From the creators of Certified Ethical Hacker (CEH) comes the new and evolved version 13 with added AI capabilities. Structured across 20 learning modules covering over 550 attack techniques, CEH provides you with the core knowledge you need to thrive as a cybersecurity professional.
The world's first ethical hacking certification to harness the power of AI.
Hone your skills in real-world scenarios through hands-on labs, where you practice attack vectors and master advanced hacking tools.
Learn AI-driven techniques to boost efficiency in cyber defense by 40% while streamlining your workflow.
Master the latest advanced attack techniques, trends, and countermeasures.
Advanced threat detection, enhanced decision-making, adaptive learning, enhanced reporting, and automation of repetitive tasks.
Participate in monthly global hacking competitions, compete with your peers, and make it to the leaderboard.
While all CEH course kits have complete access to eCourseware and include an exam voucher, a few additional features and learning materials can be added to build deeper expertise and gain practical experience. This means that there is a CEH package to suit everyone’s learning requirements.
*Exam Retakes: This benefit provides candidates with the respective exam voucher on the ECC EXAM portal but excludes proctor administration fees which will apply for each attempt of the examination. Applicable to CEH Exam only. Please contact your training provider for details.
*Open AI API credits are not included as part of the program. Please refer to the FAQ for detailed information.
CEH is a globally-recognised certification with flexible-learning options to fit your lifestyle and commitments.
CEH follows a unique 4-step framework
EC-Council’s Certified Ethical Hacker (CEH) certification gives you the skills and knowledge needed to drive your career forward in the age of AI.
With CEH you'll learn how to think like a hacker and uncover any hidden vulnerabilities before hackers do.
We’ll equip you to:
EC-Council’s exclusive 4-step framework provides a structured and comprehensive approach to mastering ethical hacking.
CEH offers a balanced blend of knowledge-based training and hands-on labs using real-world scenarios and is powered by AI.
Upon completing the training, you can attempt both of our exams to demonstrate your skills and earn the CEH Master certification:
This 4-hour exam with 125 multiple-choice questions will test your skills in:
In 6 hours you’ll complete 20 real-world challenges to test your proficiency. You’ll do this by incorporating a live corporate network of VMs and applications with ethical hacking solutions to uncover any vulnerabilities.
CEH helps you develop real-world experience in ethical hacking through hands-on practice in a Cyber Range.
CEH helps you develop real-world experience in ethical hacking through hands-on practice in a Cyber Range.
This 4-phase engagement requires critical thinking and tests the knowledge and skills you've gained through capturing a series of flags in each phase, demonstrating the live application of abilities in a consequence-free environment via EC-Council's Cyber Range.
Get a year-long access to 12 CTF challenges. Each month presents a different theme and challenge with capture-the-flag style competitions focusing on ethical hackers' core skills and abilities.
Gain exposure to new tools, focus on new attack vectors, and try to exploit emerging vulnerabilities while gaining continuing education credits and keeping your skills and certifications current.
These 4-hour challenges are open all month long, allowing you to compete whenever you're ready. All you need is an internet connection and your hacking expertise – we provide the attack platform, targets, and all the necessary tools and training.
Learn the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Key topics covered: Elements of Information Security, Classification of Attacks, Hacker Classes, Ethical Hacking, AI-Driven Ethical Hacking, ChatGPT-Powered AI Tools for Ethical Hackers, CEH Ethical Hacking Framework, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Information Assurance (IA), Risk Management, Threat Intelligence Lifecycle, Incident Management, PCI DSS, HIPPA, SOX, GDPR, DPA
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Learn different network scanning techniques and countermeasures.
Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are included as well.
Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Learn about packet-sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Learn the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Learn about firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
Certification is awarded when the knowledge exam is passed. In order to achieve CEH Master Level certification, an additional practical exam needs to be taken. This practical exam is optional.
The Knowledge Exam will test your skills in:
Format
Multiple choice
Duration
4 hours
Questions
125
Delivery
Online via the ECC exam portal
Passing score
60% to 85%
The practical exam is optional but will reward you with a higher level of certification. It will test your practical skills with:
Duration
6 hours
Questions
20 challenges
Delivery
iLabs Cyber Range
Passing score
60% to 85%
Drive your cybersecurity career forward with CEH, enhanced by the power of AI
Turbocharge your team's knowledge with certified ethical hacking powered by AI
CEH is trusted and highly valued globally by government departments and defense bodies
Create and grow your own cybersecurity courses and programs
- World Economic Forum, Future of Jobs Report, May 2023
Earn world-class certifications trusted and highly valued globally by government bodies, private organizations, and the defense.
Advance your career with our expert guidance.
Chief Expert Information Security Officer, Ministry of Agriculture, Food and Forestry
Engineering Manager, Android Offensive Security, Google
Security Engineer, Zoom
CEH is a great place to start your career in cybersecurity, but you’re required to have some knowledge before applying. It’s recommended that you have a minimum of 2 years of IT security experience before attempting CEH. If you don’t have the experience and are just getting started on this path as an entry-level professional, we recommend taking our Cybersecurity Essentials Series where you can learn the foundations required to pursue mid-level and specialization certifications like CEH, CND, CHFI, CTIA, ECIH, CSA, CCISO, and others.
There are no specific prerequisites for the CEH program. However, we strongly recommend that candidates possess a minimum of 2 years of experience in IT security before attempting CEH.
CEH training involves testing systems and using them for purposes not originally intended. Candidates should understand the basic functions of those IT systems before attempting to hack them.
For example, CEH will teach the process of host evaluation leading to enumeration. In this process, trainees will scan downrange targets using common scanning techniques such as Nmap, which will respond with a list of ports. Enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems.
However, in this scenario, CEH will not teach you what a port is. This is essential knowledge that you must have to be successful in the class.
If you do not possess the foundational skills in IT and networking, we recommend starting with our Cybersecurity Essentials Series.
CEH pricing varies depending on a few factors. First, you need to decide whether you prefer online self-paced, online live, or in-person training. Speak with one of our career advisors about CEH costs and available funding options. We are excited that you are considering this career path, and our team is here to help you find the best CEH price that fits your budget and schedule.
Considering the global need and lack of qualified talent in the workforce, cybersecurity professionals are usually paid exceptionally well.
As of September 2024, a simple search on Salary.com for US -based positions shows that Ethical Hackers make an average of $110,757 per year, which is an increase of $6800 compared to $103,866 in 2022, and with the 90th percentile earning above $137,000.
Experience, education levels, and other certifications typically increase earning potential, but it’s common to see starting salaries for ethical hackers that often exceed six figures.
We recommend searching your local job boards, viewing local salary information, and talking to potential employers to assess your own value in the market. CEH has been ranked in the top 5 highest paid cybersecurity certifications for the last 10 years and continues to grow worldwide.
Ethical hacking is crucial to cybersecurity and offers extensive growth opportunities. If you want to learn ethical hacking on your own, it may seem easy, but it requires a lot of experience and knowledge.
You need to stay up-to-date with the latest hacking trends and resources in order to combat the escalating cyber threats. In addition to technical skills, you should also be familiar with basic hacking tools, penetration testing, and other aspects of ethical hacking, including the use of AI in cybersecurity.
The ethical hacking phases require extensive training and practical experience in areas such as attack vectors and penetration testing, SQL injection attacks, denial of service attacks, firewall attacks, password cracking, enumeration, and cloud computing.
There are many online resources available for learning ethical hacking, but it can be difficult to choose the right one. Therefore, it is important to have a structured learning method from a reliable source.
An accredited program like the EC-Council’s CEH (Certified Ethical Hacker) is considered the gold standard in ethical hacking and is recognized worldwide. If you’re passionate about this field and enjoy thinking outside the box, then you can build a successful career in this field.
Yes, CEH is available online through both self-paced learning and live instructor-led training. Click here for more information.
Getting certified is about validating your knowledge. CEH is trusted by employers across the globe as a baseline cybersecurity certification. Certified ethical hackers hold various job titles and roles because the ethical hacking process is fundamental to many cybersecurity operations.
While some organizations have ethical hackers in their job role framework, they often take on other forms with a specialization such as Network Defender, Penetration Tester, Secure Coder, Cloud Security Engineer, Security Architect, Auditor, and even leadership roles.
Yes, if you enroll as a student at EC-Council University (ECCU) and pursue a bachelor’s or master’s degree, many of the courses throughout the program align with industry certifications.
The CIS 404 Hacker Techniques, Tools, and Incident Handling program maps to the Certified Ethical Hacker exam. Students who complete this course through ECCU will be eligible to attempt the CEH exam.
Accreditations measure the capability of the certification body in various aspects, including program design, management, content, delivery, policy, discipline, financial viability, relevance of training, demand, and more.
CEH is accredited by:
Yes, the CEH is recognized by the United States military. It is eligible for military benefit reimbursement through the US Army Ignited program and is approved by the US Department of Veterans Affairs for reimbursement utilizing Post-9/11 GI Bill funds.
CEH is also recognized across various military forces in their enlisted and officer ranks, meeting the requirements of over 320 distinct job roles.
Funding and reimbursement eligibility may vary depending on the specific branch of the military.
Yes, the CEH is approved by the US Department of Defense (DoD) under Directive 8140 as meeting the baseline requirements for 4 out of the 5 Cybersecurity Service Provider Roles (CSSP) roles.
As mentioned in the 8140 Information Assurance Workforce Improvement Program, as per the latest DoD 8140, CEH is recognized for the following job roles:
Discover our most popular certifications and see for yourself why participants rate them so highly.
EC-Council is recommended and endorsed by leading organisations and government bodies in the cybersecurity industry.
EC-Council is recommended and endorsed by leading organisations and government bodies in the cybersecurity industry.
ANAB, the ANSI National Accreditation Board, provides accreditation services in over 75 countries and is the largest accreditation body in N. America.
Helps Army Soldiers with full tuition and exam cost coverage for IT, cybersecurity and project management certifications.
A partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.