From the creators of Certified Ethical Hacker (CEH) comes the new and evolved version 13 with added AI capabilities. Structured across 20 learning modules covering over 550 attack techniques, CEH provides you with the core knowledge you need to thrive as a cybersecurity professional.
The world’s first ethical hacking certification to harness the power of AI.
Hone your skills in real-world scenarios through hands-on labs, where you practice attack vectors and master advanced hacking tools.
Learn AI-driven techniques to boost efficiency in cyber defense by 40% while streamlining your workflow.
Master the latest advanced attack techniques, trends, and countermeasures.
Advanced threat detection, enhanced decision-making, adaptive learning, enhanced reporting, and automation of repetitive tasks.
Participate in monthly global hacking competitions, compete with your peers, and make it to the leaderboard.
Gain industry-ready skills by learning the multi-platform strategies and tactics used by today’s most sophisticated cybercriminals (including AI) so you can identify system vulnerabilities before they do.
CEH is a globally-recognised certification with flexible-learning options to fit your lifestyle and commitments.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
EC-Council’s Certified Ethical Hacker (CEH) certification gives you the skills and knowledge needed to drive your career forward in the age of AI.
With CEH you’ll learn how to think like a hacker and uncover any hidden vulnerabilities before hackers do.
We’ll equip you to:
EC-Council’s exclusive 4-step framework provides a structured and comprehensive approach to mastering ethical hacking.
Step1:
CEH offers a balanced blend of knowledge-based training and hands-on labs using real-world scenarios and is powered by AI.
Details
Step 2
Upon completing the training, you can attempt both of our exams to demonstrate your skills and earn the CEH Master certification:
Take the knowledge exam
Complete the practical exam
Details
Step 3
CEH helps you develop real-world experience in ethical hacking through hands-on practice in a Cyber Range.
Details
Step 4
Get a year-long access to 12 CTF challenges. Each month presents a different theme and challenge with capture-the-flag style competitions focusing on ethical hackers’ core skills and abilities.
Details
Learn the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Key topics covered:
Elements of Information Security, Classification of Attacks, Hacker Classes, Ethical Hacking, AI-Driven Ethical Hacking, ChatGPT-Powered AI Tools for Ethical Hackers, CEH Ethical Hacking Framework, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Information Assurance (IA), Risk Management, Threat Intelligence Lifecycle, Incident Management, PCI DSS, HIPPA, SOX, GDPR, DPA
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
Key topics covered:
Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting,Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn different network scanning techniques and countermeasures.
Hands-on Labs:
Key topics covered: Network Scanning, Scanning Tools, Host Discovery Techniques, Port Scanning Techniques, Host Discovery and Port Scanning with AI, Service Version Discovery, OS Discovery/Banner Grabbing, Scanning Beyond IDS and Firewall Scanning Detection and Prevention
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are included as well.
Hands-on Labs:
Key topics covered:
Vulnerability Classification, Vulnerability Scoring Systems and Databases, Vulnerability-Management Life Cycle, Vulnerability Research, Vulnerability Scanning and Analysis, Vulnerability Assessment Tools, Vulnerability Assessment Reports, AI-Powered Vulnerability Assessment Tools
Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Hands-on Labs:
Key topics covered:
Password Cracking, Password Attacks, Password-Cracking Tools, Vulnerability Exploitation, Metasploit Framework, AI-Powered Vulnerability Exploitation Tools, Buffer Overflow, Buffer Overflow Detection Tools, Active Directory (AD) enumeration, Privilege Escalation, Privilege Escalation Tools, Executing Applications, Keylogger, Spyware, Rootkits, Steganography, Steganalysis, Steganography Detection Tools, Maintaining Persistence, Linux and Windows Post Exploitation, Covering Tracks, Clearing LogsTrack-Covering Tools,
Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Hands-on Labs:
Key topics covered:
Malware, Advanced Persistent Threat Lifecycle, Trojan, Virus, Ransomware, Computer Worms, Fileless Malware, AI-based Malware, Malware Analysis, Static Malware Analysis, Dynamic Malware Analysis, Virus Detection Methods, Malware Countermeasures, Anti-Trojan Software, AI-Powered Malware Detection and Analysis Tools
Learn about packet-sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Hands-on Labs:
Key topics covered:
Network Sniffing, MAC Flooding, DHCP Starvation Attack, ARP Spoofing, ARP Spoofing/Poisoning Tools, MAC Spoofing, VLAN Hopping, STP Attack, DNS Poisoning Techniques, DNS Poisoning Tools, Sniffing Tools, Sniffer Detection Techniques, Promiscuous Detection Tools
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Hands-on Labs:
Key topics covered:
Social Engineering, Types of Social Engineering, Human-based Social Engineering Techniques, Impersonation, Computer-based Social Engineering Techniques, Phishing, Phishing Tools, Perform Impersonation using AI, Identity Theft, Mobile-based Social Engineering Techniques, Social Engineering Countermeasures, Anti-Phishing Toolbar
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Hands-on Labs:
Key topics covered:
DoS Attack, DDoS Attack, Botnets, DoS/DDoS Attack Techniques, DoS/DDoS Attack Toolkits, DoS/DDoS Attack Detection Techniques, DoS/DDoS Protection Tools, DoS/DDoS Protection Services
Learn the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Hands-on Labs:
Key topics covered:
Session Hijacking, Application-Level Session Hijacking, Compromising Session IDs, Session Hijacking, Network-Level Session Hijacking, TCP/IP Hijacking, RST Hijacking, Blind Hijacking, Session Hijacking Tools, Session Hijacking Detection Methods, Session Hijacking Detection Tools, Approaches to Prevent Session Hijacking
Learn about firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Hands-on Labs:
Key topics covered:
Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Firewall, Types of Firewalls, Intrusion Detection Tools, Intrusion Prevention Tools, IDS/Firewall Evasion Techniques, NAC and Endpoint Security Evasion Techniques, IDS/Firewall Evading Tools, Honeypot, Types of Honeypots, Honeypot Tools, IDS/Firewall Evasion Countermeasures
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Hands-on Labs:
Key topics covered:
Web Server Architecture, Web Server Vulnerabilities, Web Server Attacks, DNS Server Hijacking, Web Cache Poisoning Attack, Web Server Footprinting/Banner Grabbing, Directory Brute Forcing, Vulnerability Scanning, Web Server Password Hacking, Web Server Attack Tools, Web Server Attack Countermeasures, Detecting Web Server Hacking Attempts, Web Server Security Tools
Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
Hands-on Labs:
Key topics covered:
Web Application, OWASP Top 10 Application Security Risks – 2021, Web Application Attacks, Footprint Web Infrastructure, Analyze Web Applications, Bypass Client-side Controls, Attack Access Controls, Attack Web Services, Web API, Webhooks, Web API Hacking Methodology, API Security Risks and Solutions, Web Application Security Testing,Web Application Fuzz Testing, Encoding Schemes, Web Application Attack Countermeasures, Web Application Security Testing Tools
Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Hands-on Labs:
Key topics covered:
SQL Injection, Types of SQL injection, Error Based SQL Injection, Union SQL Injection, Blind/Inferential SQL Injection, SQL Injection Methodology, Information Gathering and SQL Injection Vulnerability Detection, Launch SQL Injection Attacks, Advanced SQL Injection, SQL Injection Tools, SQL Injection with AI, Evasion Techniques, SQL Injection Countermeasures, SQL Injection Detection Tools
Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Hands-on Labs:
Key topics covered:
Wireless Networks, Wireless Standards, Wireless Encryption, Wireless Threats, Wireless Hacking Methodology, Wi-Fi Discovery, Wireless Traffic Analysis, Launch of Wireless Attacks, Wi-Fi Encryption Cracking, Wireless Attack Countermeasures, Wi-Fi Security Auditing Tools
Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Hands-on Labs:
Key topics covered:
OWASP Top 10 Mobile Risks – 2024, Anatomy of a Mobile Attack, App Sandboxing Issues, SMS Phishing Attack (SMiShing), Call Spoofing, OTP Hijacking/Two-Factor Authentication Hijacking, Camera/Microphone Capture Attacks, Android Rooting, Hacking Android Devices, Android Hacking Tools, Android Security Tools, Jailbreaking iOS, Hacking iOS Devices, iOS Device Security Tools, Mobile Device Management (MDM), OWASP Top 10 Mobile Risks and Solutions, Mobile Security Guidelines, Mobile Security Tools
Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Hands-on Labs:
Key topics covered:
IoT Architecture, IoT Technologies and Protocols, OWASP Top 10 IoT Threats, IoT Vulnerabilities, IoT Threats, IoT Attacks, IoT Hacking Methodology, IoT Hacking Tools, IoT Security Tools, IT/OT Convergence (IIOT), OT Technologies and Protocols, OT Vulnerabilities, OT Threats, OT Attacks, OT Hacking Methodology, OT Hacking Tools, OT Security Tools
Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Hands-on Labs:
Key topics covered:
Cloud Computing, Fog Computing, Edge Computing, Container, Docker, Kubernetes, Serverless Computing, OWASP Top 10 Cloud Security Risks, Cloud Computing Threats, Container Vulnerabilities, Kubernetes Vulnerabilities, Cloud Attacks, Cloud Hacking,Methodology, AWS Hacking, Microsoft Azure Hacking, Google Cloud Hacking, Container Hacking, Cloud Network Security, Cloud Security Controls, Cloud Security Tools
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
Hands-on Labs:
Key topics covered:
Cryptography, Ciphers, Symmetric Encryption Algorithms, Asymmetric Encryption Algorithms, Message Digest Functions, Quantum Cryptography, Cryptography Tools, Public Key Infrastructure (PKI), Signed Certificate, Digital Signature, Email Encryption, Disk Encryption, Blockchain,Cryptanalysis Methods, Cryptography Attacks, Attacks on Blockchain, Quantum Computing Attacks, Cryptanalysis Tools
Certification is awarded when the knowledge exam is passed. In order to achieve CEH Master Level certification, an additional practical exam needs to be taken. This practical exam is optional.
The practical exam is optional but will reward you with a higher level of certification. It will test your practical skills with:
Duration 6 hours Questions 20 challenges Delivery iLabs Cyber Range Passing score 60% to 85%
Drive your cybersecurity career forward with CEH, enhanced by the power of AI
Turbocharge your team’s knowledge with certified ethical hacking powered by AI
CEH is trusted and highly valued globally by government departments and defense bodies.
Create and grow your own cybersecurity courses and programs.
Earn world-class certifications trusted and highly valued globally by government bodies, private organizations, and the defense.
Advance your career with our expert guidance.