Skip Navigation or Skip to Content
Sign In  |  View Cart  |    |  Help  |  
Print Course information
Email to a friend
Return to Course Catalog

Prepare. Grow. Transform. > Engineering and Technology

Certified Ethical Hacker (Voucher Included)   

This online Certified Ethical Hacker (CEH) course will teach you the valuable details that every information security professional needs to know.



Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: macOS 10.10 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.

  • Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)

To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.


  1. Introduction to Ethical Hacking
  2. Foot Printing and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Evading IDS, Firewalls and Honeypots
  13. Hacking Web Servers
  14. Hacking Web Applications
  15. SQL Injection
  16. Hacking Wireless Networks
  17. Hacking Mobile Platforms
  18. IoT and OT Hacking
  19. Cloud Computing
  20. Cryptography

What you will learn

  • Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
  • Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
  • Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
  • Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
  • Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research

How you will benefit

  • Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
  • Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
  • Obtain a credential highly acknowledged and recognized by employers in the public and private sector
  • Complete the most advanced, hands on ethical hacking program in the industry

Eric Reed

Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.

  • Certified Ethical Hacker (Voucher Included)
  • Fee: $2,995.00
    Times: Self-paced Course

    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.

 

  • Certified Ethical Hacker (Voucher Included)
  • Fee: $2,995.00
    Times: Self-paced Course

    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.

 

  • Certified Ethical Hacker (Voucher Included)
  • Fee: $2,995.00
    Item Number: 25U1CTP74349-01
    Dates: 5/16/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This online Certified Ethical Hacker (CEH) course will teach you the valuable details that every information security professional needs to know.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.

    • Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)

    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.


    1. Introduction to Ethical Hacking
    2. Foot Printing and Reconnaissance
    3. Scanning Networks
    4. Enumeration
    5. Vulnerability Analysis
    6. System Hacking
    7. Malware Threats
    8. Sniffing
    9. Social Engineering
    10. Denial of Service
    11. Session Hijacking
    12. Evading IDS, Firewalls and Honeypots
    13. Hacking Web Servers
    14. Hacking Web Applications
    15. SQL Injection
    16. Hacking Wireless Networks
    17. Hacking Mobile Platforms
    18. IoT and OT Hacking
    19. Cloud Computing
    20. Cryptography

    What you will learn

    • Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
    • Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
    • Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
    • Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
    • Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research

    How you will benefit

    • Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
    • Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
    • Obtain a credential highly acknowledged and recognized by employers in the public and private sector
    • Complete the most advanced, hands on ethical hacking program in the industry

    Eric Reed

    Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.


    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.

 

Some Title



Your Cart:

×