Certified Ethical Hacker

9000+ Learners

The Certified Ethical Hacker (v10) is the latest edition in the line of EC-Council CEH courses. The course will guide you right from the beginner level through to achieving the certification. Delivered by highly experienced instructors (all of whom are Certified EC-Council Instructors, or CEIs), the course adopts a hands-on demonstration approach.

Accredited by

Ec council accredition for home

Group Training

Looking for a personalized training for a group (3 or more participants) at your preferred location?
Contact us

GreyCampus is an EC-Council ATC

Course Overview

Description

The CEH (v10) has updated the modules from CEH (v9) on various important aspects of Cybersecurity- Vulnerability analysis, IoT devices, Attack vectors and Malware analysis. There is also added emphasis on penetration testing tools. Throughout the course, you’ll essentially use the same techniques that the “bad guys” use, including social engineering practices and even evaluating physical security to gain access. Gain knowledge in the methodologies that hackers actually use to infiltrate networks and devices; i.e., writing virus codes, and reverse engineering, etc. You will learn to perform vulnerability analysis to identify security loopholes in the networks, communication infrastructure, and end systems. 

In addition to the updated modules; there is also the launch of:

  • The STORM, a mobile security toolkit (Mobile platform attack vector, Android vulnerabilities, Mobile security guidelines, and tools). 
  • The CEH practical, which tests the candidate’s practical skills in applying the Ethical Hacking techniques in 20 real-life situations. 

Please note that Greycampus is an EC Council Authorized Training Center across North America, and uses official EC Council courseware for training delivery.

 

  • INSTRUCTOR-LED TRAINING: YES
  • EC-COUNCIL'S PRACTICE LABS: YES
  • REFERENCE eBOOKS: YES
  • CLASS RECORDINGS: YES
  • GUARANTEED BATCHES: YES
  • AFFORDABLE TRAINING: YES
  • EC-COUNCIL ATC: YES

Course Outline

Skills

Deeper understanding in the application of vulnerability analysis. Learn about emerging attack vectors on cloud, Machine learning. Be adept at securing networks and systems

Course alignment

Aligned to the course curriculum for the CEH (V10) certification exam by EC-Council.

Course outcome

Pass the CEH (v10) 312-50 (ECC EXAM), 312-50 (VUE) certification examination. Go beyond theoretical knowledge, gain practical skill with the CEH practical.

Learn footprinting techniques like WHOIS lookups, DNS information and email footprinting, and how to use tools like Maltego and Recon-ng for footprinting and reconnaissance. Also learn about footprinting countermeasures to implement

Learn how to scan and check for live systems, open ports, and vulnerabilities using proxies and anonymizers.

Learn the tools and techniques for NetBIOS, SNMP, LDAP, NTP, and SMTP enumeration, and the countermeasures for enumeration.
 

Learn a stepwise process to hack systems - password cracking, privilege escalation, executing applications, and installing spyware on the target system. Additionally learn about Rootkits, Steganography, and about covering your tracks after a hacking attempt.
 

Learn about malware - trojans, viruses and worms - and how to detect and analyze malware. You’ll also learn about countermeasures and anti-malware software that can be used to secure a system.
 

CALL

Call us

CHAT

Live chat

CONTACT

Contact us

Frequently Asked Questions

Exam

Anyone who has the CEH credential can appear for the practical. 
 

Requires the candidates to apply the Ethical Hacking techniques in 20 real-life situations. Threat Vector identification, network scanning, operating system detection, etc.

It is a 6-hour long examination. 
 

Faqs

A. Ethical hacking (also called penetration testing) is the practice of systematically penetrating and exploiting vulnerabilities in a computerized system/ network. Cyber security is a set of practices, policies, and technologies that an organization or an individual implements to protect computerized systems, networks, and the data and information contained therein. The objective of ethical hacking is to identify vulnerabilities and loopholes in a cybersecurity infrastructure that a malicious hacker could exploit. 

The version 10 adds emphasis on penetration testing and the tools involved. It comes with the new STORM, a mobile security toolkit. The modules on security of IoT devices, Vulnerability analysis, Attack vectors, Malware analysis have been updated. The introduction of the practical exam is an exciting feature. 
For further details visit- The new CEH v10 (Certified Ethical Hacker)

STORM is a mobile security toolkit. It is a component of the CEH v10.  The STORM toolkit needs to be purchased separately.

A Certified Ethical Hacker is a cybersecurity expert who attains the Certified Ethical Hacker qualification (currently version 9) from EC Council. The qualification is based on clearing a standardized test to assess an individual’s skills in ethical hacking tools and technologies. The CEH certification is accredited by ANSI (American National Standards Institute) under their Personnel Certification Program. It is also compliant to the US National Initiative for Cybersecurity Education, is recognized by the NSA, and is a US DoD approved baseline certification.

EC Council (International Council of E-Commerce Consultants) is the world’s largest cyber security certification body. It is a global, member-based organization that administers and develops the CEH (Certified Ethical Hacker), C|HFI (Computer Hacking Forensics Investigator), and the ECSA (Certified Security Analyst) certifications.
 

A. For all variants - Online Self-learning, Live Online, In-person Classroom

  • Immediately when you register: An automated email with your receipt and your access credentials (online self-learning component) is sent to your registered email ID.

For Live Online and In-person Classrooms*

  • The next working day: You receive a welcome email directly from the training coordinator managing the specific workshop you've registered for.

  • 3 working days before the workshop start date: You receive a reminder from the training coordinator about the upcoming training.
  • On the workshop start date (1 hour before starting off): Your training coordinator attempts to reach you to check if you're having issues in reaching the location/ logging in online.
  • Last day of the workshop: Your training coordinator reminds you to leave your feedback for the training.
  • 1 working day from the last day of the workshop: Your training coordinator reaches out to you with the next steps, like how to download your certificate(s) and how to avail the post-training helpline (as applicable).

*Note: The overall process may have some variations based on your location/ Country and the specific course/ variant you opt for.

This CEH course is for individuals who are seeking a solid knowledge of the tools and techniques used for penetration testing. The course assumes no prior knowledge or exposure to cyber security, and gives students the skills to act as a threat agent and discover and exploit vulnerabilities in a cyber security infrastructure. The CEH certification is intended for professionals who seek a seal of approval on their cyber security knowledge and their penetration testing skills.

In sharp contrast to almost all other cyber security courses/ certifications, The CEH training and certification focuses on identifying vulnerabilities in a system or network first, and then build and strengthen the defenses for that system/ network. This approach is the exact opposite of (almost all) other cyber security certifications where the focus is on preemptive security by building firewalls, configuring accesses, and implementing generic defensive techniques.

If you take up a CEH course with an EC-Council accredited training center (like us!), you just need to agree to EC Council’s code of ethics and attempt the certification exam with the included exam voucher. You can also choose to attempt the certification exam without taking up an accredited course. In this case you’ll be required to prove 2+ years of cyber security experience to EC Council and receive their formal approval to attempt the certification exam.
 

On registering for a live, online class, you’ll receive an online link to join the classes as per the scheduled dates and time. In addition, you’ll also receive access codes with instructions for your iLabs subscription, your exam voucher, and your official eCourseware over an email. At the appointed schedule, just click on the link you’ve received to log in to the online class platform and start off. Note that we use Zoom, GoToMeeting, and Cisco Webex as our online class platforms.
 

You won’t need a computer with very high system specs for the training. All the heavy-lifting for hands-on practice would be done online using your iLabs’ access. What you would need however, is a stable internet connection with ideally a 2 Mbps+ bandwidth.

For the online certification exam, the following technical requirements apply.

Type

Minimum

Recommended

Web Camera

640×480 resolution

1280×720 resolution

PC Users

Windows Vista

Windows 10 (10 S is not supported)

Mac Users

Mac OS X 10.5 or higher

Mac OS X 10.10 Yosemite

Internet Download Speed

.768 Mbps

1.5 Mbps

Internet Upload Speed

.384 Mbps

1 Mbps

RAM

1024 MB

2 GB

Ports

1935, UDP/TCP

1935, UDP/TCP

For detailed technical requirements for the online exam, please refer to the following webpage: https://www.proctoru.com/tech-requirements/

At the moment, our CEH courses are available only within the United States and Canada. This applies even to the Online Self-learning course variant. Please check back soon for schedules in your country.

Our payment plan for the CEH courses involve 3 equal payments at monthly intervals. The payments are charged to your credit/ debit card automatically by the payment gateway every month.

Yes, we’re an EC-Council Accredited Training Center for North America. Check the press release.

The CEH certification exam is a 4-hour long, 125 multiple-choice question based exam. The exam is scored using a normalized scoring mechanism, and your points for individual answers are totalled and compared with cut-off scores to arrive at a pass/ fail status. The pass or fail status is available shortly after submitting the online test, and your certificate (on passing the exam) becomes available in 7 - 10 working days.

The exam is limited to 4 retakes (5 total attempts including the original attempt) per every 12 month period. There’s no waiting period needed between your first attempt and the first retake. A 14-days' cooling period is applicable between successive retakes. Note that you’ll need to buy a new certification exam voucher for each retake.

Our courses include online CEH exam vouchers for exams delivered via ProctorU. Here’s a short video on how the exam process works

Link to the video

The CEH certification has a 3-year validity period that starts from the date you get certified. Within this period, you’ll need to acquire 120 EC Council Continuing Education (ECE) units to apply for re-certification (valid for another 3-year term). ECE units must be reported annually - by 1 February of the following year - for the previous year’s ECE units. Also, CEH certification holders need to pay an annual membership fee ($80) to EC-Council to be eligible for re-certification.

The average salary of a Certified Ethical Hacker in the United States stands at $72,617 per year according to a PayScale survey. The median salary as per the same report stands at $77,320 per year. These numbers are as on the date of publishing this page - for an updated statistic please refer to the survey page. Additionally, the CEH certification scores an "Extremely satisfied" rating (5/5) across 648 votes on Job Satisfaction as per this PayScale report.

Ethical hacking, by definition and by nature, is legal. The end outcome involves reporting vulnerabilities to take corrective action, and although the techniques used are the same that a malicious hacker could use, it really is the only way to identify and resolve critical security loopholes.

Here’s a quick graphical view of the major cyber security breaches globally that you can filter by severity as well as impact. This is updated on a near-realtime basis, and has been conceptualized by David McCandless using VizSweet. Next up, a site where you can see if your personal information has been compromised - https://haveibeenpwned.com

500 +

Expert Trainers

250000 +

Hours Delivered

100000 +

Professionals Trained

Got queries?

Acknowledgements