Certified Ethical Hacker

Certified Ethical Hacker


Demanded by employers, respected by peers

Certified Ethical Hacker is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers

Greater focus on cloud security

Get dedicated modules on cloud and IoT, incorporating CSP’s Container Technologies (like Docker, Kubernetes), Cloud Computing threats, and various IoT hacking tools, such as Shikra and Bus Pirate

Combat emerging cyber threats​

CEH covers more than 500 new threats and vulnerability scenarios including APT, Fileless Malware, Web API Threats, Webhooks, Web Shell, Cloud Attacks, Artificial Intelligence and Machine Learning

A dedicated live cyber range

More than 50% of the CEH course is dedicated to practical skills in live ranges and the brand-new iLabs Cyber Range is now 100% mapped to the Certified Ethical Hacker Training program

To beat a hacker, you have to think like one

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems.

A CEH understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. 

Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally

CEH is the leading ethical hacking training and certification program in cybersecurity. Students audit a system for weaknesses and vulnerabilities using the same tools an exploits as malicious hackers, but under proper legal circumstances and the best interest in assessing the security posture of a target system and organization. 

Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today.

What Skills Will You Learn?

Web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
Web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures
Session hijacking techniques to discover network-level session management, authentication/authorization, cryptographic weaknesses, and countermeasures
Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools
Cryptography ciphers , Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
Social engineering techniques and how to identify theft attacks to audit  vulnerabilities and suggest social engineering countermeasures

The average salary for CEH certified professionals in the United States is $119,000 a year!

Jobs That Require or Benefit from a CEH Certification

  • Network and cloud engineer
  • Security manager
  • SOC Security analyst
  • Cyber threat analyst
  • Cyber red team operator
  • Software developer
  • Systems administrator
  • Security administrator
  • Security specialist
  • Security engineer
  • Network administrator
  • IT auditor/penetration tester
  • Security consultant

Learn from your home or office!

Self Paced Training

Included with your purchase:

Instructor led training modules (1 year access)

Official e-courseware (1 year access)

iLabs (6 Months Access)

Certificate of Completion

Exam Voucher

Gain a professional competitive advantage by attaining industry recognized credentials!

Soldiers are eligible for up to $4000 for all Cyber Brain Academy training and exam vouchers!

Use this form to request Army Credentialing Assistance Program