Close

Course Description

The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need.

This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.

You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v10 program.

Ethical hackers, System Administrators, Network Administrators and Engineers, Webmanagers, Auditors, Security Professionals in general.

5 days (9am – 5pm)
Minimum 40 hours

The C|EH exam can be challenged post the completion of attending the complete official C|EH course. Candidates that successfully passes the exam will receive their C|EH certificate and membership privileges. Members are expected to adhere to recertification requirements through EC-Council’s Continuing Education Requirements.

 

As a powerful addition to the C|EH exam, the new C|EH (Practical) exam is now available adding even more value to the C|EH certification through practical validation of skills and abilities.

100% Compliance to NICE 2.0 Framework

Inclusion of New Module (Vulnerability Analysis and IoT Hacking)

Focus on Emerging Attack Vectors (e.g., Cloud, AI, ML, etc.)

Hacking Challenges at the End of Each Module

Coverage of latest Malware

Inclusion of complete Malware Analysis Process

Hands-on Program

Lab environment simulates a real-time environment

Covers latest hacking tools (Based on Windows, MAC, Linux, and Mobile)

ANSI Accreditation

Core: C|EH (Practical)

Advanced: EC-Council Certified Security Analyst

Expert: Licensed Penetration Tester (Master)

Course outline

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypot
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

Information about the course and the exam

What is C|EH?

The most desired information security
training program in the industry,
the accredited course provides the
advanced hacking tools & techniques
used by hackers & information security
professionals alike to break into an
organization.

Course Content

Who’s It For?

What’s New in CEH V10?

5 Phases of Ethical Hacking

Exam Information

  • EXAM TITLE
    Certified Ethical Hacker
  • EXAM CODE
    312-50
  • # OF QUESTIONS
    125
  • DURATION
    4 Hours
  • AVAILABILITY
    ECC Exam Portal, Vue
  • TEST FORMAT
    Multiple Choice

Contact us!