Certified Ethical Hacker: (CEH v11)

Demanded by Employers. Respected by Peers.

Contact classes available

For details on dates and prices please contact us

CERTIFIED ETHICAL HACKER CEH V11

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

WE ARE AN ACCREDITED

EC Council Training and Exam Center

Certified Ethical Hacker – (CEH v11)

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”


Online Booking Coming Soon!

  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
  • Passing Score: In order to maintain the high integrity of our c

Target Audience

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat / Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers

Suggested Course Duration
Training Boot Camps
Days: 5, Minimum Hours: 40

Academic Courses
Days: Adapts according to the academic format of universities.
Minimum Hours: Vary according to program requirements of universities.

  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Passing Score: In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

Virtual Classes
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought-after IT Security hacking training courses in a streaming video format.

Training Partner (In Person)
This solution offers in-person CEH training so that you can get the benefit of collaborating with your peers and gaining real-world skills.

Highlights of some of what sets CEH v11 apart from the rest:

  • Mapped to NICE 2.0

  • Better Interface

  • Emerging Attack Vectors

  • Modern Exploit Technologies

  • Hands-on Hacking Challenges

  • Modern Case Studies and Current Events

  • Enhanced Focus on Malware Analysis

  • Live, Cyber Range (no simulations)

  • Greater Focus on Cloud and IoT

  • Thousands of Hacking Techniques, Tricks, and Tools

Why Is CEH In-Demand Globally?

With the CEH v11 we’ve taken all that the CEH already is and added more to it, to make it even better, more advanced, more detailed, and yet succinct.

In 2003, CEH introduced the five phases of ethical hacking, the blueprint for approaching your target and succeeding at breaking in. We have continued to hone these 5 phases, updating and refining them to match the skillset ethical hackers need today:

  1. Reconnaissance
  2. Gaining Access
  3. Enumeration
  4. Maintaining Access
  5. Covering Your Tracks

CEH v11 covers more than 500 new threats and vulnerability scenarios. This includes but is not limited to: APT, Fileless Malware, Web API Threats, Webhooks, Web Shell, OT Attacks, Cloud Attacks, AI, ML, and much more.

We work to deliver only the latest technologies, but also emerging technologies such as OT Technology, Container Technology.

Practice what you learned. Understand how knowledge can be transformed into skills and how these skills can be used to solve business issues with hands-on hacking challenges at the end of each module to reinforce what you’ve learned!

With the new Parrot OS, you have everything you need to develop your own programs and protect your privacy while using the Internet. You will enjoy better performance on lower powered laptops and machines with an intuitive interface and a larger repository of tools.

CEH v11 now includes the latest Malware Analysis tactics for ransomware, banking and financial malware, IoT botnets, OT Malware Analysis, Android Malware, and more!

EC-Council leads the industry with more than 50 percent of course content dedicated to practical skills in live ranges leveraging our renowned iLabs.

CEH Exams

Prove Your Skills and Abilities With Online, Practical Examinations.

The CEH exam is a 4-hour exam with 125 multiple choice questions. This knowledge-based exam will text your skills in Information Security Threats and Attack Vectors, Attack Detection, Attack Prevention, Procedures, Methodologies and more!

CEH Practical is a 6-hour, rigorous exam that requires you to demonstrate skills and abilities of ethical hacking techniques such as:

 

  • Port scanning tools (e.g., Nmap, Hping)
  • Vulnerability detection
  • Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
  • SQL injection methodology and evasion techniques
  • Web application security tools (e.g., Acunetix WVS)
  • SQL injection detection tools (e.g., IBM Security AppScan)
  • Communication protocols and more

This is the next step to become a CEH Master after you have achieved your CEH certification. Within CEH Practical, you have a limited amount of time to complete 20 challenges testing your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VMs and applications with solutions to uncover vulnerabilities.

Upon Completing the CEH (Master) program, consisting of CEH and CEH (Practical), the CEH (Master) designation is awarded. CEH Masters have shown proficiency at a master level in the Knowledge, Skills, and abilities of Ethical Hacking with a total 6 hours of testing to prove their competency. Top 10 performers in both CEH and CEH Practical exams are showcased on the CEH Master Global Ethical Hacking Leader Board.

Some Facts

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers.