Certified Ethical Hacker (CEH) Training

Level: Intermediate
Rating: 4.7/5 4.66/5 Based on 335 Reviews

In this award-winning Certified Ethical Hacker (CEH) training, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker exam (312-50). Through hands-on labs which mimic real time scenarios, gain an in-depth understanding of how to deploy the tools and techniques needed to protect your network.

Included in your course tuition is an EC-Council CEH exam voucher that enables you to take the exam via ProctorU.

Key Features of this Certified Ethical Hacker Training:

  • Official EC-Council Curriculum
  • Access to hundreds of exam prep questions
  • Exam voucher included in course tuition
  • After-course instructor coaching benefit
  • After-course computing sandbox included

You Will Learn How To:

  • Successfully prepare for the Certified Ethical Hacker (CEH) Certification Exam
  • Apply countermeasures to secure your system against threats
  • Test system security and data access using real-world hacking techniques
  • Employ complex tools to identify and analyze your company's risks and weaknesses
  • Find vulnerabilities in a network infrastructure

Certifications/Credits:

EC-Council Logo CompTIA

Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals

BLENDED LEARNING

On Demand & Live Review Session

  • On-demand CEH training modules (1-year access)
  • 2 hours of one-on-one after-course instructor coaching
  • Pre-configured EC-Council iLabs (6-month access)
  • Exam voucher included
View Course Details

Standard $2525

Government $2525

ADD TO CART

PRODUCT #2031

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $4875

Government $4290

RESERVE SEAT

PRODUCT #2031

PREMIUM TRAINING

Unlimited Access to Everything

Unlimited annual access to:

  • 5-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox included
  • Self-paced lecture videos
  • Pre-configured EC-Council iLabs
  • Exam Voucher included
  • CyberQ Exam Prep
  • Test Pass Guarantee
View Bundle Details & Schedule

Standard $5195/Year

Government $5195/Year

ADD TO CART

PRODUCT #70H5

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

On Demand & Live Review Session

Certified Ethical Hacker On-Demand Course Information

Certified Ethical Hacker On-Demand Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analyzing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analyzing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognizing key indicators of a virus attack
    • Analyzing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognizing symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

In Class & Live, Online Training

  • Apr 29 - May 3 ( 5 Days)
    8:00 AM - 4:30 PM EDT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • Jun 3 - 7 ( 5 Days)
    8:00 AM - 4:30 PM EDT
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Jun 24 - 28 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • Jul 22 - 26 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Toronto / Online (AnyWare) Toronto / Online (AnyWare) Reserve Your Seat

  • Aug 12 - 16 ( 5 Days)
    8:00 AM - 4:30 PM EDT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • Sep 9 - 13 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

  • Sep 16 - 20 ( 5 Days)
    9:00 AM - 4:30 PM MDT
    Denver / Online (AnyWare) Denver / Online (AnyWare) Reserve Your Seat

  • Oct 28 - Nov 1 ( 5 Days)
    8:00 AM - 4:30 PM EDT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • Nov 18 - 22 ( 5 Days)
    9:00 AM - 4:30 PM MST
    Denver / Online (AnyWare) Denver / Online (AnyWare) Reserve Your Seat

  • Dec 2 - 6 ( 5 Days)
    8:00 AM - 4:30 PM EST
    New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Jan 13 - 17 ( 5 Days)
    9:00 AM - 4:30 PM EST
    Toronto / Online (AnyWare) Toronto / Online (AnyWare) Reserve Your Seat

  • Feb 3 - 7 ( 5 Days)
    8:00 AM - 4:30 PM EST
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • Feb 24 - 28 ( 5 Days)
    9:00 AM - 4:30 PM MST
    Denver / Online (AnyWare) Denver / Online (AnyWare) Reserve Your Seat

  • Mar 23 - 27 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Certified Ethical Hacker Course Information

  • Recommended Experience

    • Two years of security-related experience and a strong practical working knowledge of TCP/IP
  • Lab Bundle Available

  • Exam Information

    • This course includes a voucher to take the CEH exam via ProctorU
    • You can request your voucher from Learning Tree at any time after you complete the course
  • Certification Information

Certified Ethical Hacker Course Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analyzing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analyzing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognizing key indicators of a virus attack
    • Analyzing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognizing symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • How do I become a Certified Ethical Hacker?

    To become a CEH you must have two years of security-related experience and a strong practical working knowledge of TCP/IP. Then you must take and pass the CEH exam after this CEH course.

  • How do I take the EC-Council Certified Ethical Hacker exam?

    This course includes a voucher to take the CEH exam via ProctorU. After you have completed this course, you can request your voucher from Learning Tree to take the exam.

  • Is the Certified Network Defender (CND) certification a prerequisite for the CEH certification?

    No, two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended experience for the CEH Certification Training and CEH certification. 

Unlimited Access to Everything

  • Apr 29 - May 3 ( 5 Days)
    8:00 AM - 4:30 PM EDT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare)

  • Jun 3 - 7 ( 5 Days)
    8:00 AM - 4:30 PM EDT
    New York / Online (AnyWare) New York / Online (AnyWare)

  • Jun 24 - 28 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare)

  • Jul 22 - 26 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Toronto / Online (AnyWare) Toronto / Online (AnyWare)

  • Aug 12 - 16 ( 5 Days)
    8:00 AM - 4:30 PM EDT
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare)

  • Sep 9 - 13 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Ottawa / Online (AnyWare) Ottawa / Online (AnyWare)

  • Sep 16 - 20 ( 5 Days)
    9:00 AM - 4:30 PM MDT
    Denver / Online (AnyWare) Denver / Online (AnyWare)

  • Oct 28 - Nov 1 ( 5 Days)
    8:00 AM - 4:30 PM EDT
    Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare)

  • Nov 18 - 22 ( 5 Days)
    9:00 AM - 4:30 PM MST
    Denver / Online (AnyWare) Denver / Online (AnyWare)

  • Dec 2 - 6 ( 5 Days)
    8:00 AM - 4:30 PM EST
    New York / Online (AnyWare) New York / Online (AnyWare)

  • Jan 13 - 17 ( 5 Days)
    9:00 AM - 4:30 PM EST
    Toronto / Online (AnyWare) Toronto / Online (AnyWare)

  • Feb 3 - 7 ( 5 Days)
    8:00 AM - 4:30 PM EST
    Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare)

  • Feb 24 - 28 ( 5 Days)
    9:00 AM - 4:30 PM MST
    Denver / Online (AnyWare) Denver / Online (AnyWare)

  • Mar 23 - 27 ( 5 Days)
    9:00 AM - 4:30 PM EDT
    Ottawa / Online (AnyWare) Ottawa / Online (AnyWare)

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Certified Ethical Hacker Unlimited Access Training Information

This product offers the most complete CEH training availble on the market today. With unlimited annual access to all ILT course events (2031), EC Council official videos, exam prep, and labs, and your trusted Learning Tree coach, you have everything you need to have a sucessful learning experience and pass the CEH certification exam.

On-Demand Training Outline

  • Ethical Hacking Fundamentals

    Considering the effects of hacking

    • Reviewing the elements of information security
    • The security, functionality and usability triangle

    Outlining the methods of hackers

    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering tracks
    • Identifying attack types: operating system, application level, shrink–wrap code and misconfiguration

    Functions of an ethical hacker

    • Conducting vulnerability research
    • Identifying elements of information warfare
  • Applying Covert Techniques to Scan and Attack a Network

    Footprinting and reconnaissance

    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures

    Scanning networks

    • Adopting multiple scanning techniques
    • Identifying IDS–evasion and IP–fragmentation tools
    • Leveraging vulnerability scanning tools
    • Applying IP spoofing detection

    Examining enumeration techniques

    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration
  • Analyzing System Risks and Weaknesses to Apply Countermeasures

    System hacking

    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and keyloggers
    • Hiding information with steganography

    Uncovering Trojans and backdoors

    • Injecting a Trojan into a host
    • Analyzing Trojan activity

    Dissecting viruses, worms and sniffers

    • Distributing malware on the web
    • Recognizing key indicators of a virus attack
    • Analyzing worms and malware

    Social engineering and Denial–of–Service (DoS)

    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognizing symptoms and techniques of a DoS attack
    • Implementing tools to defend against DoS attacks
  • Assessing and Preventing Gaps in a Network Infrastructure

    Hacking web applications and wireless networks

    • Cross–Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL injection
    • Implementing a man–in–the–middle attack

    Hijacking sessions and web servers

    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack

    Evading IDS, firewalls and honeypots

    • Assessing various types of Intrusion Detection Systems (IDS) and tools
    • Bypassing firewalls and accessing blocked sites

    Buffer overflow and cryptography

    • Exploiting input validation failures
    • Defending against memory corruption attacks
  • Performing Penetration Testing

    • Performing security and vulnerability assessments
    • Determining testing points and locations
    • Announced vs. unannounced testing

CEH Training FAQs

  • What background do I need?

    Two years of security-related experience and a strong practical working knowledge of TCP/IP is recommended.
  • Is the on-demand content the same as the 5-day instructor class?

    Yes, and it's EC-Council official content!
  • What on-demand content will I receive?

    An outline of the content you will receive can be seen above. There is a self-paced video module for each of chapter.
  • How many labs will I receive?

    You get access to the EC-Council official pre-configured lab environment that accompanies the courseware. iLabs are valid for 6 months from the time of activation with the option to extend them, if needed.
  • What is CyberQ Exam Prep?

    CyberQ is an exam prep offering from EC-Council with “Progressive” and “Simulation” modes designed to provide the best possible chance of success on the certification exam.
  • What is the "test pass guarantee"?

    You will receive one retake exam voucher at no additional cost in the event that you don't pass the exam on the first try.
  • How will I access my course materials if I choose this method?

    Once payment is received, you will receive an email from Learning Tree with all the links and information you need to get started.

Team Training

Questions about which training is right for you?

call 888-843-8733
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition!
  • No advance payment required for most products.
  • Tuition can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Toronto / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Ottawa / Online (AnyWare)
Denver / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Denver / Online (AnyWare)
New York / Online (AnyWare)
Toronto / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Denver / Online (AnyWare)
Ottawa / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français