
EC Council Certified Ethical Hacker Certification (CEH)
The Certified Ethical Hacker (CEH) course teaches participants how to identify and fix security vulnerabilities. Through hands-on labs and theory, learners use attacker tools to test and strengthen network security.
Description
The Certified Ethical Hacker (CEH) course teaches participants how to identify and fix security vulnerabilities. Through hands-on labs and theory, learners use attacker tools to test and strengthen network security. The training covers networks, web applications, cloud, mobile, and IoT systems.
Participants develop technical skills for security audits and vulnerability assessments. Upon completion, professionals can perform penetration testing and report security gaps to protect systems from exploitation.
No sessions available
Check back later or contact a provider directly.
What You Will Learn
This training gives you a full overview of how attackers think and operate — plus hands-on experience with the same tools and methods, so you can test and secure systems yourself.
Part 1: Introduction to Ethical Hacking — fundamentals, attack types, legal and ethical context
Part 2: Footprinting & Reconnaissance — information gathering and passive reconnaissance techniques
Part 3: Scanning Networks — port scanning, service discovery, host detection, OS fingerprinting
Part 4: Enumeration — extracting network and system information, user enumeration, service analysis
Part 5: Vulnerability Analysis — identifying weaknesses in networks, systems and applications
Part 6: System Hacking — exploiting vulnerabilities, privilege escalation, post-exploitation techniques
Part 7: Malware Threats — understanding malware types, behaviour, and defensive strategies
Part 8: Sniffing — network traffic capturing, packet analysis, detection of network-based attacks
Part 9: Social Engineering — human-targeted attack vectors, phishing, impersonation, security awareness aspects
Part 10: Denial-of-Service, Session Hijacking & Evasion — DoS/DDoS techniques, session attacks, bypassing firewalls and IDS
Part 11: Web Server & Web Application Hacking — attacks and vulnerabilities targeting web infrastructure and web apps
Part 12: Hacking Wireless Networks, Mobile Platforms, IoT/OT — wireless security, mobile and IoT/OT system vulnerabilities
Part 13: Cloud Computing & Cryptography — cloud-specific security threats and cryptographic fundamentals
Certification & Exam
After you complete the CEH training, you can register for the CEH certification exam. The exam tests your ability to identify vulnerabilities, understand attack methods and apply defensive techniques using real ethical-hacking tools.
The CEH exam includes 125 multiple-choice questions and lasts 4 hours. You must reach the required passing score, which varies slightly depending on the exam form. The exam is offered through Pearson VUE or EC-Council’s remote-proctored platform.
When you pass the exam, you receive the CEH certification, confirming your skills in ethical hacking and penetration testing. If you also want to validate your practical skills, you can take the optional CEH Practical exam, which includes hands-on lab challenges.
What You Will Achieve
By the end of the course, you will be able to:
Identify and analyse security weaknesses in networks, systems and applications
Use professional ethical-hacking tools to simulate real attack techniques
apply reconnaissance, scanning, enumeration and exploitation methods safely and effectively
Test and validate the security posture of web, cloud, wireless, mobile and IoT environments
Understand how malware, social engineering and network attacks work and how to defend against them
Prepare confidently for the CEH certification exam and optional CEH Practical exam
Training Providers
1 providerFAQs
General FAQs
CEH is a certification in ethical hacking. It teaches how attackers work, and how to spot and reduce weaknesses in systems, in a legal and controlled way.
Prerequisites & Requirements
Certification & Exam
Get Custom In-house Training
Post once, get competitive offers from multiple providers. Choose the one that fits your team.
Similar Trainings
EC-Council Certified Penetration Testing Professional (CPENT)
The Certified Penetration Testing Professional (CPENT ) program is the world’s most comprehensive guided penetration testing program. It offers a complete hands-on pentesting methodology and AI techniques mapped to all pentesting phases. CPENT enables you to master pentesting within an enterprise network environment, evaluating intrusion risks and compiling actionable, structured reports. Distinguish yourself with the CPENT , learning beyond technical knowledge, scoping engagements, understanding design, estimating effort, and presenting findings and thrive as a leader in offensive security with versatile skills. CPENT combines guided learning with hands-on practice while immersing you in diverse live scenarios involving IoT systems, segmented networks, and advanced defenses, with practical challenges mapped to each domain. Gain expertise in advanced skills necessary to create your tools, conduct advanced binary exploitation, double pivot, customize scripts, and write your exploits to penetrate the deepest pockets of the network. Hands-on course featuring CTFs, 110+ labs, live cyber ranges, and 50+ tools Practical exam tests skills on unique multi-disciplinary network ranges The only program to teach a complete pen testing methodology
EC-Council Computer Hacking Forensic Investigator (CHFI)
EC-Council’s CHFI program enabled cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and accomplish forensic readiness. Master the methodological approach of forensics process, evidence handling procedures, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence, legal procedures to ensure it is admissible in court. Build skills beyond traditional hardware and memory forensics and with cloud forensics, mobile and IoT, investigating web application attacks, and malware forensics. CHFI equips you with skills to validate/triage incidents and guide the incident response teams. Build job ready skills on immersive 68 forensic labs Earn globally recognized and demanded by employers Flexible learning options without quitting your current jobs
EC-Council Certified Network Defender (CND) Program
The CND course gives you a full introduction to network security from a defender’s perspective. You learn how to protect, monitor, detect and respond to threats in modern network environments. The training includes theory and hands-on labs , teaching you how to secure networks, configure firewalls and IDS/IPS, monitor traffic, and implement defensive strategies across devices, endpoints, cloud and IoT. The goal is to equip you to build and maintain secure networks for organisations.
EC-Council Certified Cloud Security Engineer (CCSE)
The CCSE course teaches you how to secure, manage and defend cloud environments. You learn both general cloud-security principles and specific skills for major providers such as AWS, Azure and GCP. The training includes hands-on labs, real-world scenarios, and guidance on cloud governance, compliance, monitoring and incident response. This course prepares you to build secure cloud infrastructures , protect data and services in multi-cloud settings , and respond to cloud-specific threats professionally.
EC-Council Certified DevSecOps Engineer (ECDE)
The ECDE course shows you how to combine development, operations and security in a modern workflow. You learn both cloud-native and on-prem security practices, secure coding, infrastructure hardening, automated security tools and continuous deployment pipelines. The training uses many hands-on labs to build real-world DevSecOps skills.
EC-Council Certified Application Security Engineer (CASE .Net)
The CASE course helps software developers and engineers learn how to build applications securely. You learn how to apply security principles throughout the whole software development lifecycle (SDLC) — from requirements and design to coding, testing, deployment and maintenance. The training includes secure-coding practices, threat awareness, application design, testing methods, and secure deployment procedures. The goal is to make your applications robust against common security threats and vulnerabilities.