Study any time, from any device.

Become a Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) certification path teaches you the hacking skills necessary to successfully perform a penetration test. You’ll learn the techniques and tools used by cybercriminals and how to apply them to conduct security assessments and report your findings.

12 courses  //   41 videos  //   7 hours of training

EC-Council Certified Ethical Hacker (CEH) training

This learning path teaches you the hacking skills and methodology needed to perform a penetration test against an organization. You’ll learn the foundations of ethical hacking and penetration testing as you progress through 12 courses tied to the seven Certified Ethical Hacker (CEH) exam objectives. Upon completion you’ll be prepared to earn your CEH certification and have an established base of hacking knowledge that can be leveraged to progress into more advanced security certifications or open up new career roles.

Learning path components

CEH Custom Practice Exam
Practice Exam
CEH Custom Practice Exam

CEH Custom Practice Exam

Prepare for your CEH exam and test your domain knowledge.

Number of questions: 1015

Introduction to Ethical Hacking
Course
Introduction to Ethical Hacking

Introduction to Ethical Hacking

Discover the basics of ethical hacking in this introductory course covering penetration testing methodologies and tools as well as an introduction to Linux.

2 videos
39 minutes of training

Passive Intelligence Gathering
Course
Passive Intelligence Gathering

Passive Intelligence Gathering

Learn about passive intelligence gathering, one of the key aspects of ethical hacking, in this four-video overview course.

4 videos
76 minutes of training

Network Recon
Course
Network Recon

Network Recon

Learn the process of network reconnaissance and how it relates to ethical hacking, including tools, scan types and identifying vulnerable systems.

4 videos
39 minutes of training

Fundamentals of Exploitation
Course
Fundamentals of Exploitation

Fundamentals of Exploitation

Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.

7 videos
49 minutes of training

Breaking Password Security
Course
Breaking Password Security

Breaking Password Security

Learn about breaking passwords, including different attack types and popular tools as well as tricks to retrieving passwords from Windows systems.

3 videos
28 minutes of training

Attacking Web Servers
Course
Attacking Web Servers

Attacking Web Servers

Learn about attacking web servers, including gathering server information and using tools to carry out ethical hacks such as cross-site scripting and SQL injection.

3 videos
36 minutes of training

Post-Exploitation Techniques
Course
Post-Exploitation Techniques

Post-Exploitation Techniques

Learn about taking advantage of a system after it's been compromised, including leveraging post-exploitation techniques, using malware and exfiltrating data.

6 videos
44 minutes of training

Attacking Wireless Networks
Course
Attacking Wireless Networks

Attacking Wireless Networks

Learn about exploiting wireless networks, including protocols, Wi-Fi authentication and weak points, as well as an overview of mobile devices.

2 videos
22 minutes of training

IoT Security
Course
IoT Security

IoT Security

Learn about the Internet of Things (IoT) and how ethical hackers can exploit the growing number of internet-connected devices.

2 videos
11 minutes of training

Covering Tracks
Course
Covering Tracks

Covering Tracks

Get insight into how cybercriminals and ethical hackers cover their tracks by removing evidence and any traces of their intrusion.

3 videos
12 minutes of training

Cryptography Fundamentals
Course
Cryptography Fundamentals

Cryptography Fundamentals

Explore how cryptography relates to ethical hacking, including key cryptography concepts, cryptography uses and cryptanalytic attacks.

3 videos
38 minutes of training

Information Security Frameworks
Course
Information Security Frameworks

Information Security Frameworks

Get insight into a number of popular security frameworks and learn how they're used to implement controls and manage risk.

2 videos
22 minutes of training

 

What you’ll learn.

The CEH certification exam includes seven primary objectives:

  • Background on technologies and malware
  • Analysis and assessment
  • Security
  • Tools, systems and programs
  • Procedures and methodology
  • Regulation and policy
  • Ethics

Who is this for?

A firm understanding of the Windows OS, exposure to the Linux OS or other Unix-based OS, and a grasp of the TCP/IP protocols are recommended. This certification path is designed for:

  • Security analysts
  • Security consultants
  • Vulnerability researchers
  • Penetration testers
  • Anyone with a desire to get certified in ethical hacking!

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer