The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach participants how hackers think and act maliciously so that an organization will be better positioned to set up a security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.
CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving students the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. Participants will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
In its 13th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. The CEH v13 program immerses students into the real-world ethical hacking through the dynamic CEH practice environment. With CEH Engage participants sharpen skills and prove they have what it takes to thrive as an ethical hacker.
New to CEH v13, learners will embark on their first emulated ethical hacking engagement. This four-phase engagement requires students to think critically and test the knowledge and skills gained by capturing a series of flags in each phase. It demonstrates the live application of skills and abilities in a consequence-free environment through EC-Council’s new “Cyber Range.” As learners complete their training and labs, CEH Engage empowers them to put theory into practice through a mock hacking engagement. Participants navigate a real-world, four-part engagement, targeting an emulated organization. Using a capture-the-flag format, students progress by answering critical “flag” questions, gaining hands-on experience in a full-scale ethical hacking operation. Note: in its 13th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits and technologies. Additionally, this course includes one remote exam voucher for the CEH – Certified Ethical Hacker exam (312-50).
Target Audience
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure and currently have the following:
- At least two years of IT security experience
- A strong working knowledge of TCP/IP
SPCERT CompTIA Security+ Certification Preparation (SYO-601)
What You'll Learn
- With 20 cutting-edge modules, you’ll gain the core skills needed to dominate the cybersecurity landscape. CEH isn’t just keeping pace—it’s leading the charge, evolving with the latest operating systems, exploits, tools, and hacking techniques to ensure you’re always ahead of the curve.
- Dive deep into the future of cybersecurity with training that integrates AI into all five phases of ethical hacking, reconnaissance and scanning to gaining access, maintaining access, and covering tracks. You’ll harness the power of AI to supercharge your hacking techniques and disrupt AI systems—giving you 10x efficiency in your cybersecurity role.
- CEH v13 isn’t just a certification; it’s a fully immersive experience. CEH combines comprehensive knowledge-based training with immersive hands-on labs to ensure a well-rounded learning experience. You’ll engage with live targets, tools, and vulnerable systems in a controlled environment, building real-world skills that empower you to confidently apply your expertise in any scenario. Get ready to transform the way you hack and protect the digital world!
*Request Detailed Syllabus
~On-Demand delivery options also available!
- Course Number CEH
- Course Length 5 days
- Course Fee $3,495.00
- Delivery Format vILT (Instructor Led; Virtual LIVE Online; Remote Training)
- Course Topic Certification
- Vendor (ISC)2, ISACA, CBK, EC-Council
Need a different date? This course is also offered on these dates
Date | Course ID | Course Name | Duration | Delivery Format | Registration | |
---|---|---|---|---|---|---|
11/04/2024 | CEH | Certified Ethical Hacker (CEHv12; 312-50) | 5 days | vILT | Register | |
11/18/2024 | CEH | Certified Ethical Hacker (CEHv12; 312-50) | 5 days | vILT | Register | |
12/02/2024 | CEH | Certified Ethical Hacker (CEHv12; 312-50) | 5 days | vILT | Register | |
01/13/2025 | CEH | Certified Ethical Hacker (CEHv12; 312-50) | 5 days | vILT | Register | |
03/10/2025 | CEH | Certified Ethical Hacker (CEHv12; 312-50) | 5 days | vILT | Register | |
03/10/2025 | CEH | Certified Ethical Hacker (CEHv12; 312-50) | 5 days | vILT | Register |
About the instructorMike Danseglio
Systems & IT Security Instructor; CISSP, CEHMike has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes. His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures. Mike has published several books and numerous papers on computer security including Microsoft’s own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations. Mike performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.
Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes. “I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.” Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance. Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.
Training Location
Certified Ethical Hacker (CEHv12; 312-50)
,
Register for course: CEH
"*" indicates required fields