EC-Council CEH
Rated 3.5/5 based on 11 customer reviews

EC-Council CEH

Available: Out of Stock
$0.00

Request Info
The Certified Ethical Hacker (CEH) certification path teaches you the hacking skills necessary to successfully perform a penetration test. You’ll learn the techniques and tools used by cybercriminals and how to apply them to conduct security assessments and report your findings.

Skill assessment

Skill assessment | 20 questions

See how your CEH skills stack up against other professionals in your field.

Penetration Testing Cyber Range

Cyber range | 34 labs

Gain practical experience and build your real-world pentesting skills through 34 hands-on labs in the Penetration Testing Cyber Range.

CEH Custom Practice Exam

Custom practice exam | 1,017 questions

Prepare for your CEH exam and test your domain knowledge

Introduction to Ethical Hacking

Course | 38 minutes

Discover the basics of ethical hacking in this introductory course covering penetration testing methodologies and tools as well as an introduction to Linux.

Passive Intelligence Gathering

Course | 1 hour 17 minutes

Learn about passive intelligence gathering, one of the key aspects of ethical hacking, in this four-video overview course.

Network Recon

Course | 39 minutes

Learn the process of network reconnaissance and how it relates to ethical hacking, including tools, scan types and identifying vulnerable systems.

Fundamentals of Exploitation

Course | 47 minutes

Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.

Breaking Password Security

Course | 27 minutes

Learn about breaking passwords, including different attack types and popular tools as well as tricks to retrieving passwords from Windows systems.

Attacking Web Servers and Applications

Course | 35 minutes

Learn about attacking web servers and applications, including gathering server information and using tools to carry out ethical hacks such as crosssite scripting and SQL injection.

Post-Exploitation Techniques

Course | 43 minutes

Learn about taking advantage of a system after it’s been compromised, including leveraging post-exploitation techniques, using malware and exfiltrating data.

Attacking Wireless Networks

Course | 21 minutes

Learn about exploiting wireless networks, including protocols and weak points as well as an overview of mobile devices.

IoT Security

Course | 11 minutes

Learn about the Internet of Things (IoT) and how ethical hackers can exploit the growing number of internet-connected devices.

Covering Tracks

Course | 11 minutes

Get insight into how cybercriminals and ethical hackers cover their tracks by removing evidence and any traces of their intrusion.

Cryptography Fundamentals

Course | 38 minutes

Explore how cryptography relates to ethical hacking, including key cryptography concepts, cryptography uses and cryptanalytic attacks.

Information Security Frameworks

Course | 21 minutes

Get insight into a number of popular security frameworks and learn how they’re used to implement controls and manage risk.

The Certified Ethical Hacker (CEH) certification path teaches you the hacking skills necessary to successfully perform a penetration test. You’ll learn the techniques and tools used by cybercriminals and how to apply them to conduct security assessments and report your findings.

Skill assessment

Skill assessment | 20 questions

See how your CEH skills stack up against other professionals in your field.

Penetration Testing Cyber Range

Cyber range | 34 labs

Gain practical experience and build your real-world pentesting skills through 34 hands-on labs in the Penetration Testing Cyber Range.

CEH Custom Practice Exam

Custom practice exam | 1,017 questions

Prepare for your CEH exam and test your domain knowledge

Introduction to Ethical Hacking

Course | 38 minutes

Discover the basics of ethical hacking in this introductory course covering penetration testing methodologies and tools as well as an introduction to Linux.

Passive Intelligence Gathering

Course | 1 hour 17 minutes

Learn about passive intelligence gathering, one of the key aspects of ethical hacking, in this four-video overview course.

Network Recon

Course | 39 minutes

Learn the process of network reconnaissance and how it relates to ethical hacking, including tools, scan types and identifying vulnerable systems.

Fundamentals of Exploitation

Course | 47 minutes

Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.

Breaking Password Security

Course | 27 minutes

Learn about breaking passwords, including different attack types and popular tools as well as tricks to retrieving passwords from Windows systems.

Attacking Web Servers and Applications

Course | 35 minutes

Learn about attacking web servers and applications, including gathering server information and using tools to carry out ethical hacks such as crosssite scripting and SQL injection.

Post-Exploitation Techniques

Course | 43 minutes

Learn about taking advantage of a system after it’s been compromised, including leveraging post-exploitation techniques, using malware and exfiltrating data.

Attacking Wireless Networks

Course | 21 minutes

Learn about exploiting wireless networks, including protocols and weak points as well as an overview of mobile devices.

IoT Security

Course | 11 minutes

Learn about the Internet of Things (IoT) and how ethical hackers can exploit the growing number of internet-connected devices.

Covering Tracks

Course | 11 minutes

Get insight into how cybercriminals and ethical hackers cover their tracks by removing evidence and any traces of their intrusion.

Cryptography Fundamentals

Course | 38 minutes

Explore how cryptography relates to ethical hacking, including key cryptography concepts, cryptography uses and cryptanalytic attacks.

Information Security Frameworks

Course | 21 minutes

Get insight into a number of popular security frameworks and learn how they’re used to implement controls and manage risk.