Certified Ethical Hacker (CEH)
EC Council
Learn the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Format
Hybrid
Skills developed through this program
- Apply ethical hacking techniques to identify and fix system vulnerabilities
- Think like a hacker to identify and exploit security weaknesses
- Use ethical hacking tools and techniques to strengthen organizational security
- Proactively prevent data breaches and protect organizational data and customer trust
- Leverage AI-driven techniques to enhance ethical hacking and defend against cyber threats
Occupations this program prepares you for
Credentials this program stacks toward
No pathways.
Detailed information about this program
EC-Council's Certified Ethical Hacker (CEH) certification gives you the skills and knowledge needed to drive your career forward in the age of Al. With CEH, you'll learn hacking and how to think like a hacker. We'll equip you to: • Find and fix weaknesses: Discover how hackers exploit systems and learn ethical hacking to keep your data safe. • Become a security expert: Master the top tools and techniques needed to strengthen your organization's security. • Protect your reputation: Learn to proactively prevent data breaches and safeguard your customers' trust. • Master ethical hacking with Al: Leverage Al-driven techniques to enhance your ethical hacking skills and stay ahead of cyber threats. For more than 20 years, EC-Council's cybersecurity programs have empowered professionals around the world to apply their training and expertise to combat cyberattacks. The CEH Hall of Fame celebrates individuals who have excelled, achieved, and fostered a spirit of leadership among their colleagues and peers within the cybersecurity community. The latest CEH Hall of Fame Industry Report highlights how the CEH certification continues to impact cybersecurity careers around the world. There are no specific prerequisites for the CEH program. However, we strongly recommend that candidates possess a minimum of 2 years of experience in IT security before attempting CEH. CEH training involves testing systems and using them for purposes not originally intended. Candidates should understand the basic functions of those IT systems before attempting to hack them. For example, CEH will teach the process of host evaluation leading to enumeration. In this rocess, trainees will scan downrange targets using common scanning techniques such as Nmap, which will respond with a list of ports. Enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems. However, in this scenario, CEH Al will not teach you what a port is. This is essential knowledge that you must have to be successful in the class.
What you need to earn this credential
No requirements listed.
Eligible funding programs
No funding information available.
Scholarships
No scholarships listed.