Certified Ethical Hacker (C|EH)


The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, To beat a hacker, you need to think like a hacker.


To beat a hacker, you need to think like one! This is exactly what this class will teach you.
It is the pinnacle of the most desired information security training program any information security professional will ever want to be into master the hacking technologies, you will need to become one.

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.

The CEH class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems.

The most advanced course in the world that covers cutting edge of hacking technology. EC-Council researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community .The researchers report and update advanced hacking tools every day on the member’s portal and on www.hackerjournals.com

The CEH class deals with real life scenario and real threats by real life experts in the field. Learn real life ethical hacking methodology beyond automated vulnerability scans and simple information security tests. The class is weaved around real-time information security incident and cases to inculcate a capability of making knowledgeable decisions while defending your organizations’ information resources.

Gain global recognition as being a certified member of a globally recognized institution and attain the skills of a professional ethical hacker/penetration tester. The CEH program provides you an industry standard information security curriculum and is accompanied by a highly sought-after CEH certification that helps establish your career as an information security expert.

Play with real life tools that are used by the hacking underground. The courseware is over 3200 pages, covering 20 modules with over 25 GB of real life underground hacking tools that are not found in any other training course anywhere in the world plus evaluation copies for Core Impact and Immunity in classes and security software that can be taken home!!!

Get your hands dirty with actual hands on labs under the guidance of some of the best information security professionals in this space. The CEH lab environment simulates a real time information infrastructure and facilitates an objective and modular learning. The result oriented, descriptive and analytical labs are designed by industry experts to reinforce the learning and demonstrate your proficiency in handling real time information security threats.

Unlike other classes that provide courseware that is tightly coupled with the presentation and somewhat useless outside of that environment, EC-Council has always sought to provide reference material that continues to be valuable long after the course has concluded. The CEH references to valuable resources including whitepapers, tools and videos are updated continuously and delivered across multiple channels to facilitate a comprehensive learning.

  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Duration: 5 Days (9:00 AM – 5:00 PM)

  • Course Overview

    • 1 Introduction to Ethical Hacking
    • 2 Footprinting and Reconnaissance
    • 3 Scanning Networks
    • 4 Enumeration
    • 5 System Hacking
    • 6 Malware Threats
    • 7 Sniffng
    • 8 Social Engineering
    • 9 Denial of Service
    • 10 Session Hijacking
    • 11 Hacking Web Applications
    • 12 SQL Injection
    • 13 Hacking Wireless Networks
    • 14 Hacking Web servers
    • 15 Hacking Mobile Platforms
    • 16 Evading IDS, Firewalls and Honeypots
    • 17 Cloud Computing
    • 18 Cryptography