Become a Certified Ethical Hacker (CEH)
The Certified Ethical Hacker (CEH) certification path teaches you the hacking skills necessary to successfully perform a penetration test. You’ll learn the techniques and tools used by cybercriminals and how to apply them to conduct security assessments and report your findings.
EC-Council Certified Ethical Hacker (CEH) training
This learning path teaches you the hacking skills and methodology needed to perform a penetration test against an organization. You’ll learn the foundations of ethical hacking and penetration testing as you progress through 12 courses tied to the seven Certified Ethical Hacker (CEH) exam objectives. Upon completion you’ll be prepared to earn your CEH certification and have an established base of hacking knowledge that can be leveraged to progress into more advanced security certifications or open up new career roles.
Learning path components
CEH Custom Practice Exam
CEH Skill Assessment
Penetration Testing Cyber Range
Introduction to Ethical Hacking
Passive Intelligence Gathering
Fundamentals of Exploitation
Breaking Password Security
Attacking Web Servers
Attacking Wireless Networks
Information Security Frameworks
What you’ll learn.
The CEH certification exam includes seven primary objectives:
- Background on technologies and malware
- Analysis and assessment
- Tools, systems and programs
- Procedures and methodology
- Regulation and policy
Who is this for?
A firm understanding of the Windows OS, exposure to the Linux OS or other Unix-based OS, and a grasp of the TCP/IP protocols are recommended. This certification path is designed for:
- Security analysts
- Security consultants
- Vulnerability researchers
- Penetration testers
- Anyone with a desire to get certified in ethical hacking!
Penetration Testing Cyber Range
This cyber range helps you develop your knowledge of penetration testing and ethical hacking by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of pentesting topics, including abusing protocols, scanning for vulnerabilities, identifying exploits and delivering payloads, and more. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new pentesting skills.
You're in good company
Infosec Skills is a very good place for building technical acumen and engineering development knowledge. It enables us to provide training to the entire team on relevant topics.
Romy Ricafort, West Division Senior Director of Sales Engineering
Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I've had.
James Coyle , Senior U.S. Public Sector Channel Sales Engineer
Award-winning training that you can trust
Best IT Security-related Training Program
Infosec and Infosec Skills
Best Cybersecurity Education Provider and Best Security Education Platform
Most Innovative Product
Cyber Security Education and Training
Exceptional learning experiences powered by LX Labs cyber expertise
Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.