Course Description

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community.

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.

CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

Information Security Analyst/Administrator, Information Assurance (IA) Security Officer, Information Security Manager/Specialist, Information Systems Security Engineer/Manager, Information Security Professionals/Officers, Information Security/IT Auditors, Risk/Threat/Vulnerability Analyst, System Administrators, Network Administrators and Engineers

5 days
Minimum 40 hours

The C|EH (ANSI) exam can be challenged post the completion of attending the complete official C|EH course. Candidates that successfully passes the exam will receive their C|EH certificate and membership privileges. Members are expected to adhere to recertification requirements through EC-Council’s Continuing Education Requirements.


As a powerful addition to the C|EH exam, the new C|EH (Practical) exam is now available adding even more value to the C|EH certification through practical validation of skills and abilities.

• Core: C|EH (Practical)

• Advanced: Licensed Penetration Tester (Master)

• Expert: Certified Penetration Testing Professional

Certified Ethical Hacker (ANSI) 312-50 (ECC EXAM), 312-50 (VUE)

Number of questions: 125

Duration: 4 hours

Test format: Multiple choice

Passing score: Please refer to

What's in the new CEHv11? Up-to-date content New hands-on labs Hacking challenges

Incorporating Parrot Security OS

When compared to Kali Linux, Parrot Security OS offers better performance on lower-powered laptops and machines while offering an intuitive look and feel with a larger repository of general tools.

Covering the Latest Threats - Fileless Malware

As fileless malware is a relatively new form of malware attack, organizations find it difficult to detect. With the CEH v11, you can now learn various fileless malware techniques and defensive strategies.

Re-Mapped to NIST/NICE Framework

CEH v11 is mapped to important Specialty Areas under the NIST/NICE framework’s Protect and Defend (PR) job role category overlapping with other job roles, including Analyze (AN) and Securely Provision (SP).

New Lab Designs and Operating Systems

CEH v11 includes new operating systems (Windows Server 2019, Windows Server 2016, Windows 10) configured with Domain Controller, firewalls, and vulnerable web applications for practicing and improving hacking skills.

Enhanced Cloud Security, IoT, and OT Modules

CEH v11 covers updated Cloud and IoT modules to incorporate CSP’s Container Technologies (e.g., Docker, Kubernetes), Cloud Computing threats, and a number of IoT hacking tools (e.g. Shikra, Bus Pirate, Facedancer21, and more).

Increased Lab Time and Hands−on Focus

More than 50% of the CEH v11 course is dedicated to practical skills in live ranges via EC-Council labs. EC-Council leads in this aspect of the industry.

Modern Malware Analysis

CEH v11 now includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware, and more!

Industry’s Most Comprehensive Tools Library

The CEH v11 course includes a library of the latest tools required by security practitioners and pen testers across the world.

Break-The-Code Challenge

BTC takes Gamification to the next level, packed with 24 incredible Hacking Challenges (on steroids!), across 4 levels of complexity covering 18 attack vectors, including the OWASP Top 10!

Increased Lab Time and Hands−on Focus

More than 50% of the CEH v11 course is dedicated to practical skills in live ranges via EC-Council labs. EC-Council leads in this aspect of the industry.

Course outline

► Introduction to Ethical Hacking

► Footprinting and Reconnaissance

► Scanning Networks

► Enumeration

► Vulnerability Analysis

► System Hacking
► Malware Threats
► Sniffing

► Social Engineering

► Denial-of-Service

► Session Hijacking

► Evading IDS, Firewalls, and Honeypots

► Hacking Web Servers

► Hacking Web Applications

► SQL Injection

► Hacking Wireless Networks

► Hacking Mobile Platforms

► IoT and OT Hacking

► Cloud Computing

► Cryptography

Contact us!