabilities using various SQL injection detection tools
Over 3 hands-on exercises with real-life simulated targets to build skills on how to:
- Foot Print a wireless network
- Perform wireless traffic analysis
- Crack WEP, WPA, and WPA2 networks
- Create a rogue access point to capture data packets
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
- Hack an Android device by creating binary payloads
- Exploit the Android platform through ADB
- Hack an Android device by creating APK file
- Secure Android devices using various Android security tools
Over 2 hands-on exercises with real-life simulated targets to build skills on how to:
- Gather information using Online foot printing tools
- Capture and analyze IoT device traffic
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform S3 Bucket enumeration using various S3 bucket enumeration tools
- Exploit open S3 buckets
- Escalate IAM user privileges by exploiting misconfigured user policy
Over 10 hands-on exercises with real-life simulated targets to build skills on how to:
- Calculate MD5 hashes
- Perform file and text message encryption
- Create and use self-signed certificates
- Perform email and disk encryption
- Perform cryptanalysis using various cryptanalysis tools
Common Job Roles for C|EH
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- Information Security Analyst 1
- Security Analyst L1
- Infosec Security Administrator
- Cybersecurity Analyst level 1, level 2, & level 3
- Network Security Engineer
- SOC Security Analyst
- Security Analyst
- Network Engineer
- Senior Security Consultant
- Information Security Manager
- Senior SOC Analyst
- Solution Architect
- Cybersecurity Consultant
Making an informed decision is difficult, and that’s where EC-Council’s C|EH brochure comes to your rescue. The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification that employers worldwide value, and for good reasons.
The comprehensive curriculum covers the fundamentals of ethical hacking, foot printing and reconnaissance, scanning, enumeration, vulnerability threats, social engineering, SQL injection, and much more.
When you successfully achieve the C|EH certification, you will be equipped with every skill you need to uncover vulnerabilities and secure the systems, networks, applications, databases, and critical data from malicious hackers.
This is only an overview of C|EH and what you will learn.
For complete information, download the brochure now.
Download BrochureWhat's New in C|EH
What You Will Learn
C|EH is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module has extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time, on live machines.
Ethical Hacking Labs
With over 220 hands-on labs, conducted in our cyber range environment, you will have the opportunity to practice every learning objective in the course on live machines and vulnerable targets. Pre-loaded with over 3,500 hacking tools and a variety of operating systems, you will gain unprecedented exposure to, and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems in the market. Our range is web accessible allowing you to study and practice from anywhere with a connection.
How Will You Get Certified
Prove Your Skills and Abilities With Online, Practical Examinations.
Certified Ethical Hacker (CEH) Certification
The CEH exam is a 4-hour exam with 125 multiple choice questions. This knowledge-based exam will test your skills in Information Security Threats and Attack Vectors, Attack Detection, Attack Prevention, Procedures, Methodologies and more!

CEH Practical is a 6-hour, rigorous exam that requires you to demonstrate skills and abilities of ethical hacking techniques such as:
- Port scanning tools (e.g., Nmap, Hping)
- Vulnerability detection
- Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
- SQL injection methodology and evasion techniques
- Web application security tools (e.g., Acunetix WVS)
- SQL injection detection tools (e.g., IBM Security AppScan)
- Communication protocols

This is the next step to become a CEH Master after you have achieved your CEH certification. Within CEH Practical, you have a limited amount of time to complete 20 challenges testing your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VMs and applications with solutions to uncover vulnerabilities.
Upon Completing the CEH (Master) program, consisting of CEH and CEH (Practical), the CEH (Master) designation is awarded. CEH Masters have shown proficiency at a master level in the Knowledge, Skills, and abilities of Ethical Hacking with a total 6 hours of testing to prove their competency. Top 10 performers in both CEH and CEH Practical exams are showcased on the CEH Master Global Ethical Hacking Leader Board.

The CEH Exam at a Glance
How Will You Engage
The C|EH v12 program helps you develop real-world experience in ethical hacking through the hands-on C|EH practice environment. The C|EH Engage equips you with the skills to prove that you have what it takes to be a great ethical hacker.
Your security assessment objectives will be presented as a series of flags (Questions you must answer in the Cyber Range by performing Ethical hacking activities on the target organization).
New to C|EH v12, students will embark on their first emulated ethical hacking engagement. This 4-phase engagement requires students to think critically and test the knowledge and skills gained by capturing a series of flags in each phase, demonstrating the live application of skills and abilities in a consequence-free environment through EC-Council’s new Cyber Range.
As you complete your training and hands-on labs, the C|EH Engage lets you apply everything you have learned in a mock ethical hacking engagement. This 4-part security engagement gives you a real ethical hacking engagement experience from start to finish against an emulated organization. Using our capture-the-flag-style range, you will complete your engagement by answering “flag” questions as you progress.
PHASE 1 | PHASE 2 | PHASE 3 | PHASE 4 |
---|---|---|---|
Vulnerability Assessment | Gaining Access | Perimeter and Web App Exploitation | Mobile, IoT, OT Exploitation |
|
|
|
|
Where Will You Compete
The C|EH Global Challenges occur every month, providing capture-the-flag style competitions that give students exposure to various new technologies and platforms, from web applications, OT, IoT, SCADA, and ICS systems to cloud and hybrid environments. Our compete structure lets ethical hackers fight their way to the top of the leaderboard each month in these 4-hour curated CTFs. Objective-based flags are designed around the ethical hacking process, keeping skills current, testing critical thinking abilities, and covering the latest vulnerabilities and exploits as they are discovered. Hosted 100% online in EC-Council’s Cyber Range, candidates race the clock in scenario-based engagements against fully developed network and application environments with real operating systems, real networks, tools, and vulnerabilities to practice, engage, compete, build, and hone their cyber skills against various new target organizations.
New Challenges Every Month
Month | Skill Challenge |
---|---|
October 2022 | OWASP Top 10 Web Application Threat Vectors |
November 2022 | Ransomware/Malware Analysis |
January 2023 | System Hacking and Privilege Escalation |
February 2023 | Web Application Hacking and Pen Testing |
March 2023 | Cloud Attack/Hacking |
April 2023 | Social Engineering/Phishing attacks |
May 2023 | IoT Attack/Hacking |
June 2023 | Wi-Fi Network Attack/Hacking |
July 2023 | DOS/DDoS Attack |
August 2023 | Mobile Attack/Hacking |
September 2023 | Supply Chain Cyber Attacks |
Course Outline
Course Outline
20 Modules that help you master the foundations of
Ethical Hacking and prepare to challenge the CEH certification exam.
Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Over 30 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform footprinting on the target network using search engines, web services, and social networking sites
- Perform website, email, whois, DNS, and network footprinting on the target network
Over 10 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform host, port, service, and OS discovery on the target network
- Perform scanning on the target network beyond IDS and Firewall
Over 20 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, RPC, SMB, and FTP Enumeration
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform Vulnerability Research using Vulnerability Scoring Systems and Databases
- Perform Vulnerability Assessment using Various Vulnerability Assessment Tools
Over 25 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform an Active Online Attack to Crack the System’s Password
- Perform Buffer Overflow Attack to Gain Access to a Remote System
- Escalate Privileges using Privilege Escalation Tools
- Escalate Privileges in Linux Machine
- Hide Data using Steganography
- Clear Windows and Linux Machine Logs using Various Utilities
- Hiding Artifacts in Windows and Linux Machines
Over 20 hands-on exercises with real-life simulated targets to build skills on how to:
- Gain Control over a Victim Machine using Trojan
- Infect the Target System using a Virus
- Perform Static and Dynamic Malware Analysis
Over 10 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform MAC Flooding, ARP Poisoning, MITM and DHCP Starvation Attack
- Spoof a MAC Address of Linux Machine
- Perform Network Sniffing using Various Sniffing Tools
- Detect ARP Poisoning in a Switch-Based Network
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform Social Engineering using Various Techniques
- Spoof a MAC Address of Linux Machine
- Detect a Phishing Attack
- Audit Organization’s Security for Phishing Attacks
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform a DoS and DDoS attack on a Target Host
- Detect and Protect Against DoS and DDoS Attacks
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform Session Hijacking using various Tools
- Detect Session Hijacking
Over 7 hands-on exercises with real-life simulated targets to build skills on how to:
- Bypass Windows Firewall
- Bypass Firewall Rules using Tunneling
- Bypass Antivirus
Over 8 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform Web Server Reconnaissance using Various Tools
- Enumerate Web Server Information
- Crack FTP Credentials using a Dictionary Attack
Over 15 hands-on exercises with real-life simulated targets to build skills on how to:
-
- Perform Web Application Reconnaissance using Various Tools
- Perform Web Spidering
- Perform Web Application Vulnerability Scanning
- Perform a Brute-force Attack
- Perform Cross-site Request Forgery (CSRF) Attack
- Identify XSS Vulnerabilities in Web Applications
- Detect Web Application Vulnerabilities using Various Web Application Security Tools
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform an SQL Injection Attack Against MSSQL to Extract Databases
- Detect SQL Injection Vulnerabilities using Various SQL Injection Detection Tools
Over 3 hands-on exercises with real-life simulated targets to build skills on how to:
- Footprint a Wireless Network
- Perform Wireless Traffic Analysis
- Crack a WEP, WPA, and WPA2 Networks
- Create a Rogue Access Point to Capture Data Packets
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
- Hack an Android Device by Creating Binary Payloads
- Exploit the Android Platform through ADB
- Hack an Android Device by Creating APK File
- Secure Android Devices using Various Android Security Tools
Over 2 hands-on exercises with real-life simulated targets to build skills on how to:
- Gather Information using Online Footprinting Tools
- Capture and Analyze IoT Device Traffic
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
- Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
- Exploit Open S3 Buckets
- Escalate IAM User Privileges by Exploiting Misconfigured User Policy
Over 10 hands-on exercises with real-life simulated targets to build skills on how to:
- Calculate MD5 Hashes
- Perform File and Text Message Encryption
- Create and Use Self-signed Certificates
- Perform Email and Disk Encryption
- Perform Cryptanalysis using Various Cryptanalysis Tools
Who is it for ?
Common Job Roles For C|EH
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Cyber Defense Analyst
-
Vulnerability Assessment Analyst - Warning Analyst
- Information Security Analyst 1
- Security Analyst L1
- Infosec Security Administrator
- Cybersecurity Analyst level 1, level 2, & level 3
- Network Security Engineer
- SOC Security Analyst
- Cyber Defense Analyst
- Security Analyst
- Network Engineer
- Senior Security Consultant
- Information Security Manager
- Senior SOC Analyst
- Solution Architect
- Cybersecurity Consultant
Brochure
Making an informed decision is difficult, and that’s where the EC-Council’s CEH brochure comes to your rescue. The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification that employers worldwide value. And for good reasons.
The comprehensive curriculum covers the fundamentals of ethical hacking, footprinting and reconnaissance, scanning, enumeration, vulnerability threats, social engineering, SQL injection, and much more.
When you successfully achieve the CEH certification, you will be equipped with every skill you need to uncover vulnerabilities and secure the systems, networks, applications, databases, and critical data from malicious hackers.
This is only an overview of CEH and what you will learn.
For complete information, download the brochure now.

Is This Course For Me?
We have helped over 250,000 people answer this question over the past 20 years and we are excited to help you with this big decision! Choosing the right credential can seem like a difficult task, here are some things you should consider:
- https://www.zdnet.com/education/computers-tech/best-ethical-hacking-certification
- https://www.roberthalf.com/blog/salaries-and-skills/which-it-certifications-are-most-valuable
- https://www.enterprisestorageforum.com/management/cybersecurity-certifications/
- https://www.infosec-careers.com/the-best-cyber-security-certifications-in-2022/
- https://www.cio.com/article/193586/top-15-it-certifications-in-demand-for-2021.html
The C|EH Exam is an ANSI 17024 exam which means it goes through extensive external validation to ensure the examination itself is fair for the knowledge and experience level of our certification challengers. With the recommendation of 2 years’ experience in IT Security or 0fficial training, candidates attempting the exam need to possess strong knowledge in computing systems, networks, and a variety of other IT topics. The examination itself uses Cut-Scores to determine pass/fail results and cut scores are carefully set by psychometricians who regularly evaluate test question performance and average pass/fail results throughout the life of the program. Reviews from our certification members with limited experience or background have rated our exam as difficult, while more seasoned IT and IT security professionals rate the exam as moderately challenging even after official training. You may review the exam domains and the exam blueprint here to learn more: https://cert.eccouncil.org/certified-ethical-hacker.html
1. Attend official training through our online learning provided by iClass, through an Authorized Training Center (ATC) located in 140+ countries around the world, or at a college or university that is also an official EC-Council Academia Partner. All candidates attending official training at an official EC-Council partner if deemed eligible to attend the training will have direct access to the examination which can be proctored at the training center, online using EC-Council’s remote proctoring service, or at over 4,500 VUE testing centers across the world.
2. Eligibility Application – If you possess the experience and don’t feel training is necessary in the domains of the exam, you may wish to skip the training and go straight to challenging the exam. If you do not attend official training, you will need to apply for exam eligibility here: https://cert.eccouncil.org/application-process-eligibility.html. After the application is processed and approved, EC-Council will work directly with you to determine the best delivery method for the exam, and you may then challenge the 4-hour certification exam as scheduled.
Masterclass provides student with a Live Online, Instructor led class schedule with set times where our award-winning instructors will guide you through the C|EH training module by module incorporating hands on lab time, breakout sessions for discussions and a live presentation of all course materials.
iLearn is EC-Councils On-Demand training option. We have hand selected the best instructors, flown them to our Albuquerque based studio and produced professional pre-recorded video lectures and lab walkthroughs that can be accessed through your iClass student account any time, 24x7x365.
(UK’s intelligence, security, and cyber agency) Approves EC-Council Training as meeting CYBOK requirements.
Discover Why C|EH Trusted By Organization Across The World!
For more than 15 years, EC-Council’s cybersecurity certification programs have empowered cybersecurity professionals around the world to exercise their training and expertise to combat cyberattacks. The Hall of Fame celebrates those individuals who have excelled, achieved, and fostered a spirit of leadership among their colleagues and peers within the cyber community.
97%
Rated the program topics as directly relevant to current real-world threats.
63%
Reported a direct pay raise or promotion after attaining their C|EH certification.
95%
Reported being able to improve organizational security after completing the program.
Why People Love C|EH


Chief Expert Information Security Officer

Before I Started the C|EH Training, I had some knowledge about KaliLinux, BackTrack, Wireshark and other tools, but the C|EH gave me a more advanced training on these tools and more, like Armitage, Metasploit, Burp Suite, Namp, Zenmap, Nessus, and many more



System Engineer

The training material for C|EH was perfect! It had an abundance of knowledge and I was delighted to learn multiple practices to find and exploit vulnerabilities within a system



Security Associative Principal

Day 5 of certified ethical hacker training. Enlightened! What an awesome learning experience! Thanks, Accenture
