CEH Certification - Certified Ethical Hacking Course

Master Cybersecurity with EC Council's CEH course and accredited trainers

12.1K Learners

Accredited by

EC-Council

Group Enrollment with Friends or Colleagues |Get a quote

Accredited by

EC-Council

Ethical Hacking Certification Course Overview

Simplilearn’s CEH ethical hacking course offers hands-on experience to help you master techniques used by hackers to breach networks while learning to strengthen your defenses. Aligned with CEH v13 from EC-Council, this course equips you with advanced tools and practices to enhance your cybersecurity skills in an evolving threat landscape.

Exam Pass Guarantee
At Simplilearn, your success is our priority. Enroll in our CEH Certification course and receive a comprehensive exam voucher that includes a complimentary retake for both the Theory and Practical exams, giving you added assurance and flexibility as you confidently certify your ethical hacking skills. Successfully clear both exams to earn the prestigious CEH Master designation, demonstrating your comprehensive expertise in ethical hacking knowledge and hands-on skills.
100% Money Back Guarantee
No questions asked refund*

At Simplilearn, we value the trust of our patrons immensely. But, if you feel that an ethical hacking course does not meet your expectations, we offer a 7-day money-back guarantee. Just send us a refund request via email within 7 days of purchase and we will refund 100% of your payment, no questions asked!

CEH Training Key Features

  • CEH v13 Exam Voucher and Practical Exam Voucher included
  • Access to 6 months of CEH v13 AI Labs with 220+ hands-on exercises
  • Guaranteed to Run Live Sessions on Specified Dates
  • Master 20+ cybersecurity domains and 550 real-world attack techniques
  • Work with 4,000+ hacking and security tools in a cloud-based cyber range labs
  • 8x higher interaction in live online classes conducted by industry experts
  • CEH v13 Exam Voucher and Practical Exam Voucher included
  • Master 20+ cybersecurity domains and 550 real-world attack techniques
  • Access to 6 months of CEH v13 AI Labs with 220+ hands-on exercises
  • Work with 4,000+ hacking and security tools in a cloud-based cyber range labs
  • Guaranteed to Run Live Sessions on Specified Dates
  • 8x higher interaction in live online classes conducted by industry experts
  • CEH v13 Exam Voucher and Practical Exam Voucher included
  • Master 20+ cybersecurity domains and 550 real-world attack techniques
  • Access to 6 months of CEH v13 AI Labs with 220+ hands-on exercises
  • Work with 4,000+ hacking and security tools in a cloud-based cyber range labs
  • Guaranteed to Run Live Sessions on Specified Dates
  • 8x higher interaction in live online classes conducted by industry experts

Skills Covered

  • Trojans Backdoors and Defense Strategies
  • Mobile and Web Security Innovations
  • AI Powered Network Traffic Analysis
  • AI in Vulnerability Scanning and Exploitation
  • Phishing Detection and Prevention
  • Cloud Security and Monitoring Solutions
  • Cyber Threat Intelligence and Response
  • Advanced Hacking Techniques with Intelligent Tools
  • AI Enhanced Intrusion Detection and Prevention
  • Log Management and Threat Detection
  • Social Engineering Attack Simulations
  • Malware Analysis and Remediation
  • Wireless Network Protection
  • Ethical Hacking Reporting and Documentation
  • Trojans Backdoors and Defense Strategies
  • Advanced Hacking Techniques with Intelligent Tools
  • Mobile and Web Security Innovations
  • AI Enhanced Intrusion Detection and Prevention
  • AI Powered Network Traffic Analysis
  • Log Management and Threat Detection
  • AI in Vulnerability Scanning and Exploitation
  • Social Engineering Attack Simulations
  • Phishing Detection and Prevention
  • Malware Analysis and Remediation
  • Cloud Security and Monitoring Solutions
  • Wireless Network Protection
  • Cyber Threat Intelligence and Response
  • Ethical Hacking Reporting and Documentation
  • Trojans Backdoors and Defense Strategies
  • Advanced Hacking Techniques with Intelligent Tools
  • Mobile and Web Security Innovations
  • AI Enhanced Intrusion Detection and Prevention
  • AI Powered Network Traffic Analysis
  • Log Management and Threat Detection
  • AI in Vulnerability Scanning and Exploitation
  • Social Engineering Attack Simulations
  • Phishing Detection and Prevention
  • Malware Analysis and Remediation
  • Cloud Security and Monitoring Solutions
  • Wireless Network Protection
  • Cyber Threat Intelligence and Response
  • Ethical Hacking Reporting and Documentation

Begin Your Journey to Success

Get lifetime access to self-paced e-learning content

Salary Benefits

This certified ethical hacking certification verifies the skills required to thrive in the information security domain. Many IT departments have made CEH compulsory for security-related posts. CEH certified ethical hacker professionals earn 44-percent higher salaries than non-certified professionals.

  • Designation
  • Annual Salary
  • Hiring Companies

Training Options

online Bootcamp

  • Flexi Pass Enabled: Flexibility to reschedule your cohort within first 90 days of access.
  • Lifetime access to high-quality live class recordings
  • 24x7 learner assistance and support
  • Batch starting from:
7th Dec, Weekend Class
8th Jan, Weekday Class
View All Schedules

10% Off$2,999$3,350

Corporate Training

  • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support

Ethical Hacking Course Curriculum

Who can apply for this CEH Certification

This ethical hacking course is for network security officers, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, Information Security Managers, Ethical Hackers, Application Developers, Cybersecurity Consultants and other personnel in associated computer support and information technology departments.
Agreement to terms and conditions: You must agree to the EC-Council's exam policies and code of ethics. 
Read More

Pre-requisites


Learners need to possess an undergraduate degree or a high school diploma.
Learners should have a minimum of 2 Years IT Security experience 
Read More

Course Content

  • Module 01- Introduction to Ethical Hacking

    Preview
    • Lesson 01 - Information Security Overview

      22:30Preview
      • 1 Demo of Aspen and iLabs
        22:30
      • 2 Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
      • 3 Essential Terminology
      • 4 Elements of Information Security
      • 5 The Security, Functionality, and Usability Triangle
    • Lesson 02 - Information Security Threats and Attack Vectors

      01:56Preview
      • 1 Motives, Goals, and Objectives of Information Security Attacks
      • 2 Top Information Security Attack Vectors
      • 3 Information Security Threat Categories
      • 4 Types of Attacks on a System
        01:56
      • 5 Information Warfare
    • Lesson 06 - Penetration Testing Concepts

      • 1 Penetration Testing
      • 2 Why Penetration Testing
      • 3 Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
      • 4 Blue Teaming/Red Teaming
      • 5 Types of Penetration Testing
      • 6 Phases of Penetration Testing
      • 7 Security Testing Methodology
    • Lesson 03 - Hacking Concepts

      01:29Preview
      • 1 What is Hacking
        01:29
      • 2 Who is a Hacker?
      • 3 Hacker Classes
      • 4 Hacking Phases
    • Lesson 04 - Ethical Hacking Concepts

      • 1 What is Ethical Hacking?
      • 2 Why Ethical Hacking is Necessary
      • 3 Scope and Limitations of Ethical Hacking
      • 4 Skills of an Ethical Hacker
    • Lesson 05 - Information Security Controls

      • 1 Information Assurance (IA)
      • 2 Information Security Management Program
      • 4 Enterprise Information Security Architecture (EISA)
      • 5 Network Security Zoning
      • 6 Defense in Depth
      • 7 Information Security Policies
      • 8 Physical Security
      • 10 What is Risk?
      • 11 Threat Modeling
      • 12 Incident Management
      • 13 Security Incident and Event Management (SIEM)
      • 14 User Behavior Analytics (UBA)
      • 15 Network Security Controls
      • 16 Identity and Access Management (IAM)
      • 17 Data Leakage
      • 18 Data Backup
      • 19 Data Recovery
      • 20 Role of AI/ML in Cyber Security
    • Lesson 07 - Information Security Laws and Standards

      • 1 Payment Card Industry Data Security Standard (PCI-DSS)
      • 2 ISO/IEC 27001:2013
      • 3 Health Insurance Portability and Accountability Act (HIPAA)
      • 4 Sarbanes Oxley Act (SOX)
      • 5 The Digital Millennium Copyright Act (DMCA)
      • 6 Federal Information Security Management Act (FISMA)
      • 7 Cyber Law in Different Countries
  • Module 02- Footprinting and Reconnaissance

    Preview
    • Lesson 01 - Footprinting Concepts

      01:04Preview
      • 1 What is Footprinting?
        01:04
      • 2 Objectives of Footprinting
    • Lesson 02 - Footprinting through Search Engines

      18:51Preview
      • 1 Footprinting through Search Engines
        12:09
      • 2 Footprinting using Advanced Google Hacking Techniques
      • 3 Information Gathering Using Google Advanced Search and Image Search
      • 4 Google Hacking Database
        06:42
      • 5 VoIP and VPN Footprinting through Google Hacking Database
    • Lesson 03 - Footprinting through Web Services

      08:37
      • 1 Finding Company’s Top-level Domains (TLDs) and Sub-domains
      • 2 Finding the Geographical Location of the Target
      • 3 People Search on Social Networking Sites and People Search Services
        07:41
      • 4 Gathering Information from LinkedIn
      • 5 Gather Information from Financial Services
      • 6 Footprinting through Job Sites
        00:56
      • 7 Monitoring Target Using Alerts
      • 8 Information Gathering Using Groups, Forums, and Blogs
      • 9 Determining the Operating System
      • 10 VoIP and VPN Footprinting through SHODAN
    • Lesson 04 - Footprinting through Social Networking Sites

      • 1 Collecting Information through Social Engineering on Social Networking Sites
    • Lesson 05 - Website Footprinting

      08:21
      • 1 Website Footprinting
        08:21
      • 2 Website Footprinting using Web Spiders
      • 3 Mirroring Entire Website
      • 4 Extracting Website Information from https://archive.org
      • 5 Extracting Metadata of Public Documents
      • 6 Monitoring Web Pages for Updates and Changes
    • Lesson 06- Email Footprinting

      37:01
      • 1 Tracking Email Communications
        37:01
      • 2 Collecting Information from Email Header
      • 3 Email Tracking Tools
    • Lesson 07- Competitive Intelligence

      00:50
      • 1 Competitive Intelligence Gathering
        00:50
      • 2 Competitive Intelligence - When Did this Company Begin? How Did it Develop?
      • 3 Competitive Intelligence - What Are the Company's Plans?
      • 4 Competitive Intelligence - What Expert Opinions Say About the Company
      • 5 Monitoring Website Traffic of Target Company
      • 6 Tracking Online Reputation of the Target
    • Lesson 08- Whois Footprinting

      42:37
      • 1 Whois Lookup
        12:11
      • 2 Whois Lookup Result Analysis
        30:26
      • 3 Whois Lookup Tools
      • 4 Finding IP Geolocation Information
    • Lesson 09- DNS Footprinting

      • 1 Extracting DNS Information
      • 2 DNS Interrogation Tools
    • Lesson 10- Network Footprinting

      • 1 Locate the Network Range
      • 2 Traceroute
      • 3 Traceroute
      • 4 Traceroute Tools
    • Lesson 11- Footprinting through Social Engineering

      09:17Preview
      • 1 Footprinting through Social Engineering
        09:17
      • 2 Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
    • Lesson 12- Footprinting Tools

      • 1 Maltego
      • 2 Recon-ng
      • 3 FOCA
      • 4 Recon-Dog
      • 5 OSRFramework
      • 6 Additional Footprinting Tools
    • Lesson 13- Countermeasures

      00:57
      • 1 Footprinting Countermeasures
        00:57
    • Lesson 14- Footprinting Pen Testing

      • 1 Footprinting Pen Testing
      • 2 Footprinting Pen Testing Report Templates
  • Module 03- Scanning Networks

    Preview
    • Lesson 01 - Network Scanning Concepts

      • 1 Overview of Network Scanning
      • 2 TCP Communication Flags
      • 3 TCP/IP Communication
      • 4 Creating Custom Packet Using TCP Flags
      • 5 Scanning in IPv6 Networks
    • Lesson 02 - Scanning Tools

      • 1 Nmap
      • 2 Hping2 / Hping3
      • 3 Scanning Tools
      • 4 Scanning Tools for Mobile
    • Lesson 03- Scanning Techniques

      • 1 Scanning Technique
      • 2 Port Scanning Countermeasures
    • Lesson 04- Scanning Beyond IDS and Firewall

      • 1 IDS/Firewall Evasion Techniques
    • Lesson 05- Banner Grabbing

      06:25Preview
      • 1 Banner Grabbing
        03:19
      • 2 How to Identify Target System OS
        03:06
      • 3 Banner Grabbing Countermeasures
    • Lesson 06- Draw Network Diagrams

      • 1 Draw Network Diagrams
      • 2 Network Discovery and Mapping Tools
      • 3 Network Discovery Tools for Mobile
    • Lesson 07- Scanning Pen Testing

      • 1 Scanning Pen Testing
  • Module 04- Enumeration

    Preview
    • Lesson 01 - Enumeration Concepts

      • 1 What is Enumeration?
      • 2 Techniques for Enumeration
      • 3 Services and Ports to Enumerate
    • Lesson 02 - NetBIOS Enumeration

      14:40Preview
      • 1 NetBIOS Enumeration
        14:40
      • 2 NetBIOS Enumeration Tool
      • 3 Enumerating User Accounts
      • 4 Enumerating Shared Resources Using Net View
    • Lesson 03 - SNMP Enumeration

      06:20Preview
      • 1 SNMP (Simple Network Management Protocol) Enumeration
        06:20
      • 2 Working of SNMP
      • 3 Management Information Base (MIB)
      • 4 SNMP Enumeration Tools
    • Lesson 04 - LDAP Enumeration

      05:45Preview
      • 1 LDAP Enumeration
        05:45
      • 2 LDAP Enumeration Tools
    • Lesson 05 - NTP Enumeration

      03:59
      • 1 NTP Enumeration
        03:59
      • 2 NTP Enumeration Commands
      • 2 NTP Enumeration Tools
    • Lesson 06 - SMTP Enumeration and DNS Enumeration

      17:21Preview
      • 1 SMTP Enumeration
        17:21
      • 2 SMTP Enumeration Tools
      • 3 DNS Enumeration Using Zone Transfer
    • Lesson 07 - Other Enumeration Techniques

      • 1 IPsec Enumeration
      • 2 VoIP Enumeration
      • 3 RPC Enumeration
      • 4 Unix/Linux User Enumeration
    • Lesson 08 - Enumeration Countermeasures

      • 1 Enumeration Countermeasures
    • Lesson 09 - Enumeration Pen Testing

      • 1 Enumeration Pen Testing
  • Module 05- Vulnerability Analysis

    Preview
    • Lesson 01- Vulnerability Assessment Concepts

      • 1 Vulnerability Research
      • 2 Vulnerability Classification
      • 3 What is Vulnerability Assessment?
      • 4 Types of Vulnerability Assessment
      • 5 Vulnerability-Management Life Cycle
    • Lesson 02- Vulnerability Assessment Solutions

      • 1 Comparing Approaches to Vulnerability Assessment
      • 2 Working of Vulnerability Scanning Solutions
      • 3 Types of Vulnerability Assessment Tools
      • 4 Characteristics of a Good Vulnerability Assessment Solution
      • 5 Choosing a Vulnerability Assessment Tool
      • 6 Criteria for Choosing a Vulnerability Assessment Tool
      • 7 Best Practices for Selecting Vulnerability Assessment Tools
    • Lesson 03- Vulnerability Scoring Systems

      • 1 Common Vulnerability Scoring System (CVSS)
      • 2 Common Vulnerabilities and Exposures (CVE)
      • 3 National Vulnerability Database (NVD)
      • 4 Resources for Vulnerability Research
    • Lesson 04- Vulnerability Assessment Tools

      • 1 Vulnerability Assessment Tools
      • 2 Vulnerability Assessment Tools for Mobile
    • Lesson 05- Vulnerability Assessment Reports

      • 1 Vulnerability Assessment Reports
      • 2 Analyzing Vulnerability Scanning Report
  • Module 06- System Hacking

    Preview
    • Lesson 01- System Hacking Concepts

      • 1 CEH Hacking Methodology (CHM)
      • 2 System Hacking Goals
    • Lesson 02- Cracking Passwords

      • 1 Password Cracking
      • 2 Types of Password Attacks
      • 3 Password Recovery Tools
      • 4 Microsoft Authentication
      • 5 How Hash Passwords Are Stored in Windows SAM?
      • 6 NTLM Authentication Process
      • 7 Kerberos Authentication
      • 8 Password Salting
      • 9 Tools to Extract the Password Hashes
      • 10 Password Cracking Tools
      • 11 How to Defend against Password Cracking
      • 12 How to Defend against LLMNR/NBT-NS Poisoning
    • Lesson 03- Escalating Privileges

      • 1 Privilege Escalation
      • 2 Privilege Escalation Using DLL Hijacking
      • 3 Privilege Escalation by Exploiting Vulnerabilities
      • 4 Privilege Escalation Using Dylib Hijacking
      • 5 Privilege Escalation using Spectre and Meltdown Vulnerabilities
      • 6 Other Privilege Escalation Techniques
      • 7 How to Defend Against Privilege Escalation
    • Lesson 04- Executing Applications

      • 1 Executing Applications
      • 2 Keylogger
      • 3 Spyware
      • 4 How to Defend Against Keyloggers
      • 5 How to Defend Against Spyware
    • Lesson 05- Hiding Files

      • 1 Rootkits
      • 2 NTFS Data Stream
      • 3 What is Steganography?
    • Lesson 06- Covering Tracks

      • 1 Covering Tracks
      • 2 Disabling Auditing: Auditpol
      • 3 Clearing Logs
      • 4 Manually Clearing Event Logs
      • 5 Ways to Clear Online Tracks
      • 6 Covering BASH Shell Tracks
      • 7 Covering Tracks on Network
      • 8 Covering Tracks on OS
      • 9 Covering Tracks Tools
    • Lesson 07- Penetration Testing

      • 1 Password Cracking
      • 2 Privilege Escalation
      • 3 Executing Applications
      • 4 Hiding Files
      • 5 Covering Tracks
  • Module 07- Malware Threats

    Preview
    • Lesson 01- Malware Concepts

      • 1 Introduction to Malware
      • 2 Different Ways a Malware can Get into a System
      • 3 Common Techniques Attackers Use to Distribute Malware on the Web
      • 4 Components of Malware
    • Lesson 02- Trojan Concepts

      • 1 What is a Trojan?
      • 2 How Hackers Use Trojans
      • 3 Common Ports used by Trojans
      • 4 How to Infect Systems Using a Trojan
      • 5 Trojan Horse Construction Kit
      • 6 Wrappers
      • 7 Crypters
      • 8 How Attackers Deploy a Trojan
      • 9 Exploit Kits
      • 10 Evading Anti-Virus Techniques
      • 11 Types of Trojans
    • Lesson 03- Virus and Worm Concepts

      • 1 Introduction to Viruses
      • 2 Stages of Virus Life
      • 3 Working of Viruses
      • 4 Indications of Virus Attack
      • 5 How does a Computer Get Infected by Viruses
      • 6 Virus Hoaxes
      • 7 Fake Antiviruses
      • 8 Ransomware
      • 9 Types of Viruses
      • 10 Creating Virus
      • 11 Computer Worms
      • 12 Worm Makers
    • Lesson 04- Malware Analysis

      • 1 What is Sheep Dip Computer?
      • 2 Anti-Virus Sensor Systems
      • 3 Introduction to Malware Analysis
      • 4 Malware Analysis Procedure: Preparing Testbed
      • 5 Static Malware Analysis
      • 6 Dynamic Malware Analysis
      • 7 Virus Detection Methods
      • 8 Trojan Analysis: ZeuS/Zbot
      • 9 Virus Analysis: WannaCry
    • Lesson 05- Countermeasures

      • 1 Trojan Countermeasures
      • 2 Backdoor Countermeasures
      • 3 Virus and Worms Countermeasures
    • Lesson 06- Anti-Malware Software

      • 1 Anti-Trojan Software
      • 2 Antivirus Software
    • Lesson 07- Malware Penetration Testing

      • 1 Malware Penetration Testing
  • Module 08- Sniffing

    Preview
    • Lesson 01- Sniffing Concepts

      • 1 Network Sniffing
      • 2 Types of Sniffing
      • 3 How an Attacker Hacks the Network Using Sniffers
      • 4 Protocols Vulnerable to Sniffing
      • 5 Sniffing in the Data Link Layer of the OSI Model
      • 6 Hardware Protocol Analyzers
      • 7 SPAN Port
      • 8 Wiretapping
      • 9 Lawful Interception
    • Lesson 02- Sniffing Technique: MAC Attacks

      • 1 MAC Address/CAM Table
      • 2 How CAM Works
      • 3 What Happens When CAM Table Is Full?
      • 4 MAC Flooding
      • 5 Switch Port Stealing
      • 6 How to Defend against MAC Attacks
    • Lesson 03- Sniffing Technique: DHCP Attacks

      • 1 How DHCP Works
      • 2 DHCP Request/Reply Messages
      • 3 DHCP Starvation Attack
      • 4 Rogue DHCP Server Attack
      • 5 How to Defend Against DHCP Starvation and Rogue Server Attack
    • Lesson 04- Sniffing Technique: ARP Poisoning

      • 1 What Is Address Resolution Protocol (ARP)?
      • 2 ARP Spoofing Attack
      • 3 Threats of ARP Poisoning
      • 4 ARP Poisoning Tools
      • 5 How to Defend Against ARP Poisoning
      • 6 Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
      • 7 ARP Spoofing Detection Tools
    • Lesson 05- Sniffing Technique: Spoofing Attacks

      • 1 MAC Spoofing/Duplicating
      • 2 MAC Spoofing Technique: Windows
      • 3 MAC Spoofing Tools
      • 4 IRDP Spoofing
      • 5 How to Defend Against MAC Spoofing
    • Lesson 06- Sniffing Technique: DNS Poisoning

      • 1 DNS Poisoning Techniques
      • 2 How to Defend Against DNS Spoofing
    • Lesson 07- Sniffing Tools

      • 1 Sniffing Tool: Wireshark
      • 2 Sniffing Tools
      • 3 Packet Sniffing Tools for Mobile
    • Lesson 08- Countermeasures

      • 1 How to Defend Against Sniffing
    • Lesson 09- Sniffing Detection Techniques

      • 1 How to Detect Sniffing
      • 2 Sniffer Detection Techniques
      • 3 Promiscuous Detection Tools
    • Lesson 10- Sniffing Pen Testing

      • 1 Sniffing Penetration Testing
  • Module 09- Social Engineering

    Preview
    • Lesson 01 - Social Engineering Concepts

      • 1 What is Social Engineering?
      • 2 Phases of a Social Engineering Attack
    • Lesson 02 - Social Engineering Techniques

      • 1 Types of Social Engineering
      • 2 Human-based Social Engineering
      • 3 Computer-based Social Engineering
      • 4 Mobile-based Social Engineering
    • Lesson 04 - Impersonation on Social Networking Sites

      • 1 Social Engineering Through Impersonation on Social Networking Sites
      • 2 Impersonation on Facebook
      • 3 Risks of Social Networking Threats to Corporate Networks
    • Lesson 05 - Identity Theft

      • 1 Identify Theft
    • Lesson 06 - Countermeasures

      • 1 Social Engineering Countermeasures
      • 2 Insider Threats Countermeasures
      • 3 Identity Theft Countermeasures
      • 4 How to Detect Phishing Emails
      • 5 Anti-Phishing Toolbar
      • 6 Common Social Engineering Targets and Defense Strategies
    • Lesson 07 - Social Engineering Penetration Testing

      • 1 Social Engineering Pen Testing
      • 2 Social Engineering Pen Testing Tools
    • Lesson 03- Insider Threats

      • 1 Insider Threat / Insider Attack
      • 2 Type of Insider Threats
  • Module 10- Denial-of-Service

    Preview
    • Lesson 01 - DoS/DDoS Concepts

      • 1 What is Denial of Service Attack?
      • 2 What is Distributed Denial of Service Attack?
    • Lesson 02 - DoS/DDoS Attack Techniques

      • 1 Basic Categories of DoS/DDoS Attack Vectors
      • 2 UDP Flood Attack
      • 3 ICMP Flood Attack
      • 4 Ping of Death and Smurf Attack
      • 5 SYN Flood Attack
      • 6 Fragmentation Attack
      • 7 HTTP GET/POST and Slowloris Attacks
      • 8 Multi-Vector Attack
      • 9 Peer-to-Peer Attacks
      • 10 Permanent Denial-of-Service Attack
      • 11 Distributed Reflection Denial-of-Service (DRDoS)
    • Lesson 03 - Botnets

      • 1 Organized Cyber Crime: Organizational Chart
      • 2 Botnet
      • 3 A Typical Botnet Setup
      • 4 Botnet Ecosystem
      • 5 Scanning Methods for Finding Vulnerable Machines
      • 6 How Malicious Code Propagates?
      • 7 Botnet Trojan
    • Lesson 04 - DDoS Case Study

      • 1 DDoS Attack
      • 2 Hackers Advertise Links to Download Botnet
      • 3 Use of Mobile Devices as Botnets for Launching DDoS Attacks
      • 4 DDoS Case Study: Dyn DDoS Attack
    • Lesson 05 - DoS/DDoS Attack Tools

      • 1 DoS and DDoS Attack Tool
      • 2 DoS and DDoS Attack Tool for Mobile
    • Lesson 06 - Countermeasures

      • 1 Detection Techniques
      • 2 DoS/DDoS Countermeasure Strategies
      • 3 DDoS Attack Countermeasures
      • 4 Techniques to Defend against Botnets
      • 5 DoS/DDoS Countermeasures
      • 6 DoS/DDoS Protection at ISP Level
      • 7 Enabling TCP Intercept on Cisco IOS Software
    • Lesson 07 - DoS/DDoS Protection Tools

      • 1 Advanced DDoS Protection Appliances
      • 2 DoS/DDoS Protection Tools
    • Lesson 08 - DoS/DDoS Attack Penetration Testing

      • 1 Denial-of-Service (DoS) Attack Pen Testing
  • Module 11- Session Hijacking

    Preview
    • Lesson 01- Session Hijacking Concepts

      • 1 What is Session Hijacking?
      • 2 Why Session Hijacking is Successful?
      • 3 Session Hijacking Process
      • 4 Packet Analysis of a Local Session Hijack
      • 5 Types of Session Hijacking
      • 6 Session Hijacking in OSI Model
      • 7 Spoofing vs. Hijacking
    • Lesson 02- Application Level Session Hijacking

      • 1 Application Level Session Hijacking
      • 2 Compromising Session IDs using Sniffing and by Predicting Session Token
      • 3 Compromising Session IDs Using Man-in-the-Middle Attack
      • 4 Compromising Session IDs Using Man-in-the-Browser Attack
      • 5 Compromising Session IDs Using Client-side Attacks
      • 6 Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
      • 7 Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
      • 8 Compromising Session IDs Using Session Replay Attack
      • 9 Compromising Session IDs Using Session Fixation
      • 10 Session Hijacking Using Proxy Servers
      • 11 Session Hijacking Using CRIME Attack
      • 12 Session Hijacking Using Forbidden Attack
    • Lesson 03- Network Level Session Hijacking

      • 1 TCP/IP Hijacking
      • 2 IP Spoofing: Source Routed Packets
      • 3 RST Hijacking
      • 4 Blind Hijacking
      • 5 UDP Hijacking
      • 6 MiTM Attack Using Forged ICMP and ARP Spoofing
    • Lesson 04- Session Hijacking Tools

      • 1 Session Hijacking Tools
      • 2 Session Hijacking Tools For Mobile
    • Lesson 05- Countermeasures

      • 1 Session Hijacking Detection Methods
      • 2 Protecting against Session Hijacking
      • 3 Methods to Prevent Session Hijacking: To be Followed by Web Developers
      • 4 Methods to Prevent Session Hijacking: To be Followed by Web Users
      • 5 Session Hijacking Detection Tools
      • 6 Approaches Vulnerable to Session Hijacking and their Preventative Solutions
      • 7 Approaches to Prevent Session Hijacking
      • 8 IPSec
      • 9 Session Hijacking Prevention Tools
    • Lesson 06- Penetration Testing

      • 1 Session Hijacking Pen Testing
  • Module 12 - Evading IDS, Firewalls, and Honeypots

    Preview
    • Lesson 01- IDS, Firewall and Honeypot Concepts

      • 1 Intrusion Detection System (IDS)
      • 2 Firewall
      • 3 Honeypot
    • Lesson 02- IDS, Firewall and Honeypot Solutions

      • 1 Intrusion Detection Tool
      • 2 Firewalls
      • 3 Honeypot Tools
    • Lesson 03- Evading IDS

      • 1 IDS Evasion Techniques
    • Lesson 04- Evading Firewalls

      • 1 Firewall Evasion Techniques
    • Lesson 05- IDS/Firewall Evading Tools

      • 1 IDS/Firewall Evasion Tools
      • 2 Packet Fragment Generator Tools
    • Lesson 06- Detecting Honeypots

      • 1 Detecting Honeypots
      • 2 Detecting and Defeating Honeypots
      • 3 Honeypot Detection Tool: Send-Safe Honeypot Hunte
    • Lesson 07- IDS/Firewall Evasion Countermeasures

      • 1 How to Defend Against IDS Evasion
      • 2 How to Defend Against Firewall Evasion
    • Lesson 08- Penetration Testing

      • Firewall/IDS Penetration Testing
  • Module 13- Hacking Web Servers

    Preview
    • Lesson 01- Web Server Concepts

      • 1 Web Server Operations
      • 2 Open Source Web Server Architecture
      • 3 IIS Web Server Architecture
      • 4 Web Server Security Issue
      • 5 Why Web Servers Are Compromised?
      • 6 Impact of Web Server Attacks
    • Lesson 02- Web Server Attacks

      • 1 DoS/DDoS Attacks
      • 2 DNS Server Hijacking
      • 3 DNS Amplification Attack
      • 4 Directory Traversal Attacks
      • 5 Man-in-the-Middle/Sniffing Attack
      • 6 Phishing Attacks
      • 7 Website Defacement
      • 8 Web Server Misconfiguration
      • 9 HTTP Response Splitting Attack
      • 10 Web Cache Poisoning Attack
      • 11 SSH Brute Force Attack
      • 12 Web Server Password Cracking
      • 13 Web Application Attacks
    • Lesson 03- Web Server Attack Methodology

      • 1 Information Gathering
      • 2 Web Server Footprinting/Banner Grabbing
      • 3 Website Mirroring
      • 4 Vulnerability Scanning
      • 5 Session Hijacking
      • 6 Web Server Passwords Hacking
      • 7 Using Application Server as a Proxy
    • Lesson 04- Web Server Attack Tools

      • 1 Metasploit
      • 2 Web Server Attack Tools
    • Lesson 05- Countermeasures

      • 1 Place Web Servers in Separate Secure Server Security Segment on Network
      • 2 Countermeasures
      • 3 Detecting Web Server Hacking Attempts
      • 4 How to Defend Against Web Server Attacks
      • 5 How to Defend against HTTP Response Splitting and Web Cache Poisoning
      • 6 How to Defend against DNS Hijacking
    • Lesson 06- Patch Management

      • 1 Patches and Hotfixes
      • 2 What is Patch Management
      • 3 Installation of a Patch
      • 4 Patch Management Tools
    • Lesson 07- Web Server Security Tools

      • 1 Web Application Security Scanners
      • 2 Web Server Security Scanners
      • 3 Web Server Security Tools
    • Lesson 08- Web Server Pen Testing

      • 1 Web Server Penetration Testing
      • 2 Web Server Pen Testing Tools
  • Module 14- Hacking Web Applications

    Preview
    • Lesson 01 - Web App Concepts

      • 1 Introduction to Web Applications
      • 2 Web Application Architecture
      • 3 Web 2.0 Applications
      • 4 Vulnerability Stack
    • Lesson 02 - Web App Threats

      • 1 OWASP Top 10 Application Security Risks – 2017
      • 2 Other Web Application Threats
    • Lesson 03 - Hacking Methodology

      • 1 Web App Hacking Methodology
      • 2 Footprint Web Infrastructure
      • 2 Attack Web Servers
      • 3 Analyze Web Applications
      • 4 Bypass Client-Side Controls
      • 5 Attack Authentication Mechanism
      • 6 Authorization Attack Schemes
      • 7 Attack Access Controls
      • 8 Attack Session Management Mechanism
      • 9 Perform Injection/Input Validation Attacks
      • 10 Attack Application Logic Flaws
      • 11 Attack Database Connectivity
      • 12 Attack Web App Client
      • 13 Attack Web Services
    • Lesson 04 - Web Application Hacking Tools

      • 1 Web Application Hacking Tools
    • Lesson 05 - Countermeasures

      • 1 Web Application Fuzz Testing
      • 2 Source Code Review
      • 3 Encoding Schemes
      • 4 How to Defend Against Injection Attacks
      • 5 Web Application Attack Countermeasures
      • 6 How to Defend Against Web Application Attacks
    • Lesson 06 - Web App Security Testing Tools

      • 1 Web Application Security Testing Tools
      • 2 Web Application Firewall
    • Lesson 07 - Web App Pen Testing

      • 1 Web Application Pen Testing
      • 2 Web Application Pen Testing Framework
  • Module 15- SQL Injection

    Preview
    • Lesson 01 - SQL Injection Concepts

      • 1 What is SQL Injection?
      • 2 SQL Injection and Server-side Technologies
      • 3 Understanding HTTP POST Request
      • 4 Understanding Normal SQL Query
      • 5 Understanding an SQL Injection Query
      • 6 Understanding an SQL Injection Query – Code Analysis
      • 8 Example of a Web App Vulnerable to SQL Injection: BadProductList.aspx
      • 9 Example of a Web Application Vulnerable to SQL Injection: Attack Analysis
      • 10 Example of SQL Injection
    • Lesson 02 - Types of SQL Injection

      • 1 Types of SQL Injection
    • Lesson 03 - SQL Injection Methodology

      • 1 SQL Injection Methodology
    • Lesson 04 - SQL Injection Tools

      • 1 SQL Injection Tools
      • 2 SQL Injection Tools
      • 3 SQL Injection Tools for Mobile
    • Lesson 05 - Evasion Techniques

      • 1 Evading IDS
      • 2 Types of Signature Evasion Techniques
    • Lesson 06 - Countermeasures

      • 1 How to Defend Against SQL Injection Attacks?
      • 2 SQL Injection Detection Tools
      • 3 SQL Injection Detection Tools
  • Module 16- Hacking Wireless Networks

    Preview
    • Lesson 01 - Wireless Concepts

      • 1 Wireless Terminologies
      • 2 Wireless Networks
      • 3 Wireless Standards
      • 4 Service Set Identifier (SSID)
      • 5 Wi-Fi Authentication Modes
      • 6 Wi-Fi Authentication Process Using a Centralized Authentication Server
      • 7 Types of Wireless Antenna
    • Lesson 02 - Wireless Encryption

      • 1 Types of Wireless Encryption
      • 2 WEP vs. WPA vs. WPA2
      • 3 WEP Issues
      • 4 Weak Initialization Vectors (IV)
    • Lesson 03 - Wireless Threats

      • 1 Wireless Threats
    • Lesson 04 - Wireless Hacking Methodology

      • 1 Wireless Hacking Methodology
    • Lesson 05 - Wireless Hacking Tools

      • 1 WEP/WPA Cracking Tools
      • 2 WEP/WPA Cracking Tool for Mobile
      • 3 Wi-Fi Sniffer
      • 4 Wi-Fi Traffic Analyzer Tools
      • 5 Other Wireless Hacking Tools
    • Lesson 06 - Bluetooth Hacking

      • 1 Bluetooth Stack
      • 2 Bluetooth Hacking
      • 3 Bluetooth Threats
      • 4 How to BlueJack a Victim?
      • 4 Bluetooth Hacking Tools
    • Lesson 07 - Countermeasures

      • 1 Wireless Security Layers
      • 2 How to Defend Against WPA/WPA2 Cracking
      • 3 How to Defend Against KRACK Attacks
      • 4 How to Detect and Block Rogue AP
      • 5 How to Defend Against Wireless Attacks
      • 6 How to Defend Against Bluetooth Hacking
    • Lesson 08 - Wireless Security Tools

      • 1 Wireless Intrusion Prevention Systems
      • 2 Wireless IPS Deployment
      • 3 Wi-Fi Security Auditing Tool
      • 4 Wi-Fi Intrusion Prevention System
      • 5 Wi-Fi Predictive Planning Tools
      • 6 Wi-Fi Vulnerability Scanning Tools
      • 7 Bluetooth Security Tool
      • 8 Wi-Fi Security Tools for Mobile
    • Lesson 09 - Wi-Fi Pen Testing

      • 1 Wireless Penetration Testing
      • 2 Wireless Penetration Testing Framework
  • Module 17- Hacking Mobile Platforms

    Preview
    • Lesson 01- Mobile Platform Attack Vectors

      • 1 Vulnerable Areas in Mobile Business Environment
      • 2 OWASP Top 10 Mobile Risks - 2016
      • 3 Anatomy of a Mobile Attack
      • 4 How a Hacker can Profit from Mobile when Successfully Compromised
      • 5 Mobile Attack Vectors and Mobile Platform Vulnerabilities
      • 6 Security Issues Arising from App Stores
      • 7 App Sandboxing Issues
      • 8 Mobile Spam
      • 9 SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
      • 10 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
    • Lesson 02- Hacking Android OS

      • 1 Android OS
      • 2 Android Rooting
      • 3 Blocking Wi-Fi Access using NetCut
      • 4 Hacking with zANTI
      • 5 Hacking Networks Using Network Spoofer
      • 6 Launching DoS Attack using Low Orbit Ion Cannon (LOIC)
      • 7 Performing Session Hijacking Using DroidSheep
      • 8 Hacking with Orbot Proxy
      • 9 Android-based Sniffers
      • 10 Android Trojans
      • 11 Securing Android Devices
      • 12 Android Security Tool: Find My Device
      • 13 Android Security Tools
      • 14 Android Vulnerability Scanner
      • 15 Android Device Tracking Tools
    • Lesson 03- Hacking iOS

      • 1 Apple iOS
      • 2 Jailbreaking iOS
      • 3 iOS Trojans
      • 4 Guidelines for Securing iOS Devices
      • 5 iOS Device Tracking Tools
      • 6 iOS Device Security Tools
    • Lesson 04- Mobile Spyware

      • 1 Mobile Spyware
      • 2 Mobile Spyware: mSpy
      • 3 Mobile Spywares
    • Lesson 05- Mobile Device Management

      • 1 Mobile Device Management (MDM)
      • 2 Mobile Device Management Solutions
      • 3 Bring Your Own Device (BYOD)
    • Lesson 06- Mobile Security Guidelines and Tools

      • 1 General Guidelines for Mobile Platform Security
      • 2 Mobile Device Security Guidelines for Administrator
      • 3 SMS Phishing Countermeasures
      • 4 Mobile Protection Tools
      • 5 Mobile Anti-Spyware
    • Lesson 07- Mobile Pen Testing

      • 1 Android Phone Pen Testing
      • 2 iPhone Pen Testing
      • 3 Mobile Pen Testing Toolkit: Hackode
  • Module 18- IoT Hacking

    Preview
    • Lesson 01- IoT Concepts

      • 1 What is IoT
      • 2 How IoT Works
      • 3 IoT Architecture
      • 4 IoT Application Areas and Devices
      • 5 IoT Technologies and Protocols
      • 6 IoT Communication Models
      • 7 Challenges of IoT
      • 8 Threat vs Opportunity
    • Lesson 02- IoT Attacks

      • 1 IoT Security Problems
      • 2 OWASP Top 10 IoT Vulnerabilities and Obstacles
      • 3 IoT Attack Surface Areas
      • 4 IoT Threats
      • 5 Hacking IoT Devices: General Scenario
      • 6 IoT Attacks
      • 7 IoT Attacks in Different Sectors
    • Lesson 03- IoT Hacking Methodology

      • 1 What is IoT Device Hacking?
      • 2 IoT Hacking Methodology
    • Lesson 04- IoT Hacking Tools

      • 1 Information Gathering Tools
      • 2 Sniffing Tools
      • 3 Vulnerability Scanning Tools
      • 4 IoT Hacking Tools
    • Lesson 05- Countermeasures

      • 1 How to Defend Against IoT Hacking
      • 2 General Guidelines for IoT Device Manufacturing Companies
      • 3 OWASP Top 10 IoT Vulnerabilities Solutions
      • 4 IoT Framework Security Considerations
      • 5 IoT Security Tools
    • Lesson 06- IoT Pen Testing

      • 1 IoT Pen Testing
  • Module 19- Cloud Computing

    Preview
    • Lesson 01 - Cloud Computing Concepts

      • 1 Introduction to Cloud Computing
      • 2 Separation of Responsibilities in Cloud
      • 3 Cloud Deployment Models
      • 4 NIST Cloud Computing Reference Architecture
      • 5 Cloud Computing Benefits
      • 6 Understanding Virtualization
    • Lesson 02 - Cloud Computing Threats

      • 1 Cloud Computing Threats
    • Lesson 03 - Cloud Computing Attacks

      • 1 Service Hijacking using Social Engineering Attacks
      • 2 Service Hijacking using Network Sniffing
      • 3 Session Hijacking using XSS Attack
      • 4 Session Hijacking using Session Riding
      • 5 Domain Name System (DNS) Attacks
      • 6 Side Channel Attacks or Cross-guest VM Breaches
      • 7 SQL Injection Attacks
      • 8 Cryptanalysis Attacks
      • 9 Wrapping Attack
      • 10 Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
      • 11 Man-in-the-Cloud Attack
    • Lesson 04 - Cloud Security

      • 1 Cloud Security Control Layers
      • 2 Cloud Security is the Responsibility of both Cloud Provider and Consumer
      • 3 Cloud Computing Security Considerations
      • 4 Placement of Security Controls in the Cloud
      • 5 Best Practices for Securing Cloud
      • 6 NIST Recommendations for Cloud Security
      • 7 Organization/Provider Cloud Security Compliance Checklist
    • Lesson 05 - Cloud Security Tools

      • 1 Cloud Security Tools
    • Lesson 06 - Cloud Penetration Testing

      • 1 What is Cloud Pen Testing?
      • 2 Key Considerations for Pen Testing in the Cloud
      • 3 Cloud Penetration Testing
      • 4 Recommendations for Cloud Testing
  • Module 20- Cryptography

    Preview
    • Lesson 01- Cryptography Concepts

      • 1 Cryptography
      • 2 Government Access to Keys (GAK)
    • Lesson 02- Encryption Algorithms

      • 1 Ciphers
      • 2 Data Encryption Standard (DES)
      • 3 Advanced Encryption Standard (AES)
      • 4 RC4, RC5, and RC6 Algorithms
      • 5 Twofish
      • 6 The DSA and Related Signature Schemes
      • 7 Rivest Shamir Adleman (RSA)
      • 8 Diffie-Hellman
      • 9 Message Digest (One-Way Hash) Functions
    • Lesson 03- Cryptography Tools

      • 1 MD5 Hash Calculators
      • 2 Hash Calculators for Mobile
      • 3 Cryptography Tools
      • 4 Cryptography Tools for Mobile
    • Lesson 04- Public Key Infrastructure (PKI)

      • 1 Public Key Infrastructure (PKI)
    • Lesson 05- Email Encryption

      • 1 Digital Signature
      • 2 Secure Sockets Layer (SSL)
      • 3 Transport Layer Security (TLS)
      • 4 Cryptography Toolkit
      • 5 Pretty Good Privacy (PGP)
    • Lesson 06- Disk Encryption

      • 1 Disk Encryption
      • 2 Disk Encryption Tools
    • Lesson 07- Cryptanalysis

      • 1 Cryptanalysis Methods
      • 2 Code Breaking Methodologies
      • 3 Cryptography Attacks
      • 4 Cryptanalysis Tools
      • 5 Online MD5 Decryption Tools
    • Lesson 08- Countermeasures

      • 1 How to Defend Against Cryptographic Attacks

Tools Covered

back trackNMAP PROJECTAIRCRACK-NGJohn the RipperTHC-HydrametasploitBETTERCAPWIRESHARKsqlmapsqlninjaOWASPw3af

CEH Certification Course Advisor

  • Dean Pompilio

    Dean Pompilio

    Technical Trainer, Owner- Steppingstonesolutions Inc

    Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth.

  • Bipin Kulkarni

    Bipin Kulkarni

    Security Expert, Content review board member at EC-Council

    Bipin has 17+ years of experience in architecting physical and cloud infrastructure deployments and security. As an EC-Council board member he is responsible for verifying CEH and ECSA courses. He is a Cloud security expert across public and private domains.

prevNext

CEH v13 Exam & Certification

Certified Ethical Hacker Certificate
  • What is the Certified Ethical Hacker (CEH) certification?

    The Certified Ethical Hacker (CEH) is a globally recognized, vendor-neutral certification from EC-Council. It validates an IT professional's knowledge and skills in ethical hacking methodologies. The ethical hacking certification proves that an individual can think like a hacker to identify vulnerabilities and weaknesses in target systems and networks, but uses those skills in a lawful, ethical manner to protect assets.

    • It is a foundational and highly respected credential in the offensive security (or "red team") domain

    • The certification covers the five phases of ethical hacking, including reconnaissance, vulnerability assessment, and covering tracks, mastering over 550 real-world attack techniques

    • It is a baseline requirement for many government and Department of Defense (DoD) cybersecurity roles

    • Tier-1 employers, including the US Army, FBI, Microsoft, and IBM, recognize the ethical hacking certification

  • Who is the ideal candidate for this ethical hacking course?

    This certified ethical hacking course is designed for professionals who need to understand and validate their skills in offensive security and network defense. It caters to a wide range of IT and security personnel, from those in existing security roles to those seeking to enter the field. The program is specifically beneficial for:

    • IT security professionals and managers

    • Penetration testers and certified ethical hackers seeking to formalize their skills

    • Network administrators and security engineers responsible for securing wireless networks and infrastructure

    • Cybersecurity consultants who advise organizations on security best practices

    • Incident responders and security analysts

    • IT auditors, IT operations managers, and application developers

  • What are the prerequisites for enrolling in this CEH course?

    This is an advanced ethical hacking course intended for professionals with a solid background in IT and networking. To be eligible for the program, candidates must meet specific prerequisites.

    • Educational Background: Learners need to possess an undergraduate degree or a high school diploma

    • Professional Experience: Learners should have a minimum of two years of IT security experience

    • Terms Agreement: You must agree to the EC-Council's exam policies and code of ethics

  • Is the CEH certification still worth it in 2026?

    Yes, in 2026 and even beyond, the CEH remains a high-value credential, but its strategic role has evolved. It is no longer an end-state qualification but rather a mandatory foundational framework and a critical clearance mechanism for HR departments.

    • High Market Demand: Data shows that 92% of hiring managers prefer candidates with a CEH for jobs requiring ethical hacking skills (source

    • Regulatory Driver: New compliance mandates, such as SEC rules and the EU's DORA, require companies to prove they are assessing risk, driving massive, compliance-based demand for verifiable certifications like the CEH

    • Career Transition: It is an exceptionally valuable first step for building a cybersecurity career, with 98% of holders crediting it as crucial to their successful career transition (source)

    • Foundational Knowledge: It provides the "holistic ethical hacking framework" and "broad theoretical knowledge" that employers value as a baseline

    Workplace Recognition: In a 2025 EC-Council report, 100% of high-scoring respondents reported increased respect and recognition at work after attaining the CEH (source)

  • How long is the CEH certification valid?

    The Certified Ethical Hacker certification is valid for three years. You must earn 120 EC-Council Continuing Education (ECE) credits to retain your certification, and maintain your annual membership with EC-Council to qualify for recertification.

  • What is the format of the CEH v13 exam?

    The CEH v13 theory exam is a 4-hour (240-minute) test consisting of 125 multiple-choice questions. It is a proctored exam that tests your knowledge across all 20 modules of the official curriculum, from information security threats and attack vectors to attack detection, prevention, procedures, and methodologies.

    • This exam tests the knowledge and theory of ethical hacking

    • There is also a separate, optional "Practical" exam for those who wish to prove their hands-on skills

    • The passing score is set by EC-Council and can range from 60% to 85%

  • How difficult is the CEH exam?

    The CEH exam is a challenging, 4-hour, 125-question multiple-choice test that covers a very broad body of knowledge. Its difficulty comes from its breadth, as it requires you to be familiar with the concepts, tools, and methodologies across all 20 modules.

    • Knowledge vs. Practice: It is primarily a test of theoretical knowledge, not hands-on application

    • Comparison: It is not considered "prohibitively difficult" for beginners, unlike the 24-hour, hands-on OSCP exam, which is known for its rigorous practical difficulty

    • Preparation: Success on the exam depends on comprehensive study of all 20 domains and practical exposure to the tools and techniques, which is why hands-on labs are a key part of training

  • What jobs can I get after CEH certification?

    Completing the CEH certification validates your skills for a wide range of offensive and defensive cybersecurity roles. Hiring managers and government agencies actively seek out CEH-certified professionals for positions that require a proven understanding of attacker methodologies. Some of the key job roles include:

    • Certified Ethical Hacker

    • Penetration Tester

    • Network Security Engineer

    • Cybersecurity Analyst

    • Information Security Officer

    • Data Security Analyst

    • Computer Forensics Engineer

    • Security Auditor

    • Threat Intelligence Analyst

    • Cloud Security Architect

    • AI Penetration Tester

  • What salary can a Certified Ethical Hacker expect to earn?

    Salaries for CEH-certified professionals are high, reflecting the strong demand and significant cybersecurity skills gap. Compensation varies by role, specialization, and location.

    • General Roles: The average annual salary for a CertifiedEthical Hacker is around $135,269, with a range from $101,500 to $162,000. (source)

    • Specialized Roles: The U.S. Bureau of Labor Statistics (May 2024) notes a median salary of $124,910 for information security analysts (which includes penetration testers) and projects a rapid 29% job growth for the field between 2024 and 2034. (source)

    • Career Growth: The most lucrative positions are in specialized, high-level roles. A "Cloud Security Architect," a common career progression, earns an average of $149,147. (source)

    • Salary Premium:  100% of high-scoring respondents in a 2025 report stated they received increased respect and recognition in the workplace after attaining the CEH. (source)

    • Hiring Companies: Top hiring companies for these roles include Deloitte India, Accenture, IBM, Cisco, Oracle, and Goldman Sachs.

  • How do I schedule my CEH exam?

    This Certified Ethical Hacking Course includes an exam voucher from EC-Council. After you complete your training and unlock your certificate, you can schedule your CEH exam through our Learning Management System (LMS).

  • Does the CEH exam fee ever change?

    The EC-Council governs CEH certification exam prices, which sometimes change. They typically announce price changes at the end of the calendar year. If the price changes while you’re still completing the CEH course, you may need to pay the difference to Simplilearn before booking your exam.

  • How do I become a CEH Certified professional?

    If you want to become a Certified Ethical Hacker, you must pass the CEH exam after completing training with an accredited training partner like Simplilearn or through self-study. Ethical hacking is a highly specialized and challenging area of study, so we recommend that beginners take an in-depth CEH training course to learn the concepts from scratch.

  • What does the career path for a CEH look like?

    The CEH is a high-value starting point for a career in offensive security. The optimal career path involves "stacking" the CEH with more advanced, practical certifications and high-demand specializations.

    1. Start with CEH: Use the CEH to build the "holistic framework" and satisfy the 92% of hiring managers who look for it. (source)

    2. Add Practical Skills (OSCP): Immediately pursue a practical certification like the OSCP to build hands-on skills. Tier-1 employers like IBM explicitly desire both.

    Aim for Specialization: The career-defining salaries are not in general pentesting but in roles like "Cloud Security Architect" or "AI Red Teamer". Use the CEH as a foundation to pivot into these more profitable specializations.

Ethical Hacking Course Reviews

  • Myles Howard II

    Myles Howard II

    The instructor chains together the learning topics very well. One subject leads to the next, and they are woven together comprehensively.

prevNext

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts

Ethical Hacking Training FAQs

  • What are the benefits of enrolling in an ethical hacking certification course?

    Enrolling in an ethical hacking certification program offers numerous benefits, including:

    • It provides comprehensive knowledge of advanced security concepts and techniques, vulnerability assessment tools, and more

    • The CEH certification is globally recognized and valued by employers, making it easier to secure high-paying roles in various industries

    • Ethical hacking training enhances problem-solving skills and equips professionals with the cybersecurity expertise to protect organizations from cyber threats

  • What skills should a Certified Ethical Hacker have?

    Ethical hackers, also known as white-hat hackers, use their expertise to identify and fix system vulnerabilities, ensuring protection against malicious attacks. Some of the top skills certified ethical hackers should have include:

    • Phishing detection and prevention

    • Cyber threat intelligence and response

    • Cloud security and monitoring

    • Malware analysis and remediation

    • Network security and communications protocols

    • Network traffic analysis, including wireless

    • Trojan backdoors and related defense strategies, and more…

    Today, ethical hackers should also have AI proficiency to enhance all of their skills and strategies.

  • How do I choose the right ethical hacking certification course?

    Becoming a Certified Ethical Hacker opens up many lucrative career opportunities. That being said, choosing the right course is essential to defining your career path. Some factors to consider when selecting your course include:

    • Course Content: The course should be comprehensive, covering basic concepts to advanced ethical hacking methodologies

    • Training: Consider seeking a reputable training provider such as Simplilearn for world-class training experience

    • Instructor Experience: Ensure that instructors possess extensive expertise and official certifications in ethical hacking

    • Course Quality: Evaluate the quality and efficacy of the course by reviewing feedback from previous students

    • Cost: When evaluating the price and value of a course, it is essential to compare the fees with the content and benefits you will receive

    Simplilearn's Certified Ethical Hacking Course meets all these criteria, providing a complete learning experience.

  • What does an ethical hacker do?

    An ethical hacker is an offensive security professional who identifies and exploits vulnerabilities in computer systems, networks, and software applications to help organizations strengthen their security. They perform penetration testing, vulnerability assessments, and security audits to uncover weaknesses malicious hackers could exploit. By simulating cyberattacks, ethical hackers provide valuable insights and recommendations to help organizations protect sensitive data, ensure compliance with security standards, and prevent unauthorized access.

  • What certification will I receive after completing the CEH course?

    After completing the CEH course training, you will receive an industry-recognized completion certificate from Simplilearn. 

  • What is covered under the 24/7 support promise?

    Simplilearn provides 24/7 support via email, chat, and phone, where our learner support specialists can answer any questions and help resolve any issues. Our dedicated team also provides on-demand assistance through our community forum, which is with you every step of the way. Plus, you’ll enjoy lifetime access to this forum after completing your Certified Ethical Hacker Course with us.

  • If I need to cancel my enrollment, can I get a refund?

    We strive to ensure that our users have a rewarding learning experience, whether instructor-led or self-paced. If necessary, you can cancel your enrollment. For more information, please read our refund policy.

  • Does Simplilearn offer corporate training?

    Yes. Simpliearn provides corporate training solutions. We collaborate with Fortune 500 and mid-sized companies to provide digital skills training to power talent development. Our corporate training offerings include short skill-based certification programs, role-based learning paths, and Simplilearn Learning Hub+, a comprehensive learning library with unlimited live and interactive solutions accessible organization-wide. Our curriculum consultants customize learning solutions to meet each client's team's needs and objectives.

  • Does Simplilearn offer any other cybersecurity courses?

    Yes, Simplilearn offers several online cybersecurity courses. These include specialized certification training (like the Certified Ethical Hacker Course), master's programs, and professional certificate programs tailored to different skill levels. 

    Similar cybersecurity courses we offer include, but aren’t limited to:

  • What is the Simplilearn CEH v13 (Certified Ethical Hacker) course?

    This program is an accredited training course from EC-Council designed to equip you with the essential skills to pass the CEH v13 exam. It is delivered through a blended learning model that combines live online classes led by industry experts with self-paced content and hands-on labs. This CEH course is built to provide a comprehensive understanding of ethical hacking's five phases and prepare learners to identify, counter, and defend against modern cyber threats, including AI-driven attacks.

    • Comprehensive Curriculum: The training covers all 20 vital security domains of the official CEH v13 curriculum, covering foundational skills like system hacking and vulnerability assessment, alongside advanced topics like IoT, cloud, and AI-powered hacking

    • Live Instruction: The CEH course features 8x higher interaction in live online classes conducted by industry experts

    • Exam Preparation: A primary goal of the ethical hacking course is to ensure you pass the CEH v13 exam, and it includes an exam voucher and a pass guarantee with a free retake

  • What is the learning structure of this online ethical hacking program?

    The program employs a blended learning model that combines live online instruction with 24/7 learner support and practical labs. This structure is designed to provide the flexibility of online learning with the accountability and engagement of an in-person classroom.

    • Live Virtual Classrooms: You attend live, instructor-led sessions on specified dates, providing 8x higher interaction and real-time doubt resolution from industry experts

    • Hands-On Labs: The CEH course provides access to EC-Council's official CEH v13 AI Labs for six months, featuring over 220 hands-on exercises in a cloud-based cyber range

    • 24/7 Learner Support: A dedicated support team is available around the clock via email, chat, and phone to help resolve technical or conceptual questions

    • Official Materials: Learners receive access to the latest official study materials from the EC-Council to supplement their training

  • What does the "Exam Pass Guarantee" for this CEH course mean?

    The Exam Pass Guarantee is a feature of this accredited training program that provides a complimentary retake for both the Theory and Practical exams. This gives you added assurance and flexibility as you work to certify your ethical hacking skills.

    • This guarantee is designed to support the program's priority of helping you succeed in your certification goal

    • Successfully clearing both exams allows you to earn the prestigious CEH Master designation, which demonstrates comprehensive expertise

  • What specific ethical hacking tools are covered in this CEH v13 course?

    The program provides extensive hands-on experience with over 4,000 integrated hacking and security tools within the official CEH v13 AI Labs. This ensures you are not just learning theory but are actively applying techniques with the same software used by professionals in the field. The tools covered span all 20 domains and include:

    • Reconnaissance: Tools like Nmap and advanced Google hacking techniques for footprinting and investigating social networking sites

    • Exploitation Frameworks: Metasploit and and other various privilege escalation tools

    • Web Application Tools: Tools like Burp Suite and sqlmap for web server attacks and application auditing

    • Password Crackers: Tools like John the Ripper and THC-Hydra

    • Packet Sniffers: Tools like Wireshark and techniques to evade intrusion detection tools

    • Wireless Hacking Tools: Tools like Aircrack-ng for executing the complete wireless hacking methodology

    Mobile Security: Android security tools and  implementation of mobile security guidelines

  • What is new in CEH v13, especially regarding AI?

    CEH v13 is "Powered by AI," reflecting a major update to align the curriculum with the modern cyber threat landscape. This version integrates AI and Machine Learning into the ethical hacking phases, ensuring professionals can counter AI-driven attacks and use AI as a defensive tool.

    • AI-Enhanced Skills: The curriculum covers AI-powered network traffic analysis, AI in vulnerability scanning, AI-enhanced intrusion detection, and AI-enabled phishing defense

    • Modern Attack Vectors: The course has expanded coverage of cloud computing threats, IoT hacking using specialized IoT security tools, and operational technology (OT) hacking with OT hacking tools

    • Newer Domains: The v13 curriculum explicitly maps to emerging, high-value job roles like "AI Penetration Tester," "AI/ML Security Engineer," and "Senior Cloud Security Analyst"

  • How much hands-on practice is included in this ethical hacking course program?

    This program is heavily focused on applied learning, moving beyond theory to ensure you can execute offensive security techniques. The core of the practical experience comes from the official EC-Council labs, which provide a safe, cloud-based environment to practice on real-world scenarios.

    • Extensive Labs: The CEH course includes access to six months of CEH v13 AI Labs

    • Guided Exercises: You will work through over 220 hands-on exercises and more than 150 practice demos

    • Massive Toolset: The labs provide access to a cloud-based cyber range with over 4,000 integrated cloud security tools

    Real-World Techniques: The curriculum covers over 550 real-world attack techniques, including specific labs for hacking web servers, analyzing Linux machine logs, and methods to hide data on Linux machines

  • How does this CEH course help with CEH exam preparation and certification?

    This program is an end-to-end solution for certification, designed to ensure you pass the CEH v13 exam. As an accredited training partner of EC-Council, we provide the official materials and a structured learning path focused on the exam's objectives.

    • Official Exam Voucher: The course cost includes one CEH v13 exam voucher and one practical exam voucher

    • Exam Pass Guarantee: The program includes a complimentary retake for both the theory and practical exams, providing flexibility and assurance

    • Expert Instruction: You learn from certified instructors who are industry experts, with 8x higher interaction in live classes

    • Practical Labs: The 220+ labs are directly aligned with the skills tested on the exam, building practical muscle memory

    • Official Materials: You receive access to the latest official study materials from EC-Council to supplement your learning

  • What is the difference between a "Certified Ethical Hacker" and a "penetration tester"?

    While the terms are often used interchangeably, there is a subtle distinction. "Ethical Hacker" is a broad term for a security professional who uses hacking skills for defensive purposes, while "Penetration Tester" (or "pen tester") refers to a specific job role focused on performing authorized security tests.

    • CEH (The Certification): This is a credential that validates your knowledge across a wide range of ethical hacking topics. It proves you understand the methodologies.

    • Penetration Tester (The Job): This is a specialized role where you are actively hired to use vulnerability assessment tools and conduct simulated attacks against a specific scope to find weaknesses.

    • Career Path: The CEH certification is a common requirement for landing a job as a penetration tester.

  • What is the main role of a CEH in response to new regulations like the SEC rules?

    In 2026, a key driver for CEH demand will be the proliferation of new, strict regulations, such as the SEC cybersecurity rules and the EU's Digital Operational Resilience Act (DORA). These laws transform ethical hacking from an "IT best practice" into a "board-level legal and financial requirement".

    • Proving Due Diligence: The SEC's Form 10-K Item 1C rule requires public companies to annually disclose their "processes for assessing, identifying, and managing material risks from cybersecurity threats".

    • De Facto Mandate: The only legally defensible way for a board to prove it has such a process is to conduct and document regular, simulated attacks, such as penetration tests.

    • Compliance-Friendly Credential: This shifts ethical hacking from an IT-budget "nice-to-have" to a legal-and-finance "must-have." This massively increases demand for certified professionals whose reports can be used as evidence of due diligence, a role the compliance-friendly CEH is designed to fill.

  • What is the difference between the CEH and the OSCP?

    The "CEH vs. OSCP" debate is the most common in the field, and a modern analysis shows they fill different, non-competing roles. The CEH validates the breadth of your theoretical knowledge (the "framework"), while the OSCP validates the depth of your practical, hands-on ability (the "application").

    • Certified Ethical Hacker (CEH): Known for its "holistic ethical hacking framework" and "broad theoretical knowledge". Its exam is multiple-choice. It is highly recognized by recruiters, HR teams, and government/compliance-driven organizations.

    • Offensive Security Certified Professional (OSCP): Known for its "rigorous," 24-hour, "hands-on penetration testing" lab exam. It is highly respected by technical leads and senior practitioners for proving practical skill.

    • T1 Employer View: Top-tier employers like IBM do not see them as competitors. A 2025 job posting for a "Senior Offensive Security Consultant" at IBM listed both the CEH and the OSCP as "highly desirable" industry certifications. (source)

    • Recommended Path: The consensus-recommended path is to start with the CEH to build the foundation and clear HR filters, then progress to the OSCP to prove hands-on mastery.

  • How does the CEH compare to the CISSP certification?

    CEH and CISSP (Certified Information Systems Security Professional) are both prominent cybersecurity certifications, but they target different career paths and skill sets. CEH is a technical, offensive certification, while CISSP is a managerial, defensive certification.

    • CEH (The "Hacker"): Focuses on the "how" of an attack. It is for the technical professional (like a penetration tester or red teamer) who performs simulated attacks and understands vulnerabilities from an attacker's perspective.

    • CISSP (The "Manager"): This certification is for security leaders, managers, or architects. It focuses on the "why" of security, designing and overseeing an organization's entire security program, including policy, risk management, and compliance.

    • Offerings: We offer separate, dedicated training programs for both certifications, recognizing their distinct career tracks.

  • Should I get the CompTIA Security+ or the CEH first?

    The CompTIA Security+ and CEH certifications target different levels of expertise. The CEH course has a prerequisite of a minimum of two years of IT security experience, positioning it as a certification that builds on existing knowledge.

    • Security+ (Foundational): Security+, which we offer as a foundational program, is generally considered a starting point for a cybersecurity career.

    • CEH (Specialization): The CEH program is designed to build on existing security knowledge to specialize in offensive techniques. This is reflected in its prerequisite of two years of IT security experience.

    Career Path: A common path is to use a foundational certification to gain experience, then pursue the CEH to specialize in ethical hacking.

  • What is the "CEH Master" designation?

    The "CEH Master" designation is a more advanced recognition from EC-Council. You earn this designation by successfully passing both the CEH v13 knowledge-based (theory) exam and the separate, hands-on CEH Practical exam. This demonstrates that you possess both the theoretical knowledge and the practical, real-world skills of an ethical hacker.

  • How do you maintain the CEH certification?

    The Certified Ethical Hacker certification is valid for three years. To maintain your certification, you must participate in the EC-Council Continuing Education (ECE) program.

    • Credit Requirement: You must earn 120 ECE credits within your three-year certification cycle

    • Annual Membership: You must also maintain your annual membership with EC-Council to qualify for recertification

    Purpose: This process ensures that certified professionals stay current with the rapidly evolving cybersecurity threat landscape

  • What is the impact of Generative AI on the ethical hacking job?

    The rapid emergence of Generative AI (GenAI) has fundamentally altered the ethical hacker's role, creating both a new, complex attack surface and a new class of professional tools. This has bifurcated the professional's job.

    • Attacking AI: Certified Ethical hackers must now be capable of attacking AI models themselves, testing for new vulnerabilities like those in the OWASP GenAI Top 10.

    • Using AI: They must also use AI-driven tools to maintain efficiency and counter AI-powered defenses. AI is being integrated into pentesting to automate routine tasks like reconnaissance and documentation.

    • AI as a Threat: Adversaries are using AI to scale phishing (with a 1265% increase reported), automate intrusions, and lower the skill barrier for creating malware. In 2026, a certified ethical hacker must be able to simulate and defend against these AI-powered attacks. (source)

    • Curriculum Update: The CEH v13 curriculum has been updated to include these new AI-powered techniques to keep professionals current.

  • What are the new attack surfaces a Certified ethical hacker must test in 2026?

    The "explosion in the use of generative AI has expanded the attack surface" and requires "new security testing methods". The new gold standard for this is the OWASP GenAI Top 10, which provides a new "checklist" for AI security auditors.

    • LLM01: Prompt Injection: Manipulating the LLM's instructions via user input to bypass safety controls

    • LLM02: Sensitive Information Disclosure: Tricking the model into leaking its training data, PII, or proprietary algorithms

    • LLM04: Data and Model Poisoning: Attacking the model's training data to create hidden backdoors or biases

    • LLM06: Excessive Agency: Assessing if the LLM has been granted dangerous, high-level permissions to interact with other systems or APIs

    • LLM08: Vector and Embedding Weaknesses: Attacking the Retrieval-Augmented Generation (RAG) knowledge base

  • What is cloud penetration testing and why is it important?

    Cloud penetration testing is the #1 specialization for certified ethical hackers, driven by the "relentless growth in cloud adoption". This is confirmed by Mandiant's 2025 M-Trends report, which finds that "Cloud & SaaS are 'the norm'" for modern intrusions. The CEH v13 curriculum includes a dedicated module on cloud computing to address this. (source)

    • New Vulnerabilities: This domain requires a new skillset, as the most common cloud flaws are not traditional network bugs. The top vulnerabilities are:

      1. Misconfigured Cloud Storage 

      2. Weak Authentication Mechanisms 

      3. Insecure APIs 

      4. Identity and Access Management (IAM) flaws

    New Rules: The "Shared Responsibility Model" redefines the scope of a cloud-based ethical hack. Testers are forbidden from attacking the provider's infrastructure (e.g., Microsoft Azure's hardware); they may only test their own applications and configurations running on the cloud.

  • What skills besides hacking tools are important for a senior ethical hacker?

    While tools are important, a senior-level candidate in 2026 is expected to be a "stack" of three complementary skills, as evidenced by hiring criteria from Tier-1 employers like IBM.

    • Frameworks: Proficiency in methodologies like OWASP, NIST, and PTES. This is the theoretical knowledge validated by the CEH.

    • Practical Skills: Hands-on ability with tools like Burp Suite and Metasploit. This is the skill validated by the OSCP.

    • Automation: Experience with scripting languages (e.g., Python, Bash, PowerShell) to automate tasks or develop custom exploits. This is a critical, non-negotiable bridge between theory and practice for senior roles.

    • Documentation: A key skill for a Certifiedethical hacker is reporting and documentation to clearly communicate findings and recommendations to stakeholders.

  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.