Certified Ethical Hacker | CEH Live Online Training & Exam Voucher

Current Stock:
Adding to cart… The item has been added
Certified Ethical Hacker | CEH Live Online Training & Exam Voucher

The most advanced ethical hacking course in the world covers 20 current security domains crucial for ethical hackers aiming to enhance their organization's information security. The course consists of 20 detailed modules that delve into more than 270 attack technologies typically employed by hackers. Our security specialists have created over 140 labs that replicate real-life scenarios, allowing you to experience an attack firsthand and access over 2200 commonly used hacking tools to fully immerse yourself in the world of hackers. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You leave equipped with sought-after ethical hacking skills and the internationally acclaimed Certified Ethical Hacker certification!

After purchasing your Live Training program, an agreement will be emailed to you for signing with EC-Council. This agreement will confirm the live training date and outline the available refund options. Upon receiving the signed document, we will proceed to register you for your CEH training with the EC-Council and dispatch all necessary materials for the program.
Contact us to find out how to SAVE extra money on your CEH Live Online Training.


*$100 administration fee per a retake and limited to 4 attempts in 1 year with a 14 day cooling off period between attempts. Valid for current version only.

The Certified Ethical Hacker (CEH) Course Outline

20 Modules designed to help you excel in the basics of Ethical Hacking and get ready to take on the challenge of the CEH certification exam. 

Module 1: Introduction to Ethical Hacking Module 11: Session Highjacking
Module 2: Foot Printing and Reconnaissance Module 12: Evading IDS, Firewalls, and Honeypots
Module 3: Scanning Networks Module 13: Hacking Web Servers
Module 4: Enumeration Module 14: Hacking Web Applications
Module 5: Vulnerability Analysis Module 15: SQL Injection
Module 6: System Hacking Module 16: Hacking Wireless Networks
Module 7: Malware Threats Module 17: Hacking Mobile Platforms
Module 8: Sniffing Module 18: IoT and OT Hacking
Module 9: Social Engineering Module 19: Cloud Computing
Module 10: Denial-of-Service Module 20: Cryptography