
Become a Certified Ethical Hacker
"*" indicates required fields
CERTIFIED PROFESSIONALS IN 150 COUNTRIES






"*" indicates required fields
"*" indicates required fields
(Windows 11, Windows Servers, Linux, Ubuntu, Android)
This program will train you on the most advanced hacking tools and techniques used by black and grey hat hackers alike to break into an organization to assess, document, and remediate vulnerabilities from a vendor-neutral perspective. CEH v12 will put you in the driver’s seat of an interactive, hands-on learning environment that challenges you to test the integrity of systems and networks by hacking them!
Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
<div class=”row my-3″>
<div class=”col-sm-4″><strong>Hands-on Lab Exercises: </strong></div>
<div class=”col-sm-8″>
Over 15 hands-on exercises with real-life simulated targets to build skills on how to:
<ul style=”margin: 0px; padding: 0px;”>
<li style=”list-style-type: none;”>
<ul style=”margin: 0px; padding: 0px;”>
<li>Perform Web Application Reconnaissance using Various Tools</li>
<li>Perform Web Spidering</li>
<li>Perform Web Application Vulnerability Scanning</li>
<li>Perform a Brute-force Attack</li>
<li>Perform Cross-site Request Forgery (CSRF) Attack</li>
<li>Identify XSS Vulnerabilities in Web Applications</li>
<li>Detect Web Application Vulnerabilities using Various Web Application Security Tools</li>
</ul>
</li>
</ul>
</div>
</div>
<div class=”row my-3″>
<div class=”col-sm-4″><strong>Key topics covered: </strong></div>
<div class=”col-sm-8″>Web Application Architecture, Web Application Threats, OWASP Top 10 Application Security Risks – 2021, Web Application Hacking Methodology, Web API, Webhooks, and Web Shell, Web API Hacking Methodology, Web Application Security</div>
</div>
Get in Depth information of CEH course: Download Brochure Now!
The CEH v12 exam is a 4-hour exam with 125 multiple-choice questions. This knowledge-based exam will test your skills in information security threats and attack vectors, attack detection, attack prevention, procedures, methodologies, and more!
CEH Practical is a 6-hour, rigorous exam that requires you to demonstrate the skills and abilities in various ethical hacking techniques such as:
This is the next step to become a CEH Master after you have achieved your CEH certification. With the CEH Practical, you will have a limited amount of time to complete 20 challenges testing your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VM’s and applications with solutions to uncover vulnerabilities.
Upon Completing the CEH (Master) program, consisting of CEH and CEH (Practical), the CEH (Master) designation is awarded. Once you have achieved both the CEH and CEH Practical certifications, you are now a CEH Master. CEH Masters have shown proficiency at a master level in the Knowledge, Skills, and abilities of Ethical Hacking with a total 6-hours of testing to prove their competency. Top 10 performers in both CEH and CEH Practical exams will be showcased on the CEH Master, Global Ethical Hacking Leader Board.
Exam Details | C|EH MCQ(Exam) | C|EH (Practical) |
---|---|---|
Number of Questions/ Practical Challenges | 125 | 20 |
Test Duration | 4 Hours | 6 Hours |
Test Format | Multiple Choice Questions | iLabs Cyber Range |
Test Delivery | ECC EXAM, VUE | – |
Availability | – | Aspen – iLabs |
Exam Prefix | 312-50(ECC EXAM), 312-50(VUE) | – |
For more than 15 years, EC-Council’s Cybersecurity programs have empowered cybersecurity professionals around the world to exercise their training and expertise to combat cyberattacks. The Hall of Fame celebrates those individuals who have excelled, achieved, and fostered a spirit of leadership among their colleagues and peers within the cyber community.
Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. These techniques extend beyond the technology domain and can be applied to test security policies and procedures. Hacking technologies are used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. As technology advances, the skills required to execute a hack are much lesser as pre-compiled programs are available to effect havoc with simple point and click.
"*" indicates required fields
"*" indicates required fields
"*" indicates required fields