ceh training

Course Details

5-Day, 40-Hour Program.

 

 

Access over 140 live virtual lab
activities on the most current exploits.

 

Over 340 Technologies and Tactics.

 

 

Access over 2,200 hacking tools.

 

CERTIFIED ETHICAL HACKER PROGRAM

The Certified Ethical Hacker (CEH) is a core training program for an information security professional, also referred to as a white-hat hacker, who systematically attempts to inspect network infrastructure with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The Certified Ethical Hacker program is the most comprehensive Ethical Hacking program in the world. It is the first of three courses within our Vulnerability Assessment and Penetration Testing (VAPT) track.

This program will train you on the most advanced tools and techniques used by black and grey hat hackers alike to break into an organization to assess, document, and remediate vulnerabilities from a vendor neutral perspective. CEH will put you in the driver’s seat of an interactive, hand’s-on learning environment that challenges you to test the integrity of systems and networks by hacking them!

 

CEH’s 5 Phases of Ethical Hacking

Course Outline

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography

Here are 10 Reasons to pursue the Certified Ethical Hacker Program:

Multiple Modes of Learning

 

This solution is an on-demand video steaming platform that delivers EC-Council’s sought-after IT Security training courses in an easy-to-access form for busy lifestyles.

Request a Call Back

This solution is a live, online, instructor-led training course, which means you can attend a course with a live instructor from anywhere with an internet connection.

This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.

CEH Exams

Prove Your Skills and Abilities With Online, Practical Examinations.

 

Certified Ethical Hacker (CEH) Certification

The CEH exam is a 4-hour exam with 125 multiple choice questions. This knowledge based exam will text your skills in Information Security Threats and Attack Vectors, Attack Detection, Attack Prevention, Procedures, Methodologies and more!

Access our exam for blueprint for CEH

CEH Practical Certification

CEH Practical is a 6-hour, rigorous exam that requires you to demonstrate skills and abilities of ethical hacking techniques such as:

  • Port scanning tools (e.g., Nmap, Hping)
  • Vulnerability detection
  • Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
  • SQL injection methodology and evasion techniques
  • Web application security tools (e.g., Acunetix WVS)
  • SQL injection detection tools (e.g., IBM Security AppScan)
  • Communication protocols
and more…
  • Port scanning tools (e.g., Nmap, Hping)
  • Vulnerability detection
  • Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
  • SQL injection methodology and evasion techniques
  • Web application security tools (e.g., Acunetix WVS)
  • SQL injection detection tools (e.g., IBM Security AppScan)
  • Communication protocols
  • Scanning (e.g., Port scanning, banner grabbing, vulnerability scanning, network discovery, proxy chaining, IP spoofing)
  • Cryptography
  • Cryptography toolkit (e.g., OpenSSL)
  • Web server attack methodology
  • Operating environments (e.g., Linux, Windows, Mac)
  • Web application hacking methodology
  • Encryption algorithms
  • System hacking (e.g., password cracking, privilege escalation, executing applications, hiding files, covering tracks)
  • Vulnerability scanning
  • Exploitation tools
  • Application/file server
  • Database structures
  • Wireless and Bluetooth hacking methodology
  • Wireless terminologies
  • Wireless encryption
  • Network/wireless sniffers (e.g., Wireshark, Airsnort)
  • Malware (e.g., Trojan, virus, backdoor, worms)
  • Botnet
  • Malware analysis
  • Network sniffing
  • Backups and archiving (e.g., local, network)
  • Data analysis
  • Log analysis tools
  • Cryptanalysis tool (e.g., CrypTool)
This is the next step to become a CEH Master after you have achieved your CEH certification. Within CEH Practical you will have a limited amount of time to complete 20 challenges testing your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VM’s and applications with solutions to uncover vulnerabilities.

CEH Master

Upon Completing the CEH (Master) program, consisting of CEH and CEH (Practical), the CEH (Master) designation is awarded. Once you have achieved both the CEH and CEH Practical certifications you are now a CEH Master. CEH Masters have shown proficiency at a master level in the Knowledge, Skills, and abilities of Ethical Hacking with a total 6 hours of testing to prove their competency. Top 10 performers in both CEH and CEH Practical exams will be showcased on the CEH Master, Global Ethical Hacking Leader Board.

About the Exam

 

Image

Testimonials

Career Transition Handbook Learn more about successful career transitions in Ethical Hacking

Resources

 

Frequently Asked Questions

 

About The Program

Course Outline

EC-Council places great emphasis on the quality of its instructors. A 17-year-old will not be teaching security to professionals at our accredited training centres. Certainly, experience is the greatest teacher. However, EC-Council adheres to a code of ethics and encourages security professionals with significant years of teaching experience in the industry and a security background to handle our security related courses.

 

 

What makes this course different from others in the market?

The Ethical Hacking and Countermeasures course prepares candidates for the CEH exam offered by EC-Council. The course focuses on hacking techniques and technologies from an offensive perspective. This advanced security course is regularly updated to reflect the latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.

 

What can I take back to my organization if I certify as a CEH?

EC-Council believes in giving back to the security community as it has partaken of it. When you are a Certified Ethical Hacker, you are more than a security auditor or a vulnerability tester or a penetration tester alone. You are exposed to security checklists that will help you audit the organization’s information assets, tools which will check for vulnerabilities that can be exploited and above all a methodology to assess the security posture of your organization by doing a penetration test against it. In short, the knowledge you will acquire has practical value to make your work place a more secure and efficient one.

 

Where does CEH stand when compared to other educational offerings in the field of information security?

Consider this: A security defense course educates candidates regarding proper configuration, firewalls, or rather pre-emptive security. CEH takes the alternative approach – defense in depth by attacking the systems. This is in sharp contrast to courses that teach defensive tactics alone. CEH imparts offensive tactics supplemented with defensive countermeasures. This ensures that the CEH professional can have a holistic security perspective of the organization.

 

What are Hacking techniques and their technology?

Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. These techniques extend beyond the technology domain and can be applied to test security policies and procedures. Hacking technologies are used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. As technology advances, the skills required to execute a hack are much lesser as pre-compiled programs are available to effect havoc with simple point and click.

 

I am a CEH. What is my level?

Congratulations on becoming a CEH! You have joined an elite group of professionals around the world. Your next level is to become an EC-Council Certified Security Analyst (E|CSA) or proceed with the CEH (Practical).

 

What is the retake policy?

Retake exam requests can only be purchased by writing to [email protected], should a candidate fail the exam.  You can also read more about the retake policy Here

Exam Policies

Can I pursue self-study and attempt the exam instead of attending formal training?

The answer is yes. You must show 2 years of work experience in security related field. You must also submit a CEH exam eligibility application and obtain an authorization from EC-Council before you can attempt the exam. For more details, please click HERE.

What are the eligibility criteria to apply for the CEH (ANSI) exam?

To be eligible to apply to sit for the CEH (ANSI) Exam, a candidate must either:

  • Hold a CEH certification of version 1 to 7,

* (Prior to being ANSI accredited, EC-Council’s certifications were named, based on versions – CEHV1, CEHV2 etc. During that time, candidates that attempted the certification exams were vetted for eligibility. In order to avoid “being double bill”, the EC-Council Certification department shall issue a waiver of the application fee of any candidate that has a CEH V1- CEH V7 certification and wishes to attempt the CEH ANSI certification.)

  • or Have a minimum of 2 years work experience in InfoSec domain (You will need to pay USD100 as a non-refundable application fee);
  • Or Have attended an official EC-Council training (All candidates are required to pay the $100 application fee; however, your training fee shall include this fee)

Note:

  • As various consumer laws across the world to prohibit any type of “price fixing”, EC-Council Certification department is unable to prescribe minimum pricing for its exams. This allows a free market approach which benefits our certification community.
  • As the price of an exam vouchers is many times bundled with official training by our accredited partners, the price may vary depending on the region, training facilities, training partner, the trainers experience, cost of proctoring the exam and even the mode of training of the partner.
  • It is imperative that we make it clear that no student shall be deemed to have any added advantage whatsoever from one mode of training to another in order to challenge the CEH ANSI exam as the exam is a standard exam for everyone, regardless of the method of training.
  • Should any training partner attempt to tell you otherwise, we ask that you lodge an official complaint with the EC-Council certification department so that the necessary action can be taken against the training partner.

 

 

How long does the application process take?

On an average, application processing time would be between 5-10 working days once the verifiers on the application respond to EC-Council’s requests for information.

 

Is the $100 application fee refundable?

No, the $100 application fee is not refundable.

For how long is the approved application valid for?

The application process is valid for 3 months from the date of approval.

 

Is the application form mandatory for all test takers?

Yes, the application form is mandatory for all test takers who want to take the exam directly without undergoing training.

 

What is the next step once the application is approved?

Once your application is approved you can proceed to purchase your exam voucher either from EC-Council Online Store or from one of our authorised training channels.

 

What is the format of the CEH (ANSI) exam? Where is the exam available?

The CEH (ANSI) exam is an MCQ (Multiple Choice Question) exam. This exam is available at the ECC Exam Centre and the Pearson Vue Centre

 

For how long is the exam voucher code valid for?

The exam voucher code is valid for 1 year from the date of receipt.

 

Is the exam proctored? What are the proctoring options available?

For those attempting the exam at a physical testing centre (ETC/ Pearson Vue), the exam will be proctored by a proctor authorised at the testing centre.

For those attempting the exam remotely (ECC/ ProctorU), The exam will be proctored remotely by an authorised proctor.

 

What is the duration of the exam?

The Exam is a 4-hour session.

What is the passing criteria?

This exam does not have a set passing score/ percentage, the number of items that you must answer correctly varies depending on the difficulty of the questions delivered when you take the exam. To understand how the scoring pattern works, visit the scoring section here.

 

How much notice is required to book a remotely proctored exam session?

Sessions should be booked at least 3 days in advance of the desired exam date.

Note: All exam sessions are proctored by EC-Council Certification department.

 

General

Isn't this knowledge harmful? Why do you make it available so easily to the public?

EC-Council fulfils its social responsibility by ensuring that only persons with a minimum of two years of security related experience are eligible for the course. In addition, all candidates are required to sign an agreement where they agree to respect the knowledge acquired and not misuse it in any way. The candidate also agrees to abide by all legal laws of their respective countries of residence in the use of thus acquired knowledge. Besides the CEH exam is a tough one to pass as students must have in-depth knowledge to achieve the globally recognized ethical hacking certification.

 

Aren't tools meant for script kiddies?

Does it matter if an elite hacker writes a buffer overflow or a script kiddy runs a tool if the target system gets compromised anyway? The point here is that the enemy may be intellectually great or small, but he/she requires just one port of entry to wreck damage while the organization has the entire perimeter to guard with limited time and resources.

 

What is the employment value of CEH?

The ANSI accredited Ethical Hacking program is primarily targeted at security professionals who want to acquire a well-rounded body of knowledge to have better opportunities in this field. Acquiring a Certified Ethical Hacking Certification means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.

 

What are the important things to keep in mind before I schedule my exam with a remote proctor?

Once you are ready to proceed with your exam, please ensure you understand the below:

  • You need to run an equipment test
  • You need to carry an identification proof
  • You should hold an valid exam voucher

 

Is the CEH (ANSI) title a part of the EC-Council Continuing Education Scheme?

Yes, the CEH (ANSI) is a part of the EC-Council Continuing Education Scheme.

 

It is all too technical. Do you reflect real-world business issues?

The value of CEH lies in its practical value. Over 18 domains, students are exposed to business risks and the potential damage that can occur due to negligence. Students will be able to make an informed decision regarding the amount of risk a company can face if it chooses to address a security concern.

 

Get Trained