Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. EC-Council
  4. Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) is EC-Council’s flagship certification, designed to teach professionals how to think and act like a hacker to better defend against cyber threats. Now in its 13th version, CEH v13 includes AI-driven cybersecurity skills and over 550 attack techniques. The course provides a deep dive into the tools and methodologies used by malicious hackers and equips learners with the skills to identify vulnerabilities and secure systems.

Who It’s For:
This course is intended for cybersecurity professionals, penetration testers, network security specialists, auditors, and anyone interested in ethical hacking. It’s also suitable for IT professionals seeking to expand their knowledge of offensive security techniques.

What You’ll Learn:
CEH covers a wide range of topics including reconnaissance, scanning, enumeration, system hacking, malware threats, sniffing, social engineering, denial-of-service, session hijacking, web application attacks, wireless and mobile hacking, IoT and OT security, cloud computing, and cryptography.

Course Outline:

Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT and OT Hacking
Cloud Computing
Cryptography

Why It’s Valuable for Federal Employees and Contractors:
CEH is mapped to the NICE Cybersecurity Workforce Framework and is recognized globally, including by the U.S. Department of Defense. It provides federal employees and contractors with the offensive security skills needed to anticipate and counter cyber threats, making it a critical asset for roles in threat analysis, red teaming, and vulnerability assessment.

Delivery Formats:
The CEH program is available in multiple formats: In-Person Training, Online Self-Paced, and Online Instructor-Led.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites

2 Years IT Security Experience

Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
Online, Self-Paced
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

Understand ethical hacking concepts and legal implications
Perform footprinting, reconnaissance, and scanning
Conduct enumeration and vulnerability analysis
Execute system hacking and malware analysis
Apply sniffing, social engineering, and DoS/DDoS techniques
Bypass firewalls, IDS/IPS, and honeypots
Hack web servers, applications, and databases
Exploit wireless, mobile, IoT, and cloud environments
Use cryptographic techniques and countermeasures
Prepare for CEH certification with hands-on labs and AI-driven tools

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: