Skill assessment
Skill assessment | 20 questions
See how your CEH skills stack up against other professionals in your field.
Penetration Testing Cyber Range
Cyber range | 34 labs
Gain practical experience and build your real-world pentesting skills through 34 hands-on labs in the Penetration Testing Cyber Range.
CEH Custom Practice Exam
Custom practice exam | 1,017 questions
Prepare for your CEH exam and test your domain knowledge
Introduction to Ethical Hacking
Course | 38 minutes
Discover the basics of ethical hacking in this introductory course covering penetration testing methodologies and tools as well as an introduction to Linux.
Passive Intelligence Gathering
Course | 1 hour 17 minutes
Learn about passive intelligence gathering, one of the key aspects of ethical hacking, in this four-video overview course.
Network Recon
Course | 39 minutes
Learn the process of network reconnaissance and how it relates to ethical hacking, including tools, scan types and identifying vulnerable systems.
Fundamentals of Exploitation
Course | 47 minutes
Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.
Breaking Password Security
Course | 27 minutes
Learn about breaking passwords, including different attack types and popular tools as well as tricks to retrieving passwords from Windows systems.
Attacking Web Servers and Applications
Course | 35 minutes
Learn about attacking web servers and applications, including gathering server information and using tools to carry out ethical hacks such as crosssite scripting and SQL injection.
Post-Exploitation Techniques
Course | 43 minutes
Learn about taking advantage of a system after it’s been compromised, including leveraging post-exploitation techniques, using malware and exfiltrating data.
Attacking Wireless Networks
Course | 21 minutes
Learn about exploiting wireless networks, including protocols and weak points as well as an overview of mobile devices.
IoT Security
Course | 11 minutes
Learn about the Internet of Things (IoT) and how ethical hackers can exploit the growing number of internet-connected devices.
Covering Tracks
Course | 11 minutes
Get insight into how cybercriminals and ethical hackers cover their tracks by removing evidence and any traces of their intrusion.
Cryptography Fundamentals
Course | 38 minutes
Explore how cryptography relates to ethical hacking, including key cryptography concepts, cryptography uses and cryptanalytic attacks.
Information Security Frameworks
Course | 21 minutes
Get insight into a number of popular security frameworks and learn how they’re used to implement controls and manage risk.
Skill assessment
Skill assessment | 20 questions
See how your CEH skills stack up against other professionals in your field.
Penetration Testing Cyber Range
Cyber range | 34 labs
Gain practical experience and build your real-world pentesting skills through 34 hands-on labs in the Penetration Testing Cyber Range.
CEH Custom Practice Exam
Custom practice exam | 1,017 questions
Prepare for your CEH exam and test your domain knowledge
Introduction to Ethical Hacking
Course | 38 minutes
Discover the basics of ethical hacking in this introductory course covering penetration testing methodologies and tools as well as an introduction to Linux.
Passive Intelligence Gathering
Course | 1 hour 17 minutes
Learn about passive intelligence gathering, one of the key aspects of ethical hacking, in this four-video overview course.
Network Recon
Course | 39 minutes
Learn the process of network reconnaissance and how it relates to ethical hacking, including tools, scan types and identifying vulnerable systems.
Fundamentals of Exploitation
Course | 47 minutes
Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.
Breaking Password Security
Course | 27 minutes
Learn about breaking passwords, including different attack types and popular tools as well as tricks to retrieving passwords from Windows systems.
Attacking Web Servers and Applications
Course | 35 minutes
Learn about attacking web servers and applications, including gathering server information and using tools to carry out ethical hacks such as crosssite scripting and SQL injection.
Post-Exploitation Techniques
Course | 43 minutes
Learn about taking advantage of a system after it’s been compromised, including leveraging post-exploitation techniques, using malware and exfiltrating data.
Attacking Wireless Networks
Course | 21 minutes
Learn about exploiting wireless networks, including protocols and weak points as well as an overview of mobile devices.
IoT Security
Course | 11 minutes
Learn about the Internet of Things (IoT) and how ethical hackers can exploit the growing number of internet-connected devices.
Covering Tracks
Course | 11 minutes
Get insight into how cybercriminals and ethical hackers cover their tracks by removing evidence and any traces of their intrusion.
Cryptography Fundamentals
Course | 38 minutes
Explore how cryptography relates to ethical hacking, including key cryptography concepts, cryptography uses and cryptanalytic attacks.
Information Security Frameworks
Course | 21 minutes
Get insight into a number of popular security frameworks and learn how they’re used to implement controls and manage risk.