CEH Certification | Certified Ethical Hacker Course | EC-Council
Skip to content
Certified Ethical Hacker (CEH
AI
World’s No.1 ethical hacking certification, now with the power of AI
Trusted by 4 Million Certified Learners Worldwide
4.7
Trustpilot
Gain a competitive edge with CEH
AI
From the creators of Certified Ethical Hacker (CEH) comes CEH AI, the latest evolution of the program, now enhanced with AI capabilities. Structured across 20 learning modules and covering more than 550 attack techniques, CEH AI gives you the core knowledge you need to succeed as a cybersecurity professional.
Benefit from flexible learning options
Earn a globally recognized certificate
Get practical learning with 221 hands-on labs
Course info
Download CEH AI Syllabus
Test CEH AI Skills
Enroll
What’s new in CEH
AI
AI-powered
The world’s first ethical hacking certification to harness the power of AI.
Power-packed, updated curriculum
Master the latest advanced attack techniques, trends, and countermeasures.
Hands-on experience
Hone your skills in real-world scenarios through hands-on labs, where you practice attack vectors and master advanced hacking tools.
2x productivity gains
Advanced threat detection, enhanced decision-making, adaptive learning, enhanced reporting, and automation of repetitive tasks.
40% more efficiency
Learn AI-driven techniques to boost efficiency in cyber defense by 40% while streamlining your workflow.
Real-world skills, proven mastery
Participate in monthly global hacking competitions, compete with your peers, and make it to the leaderboard.
Everyone learns differently, so we offer on-demand, live, and several other options to customize your training based on your learning style. Build your package below.
Single On-Demand
Certification Course
Starting at
$1,699
Reveal Price
Get Started
Single Live Online
Certification Course
Starting at
$2,499
Reveal Price
Get Started
Most Popular
Unlimited On-Demand
Certification Courses
Starting at
$3,499
Reveal Price
Get Started
Have
Questions?
Call us at:
1-888-330-HACK
Submit a Question
Advance your career with CEH
AI
, now with added AI capabilities
Gain industry-ready skills by learning the multi-platform strategies and tactics used by today’s most sophisticated cybercriminals (including AI) so you can identify system vulnerabilities before they do.
92% of employers prefer CEH graduates for ethical hacking jobs
95% chose CEH for career growth
Modules are mapped to 45+ cybersecurity job roles
4 in 5 companies say AI is a strategic priority
1 in every 2 professionals received promotions after CEH
Read how top cybersecurity professionals excelled in their careers after completing CEH
AI
in our
2025 Hall of Fame Report.
CEH
AI
opens doors to over 45+ job roles and is recognized worldwide.
Increase your opportunities with CEH
AI
Mid-Level Information Security Auditor
Cybersecurity Auditor
Security Administrator
IT Security Administrator
Information Security Analyst 1
Infosec Security Administrator
Cybersecurity Analyst level 1, level 2, & level 3
Network Security Engineer
SOC Security Analyst
Network Engineer
Senior Security Consultant
Information Security Manager
Senior SOC Analyst
Solution Architect
Cybersecurity Consultant
Cyber Defense Analyst
Vulnerability Assessment Analyst
Warning Analyst
All-Source Analyst
Cyber Defense Incident Responder
Research & Development Specialist
Senior Cloud Security Analyst
Third Party Risk Management
Threat Hunting Analyst
Penetration Tester
Cyber Delivery Manager
Application Security Risk
Threat Modelling Specialist
Web Application Penetration Testing
SAP Vulnerability Management – Solution Delivery Advisor
Ethical Hacker
SIEM Threat Responder
Product Security Engineer / Manager
Endpoint Security Engineer
Cybersecurity Instructor
Red Team Specialist
Data Protection & Privacy Officer
SOAR Engineer
AI Security Engineer
Sr. IAM Engineer
PCI Security Advisor
Exploitation Analyst (EA)
Zero Trust Solutions Engineer / Analyst
Cryptographic Engineer
AI/ML Security Engineer
Machine Learning Security Specialist
AI Penetration Tester
AI/ML Security Consultant
Course kits
While all CEH
AI
course kits have complete access to eCourseware and include an exam voucher, a few additional features and learning materials can be added to build deeper expertise and gain practical experience. This means that there is a CEH
AI
package to suit everyone’s learning requirements.
Most Popular
Learn, Certify, Engage & Compete
eCourseware
Exam Voucher
10
Ethical Hacking Video Library
6 Months
of Official Labs
CEH
AI
Engage
Annual CEH
AI
Challenge Pass (12 CTF’s)
CEH Practical Exam
Exam Retake*
Learn & Certify
eCourseware
Exam Voucher
10
Ethical Hacking Video Library
6 Months of Official Labs
CEH
AI
Engage
Annual CEH
AI
Challenge Pass (12 CTF’s)
CEH
AI
Practical Exam
1 Exam Retake*
*Exam Retakes: This benefit provides candidates with the applicable exam voucher through the ECC EXAM portal, but does not include proctoring fees, which apply to each exam attempt. Applicable to the CEH AI MCQ exam only. Please contact your training provider for details.
*Exam Retakes: This benefit provides candidates with the applicable exam voucher through the ECC EXAM portal, but does not include proctoring fees, which apply to each exam attempt. Applicable to the CEH AI MCQ exam only. Please contact your training provider for details.
Open AI API credits are not included as part of the program. Please refer to the FAQ for detailed information.
Ethical Hacking Course information
CEH
AI
is a globally-recognized certification with flexible-learning options to fit your lifestyle and commitments.
Course Brochure
Certified Ethical Hacker (CEH
AI
One-of-a-kind learning framework, powered by AI
CEH
AI
follows a unique 4-step framework
Step 1
Learn
Develop your skills in core domains of cybersecurity with 20 modules. You’ll experience 221 hands-on labs, 550 attack techniques, and over 4,000 hacking and security tools.
Step 2
Certify
Take a 4-hour exam with 125 multiple-choice questions, and a 6-hour practical exam with 20 real-life challenges to earn the CEH Master certification.
Step 3
Engage
Apply everything you’ve learned in a mock ethical hacking engagement. This four-part security engagement gives you a real ethical hacking engagement experience from start to finish against an emulated organization.
Step 4
Compete
Develop your skills in core domains of cybersecurity with 20 modules. You’ll experience 221 hands-on labs, 550 attack techniques, and over 4,000 hacking and security tools.
What you'll learn
Learning framework
Course outline
Exam details
What you'll learn
What you’ll learn
EC-Council’s Certified Ethical Hacker (CEH
AI
) certification gives you the skills and knowledge needed to drive your career forward in the age of AI.
With CEH
AI
, you’ll learn hacking and how to think like a hacker.
We’ll equip you to:
Find and fix weaknesses:
Discover how hackers exploit systems and learn ethical hacking to keep your data safe.
Become a security expert:
Master the top tools and techniques needed to strengthen your organization’s security.
Protect your reputation:
Learn to proactively prevent data breaches and safeguard your customers’ trust.
Master ethical hacking with AI:
Leverage AI-driven techniques to enhance your ethical hacking skills and stay ahead of cyber threats.
Learning framework
Learning Framework
EC-Council’s exclusive 4-step framework provides a structured and comprehensive approach to mastering ethical hacking.
Step 1
Learn
CEH
AI
offers a balanced blend of knowledge-based training and hands-on labs using real-world scenarios and is powered by AI.
Details
What’s covered
100% virtualization with full access to pre-configured targets, networks, and attack tools
Pre-configured vulnerable websites
Vulnerable, unpatched operating systems
Fully networked environments
Wide range of target platforms to hone your skills
550 attack techniques covered
Objective-oriented flags for critical thinking and applied knowledge assessment
Cloud-based cyber range
Practice every course objective on live machines and vulnerable targets.
With access to over 4,000 hacking tools and various operating systems, you’ll gain practical experience with industry-standard security tools, the latest vulnerabilities, and common operating systems.
Our web-accessible range allows you to learn and practice from anywhere.
Step 2
Certify
Upon completing the training, you can attempt both of our exams to demonstrate your skills and earn the CEH Master certification:
Take the knowledge exam
Complete the practical exam
Details
The knowledge exam
This 4-hour exam with 125 multiple-choice questions will test your skills in:
Information security threats and attack vectors
Attack detection
Attack prevention
Procedures
Methodologies and more!
The practical exam
In 6 hours you’ll complete 20 real-world challenges to test your proficiency. You’ll do this by incorporating a live corporate network of VMs and applications with ethical hacking solutions to uncover any vulnerabilities.
Step 3
Engage
CEH
AI
helps you develop real-world experience in ethical hacking through hands-on practice in a Cyber Range.
Details
CEH
AI
helps you develop real-world experience in ethical hacking through hands-on practice in a Cyber Range.
This 4-phase engagement requires critical thinking and tests the knowledge and skills you’ve gained through capturing a series of flags in each phase, demonstrating the live application of abilities in a consequence-free environment via EC-Council’s Cyber Range.
Step 4
Compete
Get a year-long access to 12 CTF challenges. Each month presents a different theme and challenge with capture-the-flag style competitions focusing on ethical hackers’ core skills and abilities.
Details
Gain exposure to new tools, focus on new attack vectors, and try to exploit emerging vulnerabilities while gaining continuing education credits and keeping your skills and certifications current.
Climb the leaderboard
These 4-hour challenges are open all month long, allowing you to compete whenever you’re ready. All you need is an internet connection and your hacking expertise – we provide the attack platform, targets, and all the necessary tools and training.
Course outline
Course outline
Module 01: Introduction to Ethical Hacking
Learn the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Key topics covered:
Elements of Information Security, Classification of Attacks, Hacker Classes, Ethical Hacking, AI-Driven Ethical Hacking, ChatGPT-Powered AI Tools for Ethical Hackers, CEH Ethical Hacking Framework, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Information Assurance (IA), Risk Management, Threat Intelligence Lifecycle, Incident Management, PCI DSS, HIPPA, SOX, GDPR, DPA
Module 02: Footprinting and Reconnaissance
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
Perform footprinting on the target network using search engines, internet research services, and social networking sites
Perform whois, DNS, network, and email footprinting on the target network
Perform Footprinting using AI
Key topics covered:
Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup,
DNS Footprinting,
Traceroute Analysis,
Email Footprinting,
Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 03: Scanning Networks
Learn different network scanning techniques and countermeasures.
Hands-on Labs:
Perform host, port, service, and OS discovery on the target network
Perform scanning on the target network beyond IDS and Firewall
Perform scanning using AI
Key topics covered:
Network Scanning, Scanning Tools, Host Discovery Techniques, Port Scanning Techniques, Host Discovery and Port Scanning with AI,
Service Version Discovery, OS Discovery/Banner Grabbing, Scanning Beyond IDS and Firewall
Scanning Detection and Prevention
Module 04: Enumeration
Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Hands-on Labs:
Perform NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, RPC, SMB, and FTP Enumeration
Perform Enumeration using AI
Key topics covered:
Enumeration, NetBIOS Enumeration, SNMP Enumeration, LDAP Enumeration, NTP Enumeration, NFS Enumeration, SMTP Enumeration, DNS Cache Snooping, DNSSEC Zone Walking, IPsec Enumeration, VoIP Enumeration, RPC Enumeration, Unix/Linux User Enumeration, SMB Enumeration, Enumeration using AI, Enumeration Countermeasures
Module 05: Vulnerability Analysis
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are included as well.
Hands-on Labs:
Perform Vulnerability Research using Vulnerability Scoring Systems and Databases
Perform Vulnerability Assessment using Various Vulnerability Assessment Tools
Perform Vulnerability Analysis using AI
Key topics covered:
Vulnerability Classification, Vulnerability Scoring Systems and Databases, Vulnerability-Management Life Cycle, Vulnerability Research, Vulnerability Scanning and Analysis, Vulnerability Assessment Tools, Vulnerability Assessment Reports, AI-Powered Vulnerability Assessment Tools
Module 06: System Hacking
Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Hands-on Labs:
Perform an Active Online Attack to Crack the System’s Password
Perform Buffer Overflow Attack to Gain Access to a Remote System
Escalate Privileges using Privilege Escalation Tools
Escalate Privileges in Linux Machine
Hide Data using Steganography
Clear Windows and Linux Machine Logs using Various Utilities
Hiding Artifacts in Windows and Linux Machines
Perform System Hacking using AI
Key topics covered:
Password Cracking, Password Attacks, Password-Cracking Tools, Vulnerability Exploitation, Metasploit Framework, AI-Powered Vulnerability Exploitation Tools, Buffer Overflow, Buffer Overflow Detection Tools, Active Directory (AD) enumeration, Privilege Escalation, Privilege Escalation Tools, Executing Applications, Keylogger, Spyware,
Rootkits,
Steganography,
Steganalysis, Steganography Detection Tools,
Maintaining Persistence, Linux and Windows Post Exploitation,
Covering Tracks,
Clearing Logs,
Track-Covering Tools
Module 07: Malware Threats
Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Hands-on Labs:
Gain Control over a Victim Machine using Trojan
Infect the Target System using a Virus
Perform Static and Dynamic Malware Analysis
Key topics covered:
Malware, Advanced Persistent Threat Lifecycle, Trojan,
Virus, Ransomware,
Computer Worms, Fileless Malware, AI-based Malware, Malware Analysis, Static Malware Analysis, Dynamic Malware Analysis, Virus Detection Methods, Malware Countermeasures, Anti-Trojan Software, AI-Powered Malware Detection and Analysis Tools
Module 08: Sniffing
Learn about packet-sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Hands-on Labs:
Perform MAC Flooding, ARP Poisoning, MITM and DHCP Starvation Attack
Spoof a MAC Address of a Linux Machine
Perform Network Sniffing using Various Sniffing Tools
Detect ARP Poisoning in a Switch-Based Network
Key topics covered:
Network Sniffing, MAC Flooding, DHCP Starvation Attack, ARP Spoofing, ARP Spoofing/Poisoning Tools, MAC Spoofing, VLAN Hopping, STP Attack, DNS Poisoning Techniques, DNS Poisoning Tools, Sniffing Tools, Sniffer Detection Techniques, Promiscuous Detection Tools
Module 09: Social Engineering
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Hands-on Labs:
Perform Social Engineering using Various Techniques
Detect a Phishing Attack
Social Engineering using AI
Key topics covered:
Social Engineering, Types of Social Engineering, Human-based Social Engineering Techniques, Impersonation, Computer-based Social Engineering Techniques,
Phishing, Phishing Tools
, Perform Impersonation using AI, Identity Theft, Mobile-based Social Engineering Techniques, Social Engineering Countermeasures, Anti-Phishing Toolbar
Module 10: Denial-of-Service
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Hands-on Labs:
Perform a DoS and DDoS attack on a Target Host
Detect and Protect Against DoS and DDoS Attacks
Key topics covered:
DoS Attack, DDoS Attack, Botnets, DoS/DDoS Attack Techniques, DoS/DDoS Attack Toolkits, DoS/DDoS Attack Detection Techniques, DoS/DDoS Protection Tools, DoS/DDoS Protection Services
Module 11: Session Hijacking
Learn the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Hands-on Labs:
Perform Session Hijacking using various Tools
Detect Session Hijacking
Key topics covered:
Session Hijacking, Application-Level Session Hijacking, Compromising Session IDs, Session Hijacking, Network-Level Session Hijacking, TCP/IP Hijacking, RST Hijacking, Blind Hijacking, Session Hijacking Tools, Session Hijacking Detection Methods, Session Hijacking Detection Tools, Approaches to Prevent Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Learn about firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Hands-on Labs:
Perform Intrusion Detection using Various Tools
Deploy Honeypot to Detect Malicious Network Traffic
Bypass Firewall Rules using Tunneling
Bypass Antivirus
Key topics covered:
Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Firewall, Types of Firewalls, Intrusion Detection Tools, Intrusion Prevention Tools, IDS/Firewall Evasion Techniques, NAC and Endpoint Security Evasion Techniques, IDS/Firewall Evading Tools, Honeypot, Types of Honeypots, Honeypot Tools, IDS/Firewall Evasion Countermeasures
Module 13: Hacking Web Servers
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Hands-on Labs:
Perform Web Server Reconnaissance using Various Tools
Enumerate Web Server Information
Perform a Web Server Attack
Perform a Web Server Hacking using AI
Key topics covered:
Web Server Architecture, Web Server Vulnerabilities, Web Server Attacks, DNS Server Hijacking, Web Cache Poisoning Attack, Web Server Footprinting/Banner Grabbing, Directory Brute Forcing, Vulnerability Scanning, Web Server Password Hacking, Web Server Attack Tools, Web Server Attack Countermeasures, Detecting Web Server Hacking Attempts, Web Server Security Tools
Module 14: Hacking Web Applications
Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
Hands-on Labs:
Perform Web Application Reconnaissance using Various Tools
Perform Web Spidering
Perform Web Application Vulnerability Scanning
Perform Web Application Attacks
Detect Web Application Vulnerabilities using Various Web Application Security Tools
Perform Web Application Hacking using AI
Key topics covered:
Web Application, OWASP Top 10 Application Security Risks – 2021, Web Application Attacks, Footprint Web Infrastructure, Analyze Web Applications, Bypass Client-side Controls, Attack Access Controls, Attack Web Services, Web API, Webhooks, Web API Hacking Methodology, API Security Risks and Solutions, Web Application Security Testing,
Web Application Fuzz Testing, Encoding Schemes, Web Application Attack Countermeasures, Web Application Security Testing Tools
Module 15: SQL Injection
Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Hands-on Labs:
Perform an SQL Injection Attack Against MSSQL to Extract Databases
Detect SQL Injection Vulnerabilities using Various SQL Injection Detection Tools
Perform SQL Injection using AI
Key topics covered:
SQL Injection, Types of SQL injection, Error Based SQL Injection, Union SQL Injection,
Blind/Inferential SQL Injection,
SQL Injection Methodology, Information Gathering and SQL Injection Vulnerability Detection, Launch SQL Injection Attacks, Advanced SQL Injection, SQL Injection Tools, SQL Injection with AI, Evasion Techniques, SQL Injection Countermeasures, SQL Injection Detection Tools
Module 16: Hacking Wireless Networks
Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Hands-on Labs:
Footprint a Wireless Network
Perform Wireless Traffic Analysis
Crack a WPA2 Network
Create a Rogue Access Point
Key topics covered:
Wireless Networks, Wireless Standards, Wireless Encryption, Wireless Threats, Wireless Hacking Methodology, Wi-Fi Discovery, Wireless Traffic Analysis, Launch of Wireless Attacks, Wi-Fi Encryption Cracking, Wireless Attack Countermeasures, Wi-Fi Security Auditing Tools
Module 17: Hacking Mobile Platforms
Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Hands-on Labs:
Hack an Android Device by Creating Binary Payloads
Exploit the Android Platform through ADB
Hack an Android Device by Creating APK File
Secure Android Devices using Various Android Security Tools
Key topics covered:
OWASP Top 10 Mobile Risks – 2024,
Anatomy of a Mobile Attack, App Sandboxing Issues, SMS Phishing Attack (SMiShing), Call Spoofing, OTP Hijacking/Two-Factor Authentication Hijacking, Camera/Microphone Capture Attacks, Android Rooting, Hacking Android Devices, Android Hacking Tools, Android Security Tools, Jailbreaking iOS, Hacking iOS Devices, iOS Device Security Tools, Mobile Device Management (MDM), OWASP Top 10 Mobile Risks and Solutions, Mobile Security Guidelines, Mobile Security Tools
Module 18: IoT and OT Hacking
Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Hands-on Labs:
Gather Information using Online Footprinting Tools
Capture and Analyze IoT Device Traffic
Perform IoT Attacks
Key topics covered:
IoT Architecture, IoT Technologies and Protocols, OWASP Top 10 IoT Threats, IoT Vulnerabilities, IoT Threats, IoT Attacks, IoT Hacking Methodology, IoT Hacking Tools, IoT Security Tools, IT/OT Convergence (IIOT), OT Technologies and Protocols, OT Vulnerabilities, OT Threats, OT Attacks, OT Hacking Methodology, OT Hacking Tools, OT Security Tools
Module 19: Cloud Computing
Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Hands-on Labs:
Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
Exploit Open S3 Buckets
Escalate IAM User Privileges by Exploiting Misconfigured User Policy
Perform vulnerability assessment on docker images
Key topics covered:
Cloud Computing, Fog Computing, Edge Computing, Container, Docker, Kubernetes, Serverless Computing, OWASP Top 10 Cloud Security Risks, Cloud Computing Threats, Container Vulnerabilities, Kubernetes Vulnerabilities, Cloud Attacks, Cloud Hacking
Methodology, AWS Hacking, Microsoft Azure Hacking, Google Cloud Hacking, Container Hacking, Cloud Network Security, Cloud Security Controls, Cloud Security Tools
Module 20: Cryptography
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
Hands-on Labs:
Encrypt the Information using Various Cryptography Tools
Create and Use Self-signed Certificates
Perform Email and Disk Encryption
Perform Cryptanalysis using Various Cryptanalysis Tools
Perform Cryptography using AI
Key topics covered:
Cryptography, Ciphers, Symmetric Encryption Algorithms, Asymmetric Encryption Algorithms, Message Digest Functions, Quantum Cryptography, Cryptography Tools, Public Key Infrastructure (PKI), Signed Certificate, Digital Signature, Email Encryption, Disk Encryption, Blockchain,
Cryptanalysis Methods,
Cryptography Attacks, Attacks on Blockchain, Quantum Computing Attacks, Cryptanalysis Tools
Exam details
Exam details
Certification is awarded when the knowledge exam is passed. In order to achieve CEH Master Level certification, an additional practical exam needs to be taken. This practical exam is optional.
Knowledge exam
The Knowledge Exam will test your skills in:
Information security threats and attack vectors
Attack detention
Attack prevention
Procedures
Methodologies
Format
Multiple choice
Duration
4 hours
Questions
125
Delivery
Online via the ECC exam portal
Passing score
60% to 85%
Practical exam
The practical exam is optional but will reward you with a higher level of certification. It will test your practical skills with:
Port scanning tools (eg, Nmap, Hping)
Vulnerability detection
Attacks on a system (eg, DoS, DDoS, session hijacking, web server and web application attacks, SQL injection, and wireless threats)
SQL injection methodology and evasion techniques
Web application security tools (eg, Acunetix WVS)
SQL injection detection tools (eg, IBM Security AppScan)
Communication protocols
Duration
6 hours
Questions
20 challenges
Delivery
iLabs Cyber Range
Passing score
60% to 85%
Become a Certified Ethical Hacker Now
Who is CEH
AI
for?
Cybersecurity professionals
Drive your cybersecurity career forward with CEH
AI
, enhanced by the power of AI
Teams and organizations
Turbocharge your team’s knowledge with certified ethical hacking powered by AI
Government and military
CEH
AI
is trusted and highly valued globally by government departments and defense bodies
Educators
Create and grow your own cybersecurity courses and programs
Inquire Now
Enroll Now
40% expected surge in demand for specialists in AI and Machine Learning
- World Economic Forum, Future of Jobs Report, May 2023
Discover Why Organizations Worldwide Trust the CEH
AI
Certification
For more than 25 years, EC-Council’s cybersecurity programs have empowered professionals around the world to apply their training and expertise to combat cyberattacks. The CEH Hall of Fame celebrates individuals who have excelled, achieved, and fostered a spirit of leadership among their colleagues and peers within the cybersecurity community.
The latest CEH Hall of Fame Industry Report highlights how the CEH certification continues to impact cybersecurity careers around the world. Here are key insights shared by Certified Ethical Hackers.
100%
say the CEH increased respect and recognition in the workplace.
99%
report that investing in CEH benefited their career and professional growth.
99%
found the CEH virtual labs helpful for developing real-world ethical hacking skills.
98%
credit CEH as a crucial factor in their cybersecurity career shift.
97%
say CEH effectively covered emerging threats and trends.
91%
believe CEH gives them a competitive edge over other certifications.
Get CEH
AI
Training
Download the CEH Hall of Fame Report
Trusted worldwide
Earn world-class certifications trusted and highly valued globally by government bodies, private organizations, and the defense.
Advance your career with our expert guidance.
KW
Karol Wicki
The CEH course exceeded my expectations. The content is well-structured and covers both fundamental and advanced concepts used in real-world cybersecurity scenarios.
DD
Daniel Dauda Wisdom
Excellent Materials with Al Great features, Highly useful than previous and very instructive for the study.
Great improvements on the ilabs well
structured and simplified.
BR
Ben Ring
In-depth content and access to online labs for ethical hacking provides
an enriching experience to learn the knowledge and apply the skills.
JD
Plamen Ignatov
I have attended the CEH v13 online course. Very in-depth information and lot of useful tips.
DD
Derick Dmello
I have been enrolled as a active learner with EC-Council for over 5 years. Having certified with CEH , CEH-P and CEH-M, now working towards CSA. I would recommend EC-Council courses and certifications to everyone pursing a core course needing a trusted and renowned credentialing body.
KK
Horace Lodovicci
The CEH course went far beyond my expectations
It’s clear, practical, and full of real-world examples The instructors are passionate, the labs are excellent, and the balance between theory and practice is perfect.
It really helped me think like a hacker, ethically and with confidence
Highly recommended for anyone serious about cybersecurity!
Get advice
Schedule your consultation today and start achieving your goals
Inquire Now
FAQs
CEH v13 program
Certification
Training
Accreditation and recognition
CEH v13 program
Is CEH
AI
for beginners?
CEH
AI
is a great place to start your career in cybersecurity, but you’re required to have some knowledge before applying. It’s recommended that you have a minimum of 2 years of IT security experience before attempting CEH
AI
If you don’t have the experience and are just getting started on this path as an entry-level professional, we recommend taking our
Cybersecurity Essentials Series
where you can learn the foundations required to pursue mid-level and specialization certifications like CEH, CND, CHFI, CTIA, ECIH, CSA, CCISO, and
others.
Are there any prerequisites?
There are no specific prerequisites for the CEH
AI
program. However, we strongly recommend that candidates possess a minimum of 2 years of experience in IT security before attempting CEH
AI
CEH
AI
training involves testing systems and using them for purposes not originally intended. Candidates should understand the basic functions of those IT systems before attempting to hack them.
For example,
CEH
AI
will teach the process of host evaluation leading to enumeration. In this process, trainees will scan downrange targets using common scanning techniques such as Nmap, which will respond with a list of ports. Enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems.
However, in this scenario, CEH
AI
will not teach you what a port is. This is essential knowledge that you must have to be successful in the class.
If you do not possess the foundational skills in IT and networking, we recommend starting with our
Cybersecurity Essentials Series
Do I need Open AI API Credits for CEH
AI
The
CEH
AI
is designed with hands-on labs that equip students with practical skills using the
ShellGPT
tool. ShellGPT enhances productivity by generating shell commands, code snippets, and documentation through advanced AI language models. It supports multiple platforms, including
Linux, macOS, and Windows
, and works seamlessly with major shells such as
PowerShell, CMD, Bash, and Zsh
To enable access to these AI-powered tools,
EC-Council provides an OpenAI key (AI Activation Key) free of charge
to students for use within the CEH
AI
labs.
What does a Certified Ethical Hacker do?
Organizations hire Certified Ethical Hackers either on a contract or as full-time employees to improve their security posture. Obtaining a
CEH
AI
certification is often a baseline requirement for many job roles. Ethical hacking involves the methodical practice of identifying, evaluating, testing, and reporting vulnerabilities within an organization.
Ethical hacking is a broad practice that covers various technologies. By systematically applying
CEH
AI
methodologies, ethical hackers can evaluate almost any application or infrastructure, identify potential vulnerabilities, and provide remediation recommendations.
With
CEH
AI
, Certified Ethical Hackers
also use AI tools and techniques to enhance their ability to identify, exploit, and secure vulnerabilities in systems and networks.
By integrating AI into their skills, they automate threat detection, predict security breaches, and respond swiftly to cyber incidents. Moreover, they also have the knowledge to hack AI systems.
In the case of military organizations, ethical hackers are highly trained in offensive and defensive activities and possess the critical skill sets and tactics to evaluate target systems and defend their organization’s assets in real-time.
Is CEH
AI
worth pursuing?
Holding a
CEH
AI
certification communicates to your potential or current employer that you possess the baseline knowledge and skills to be an effective member of the security team.
The field of cybersecurity is rapidly growing, with projected
job opportunity growth of 33%, according to the US Department of Labor. Globally, there is an insufficient supply of qualified people, creating significant opportunities for Certified Ethical Hackers in nearly every industry.
See the impact of
CEH
AI
on our top alumni in our
Hall of Fame report:
1 in every 2 professionals have received promotions after obtaining the
CEH
AI
certification.
97% stated that the skills acquired in the
CEH
AI
program helped safeguard their organizations.
92% of hiring managers prefer candidates with
CEH
AI
for jobs that require ethical hacking skills.
What are the benefits of CEH
AI
We know not all certifications are created equal, and deciding to get certified is an investment for you in both time and money. For over 20 years, EC-Council has worked to build the best ethical hacking certification on the market, Certified Ethical Hacker.
As a certification body, we ensure the topics covered in our training and examinations directly relate to the job roles and skills employers need. Our ANAB-accredited examination goes through rigorous job task analysis, careful curation of exam domains, extensive work to build world-class training, and hands-on components to provide candidates with an intensive hands-on experience throughout the program.
CEH’s AI cybersecurity skills also help learners drive more efficiency and double productivity gains.
CEH
AI
is recognized by various governments around the world, including the US Department of Defense and GCHQ in the UK, among others.
EC-Council employs full-time content teams that work all year long on program design and maintenance, ensuring each
CEH
AI
student receives the most up-to-date, relevant information as they pursue the certification.
Currently on Version 13, CEH version releases are paced every 12-18 months, depending on trends in the market, new tools, vulnerabilities, operating systems, AI techniques, and much more.
How much money does a Certified Ethical Hacker make?
Considering the global need and lack of qualified talent in the workforce, cybersecurity professionals are usually paid exceptionally well.
As of September 2024, a simple search on Salary.com for US -based positions shows that Ethical Hackers make an average of
$110,757
per year, which is an increase of
$6800
compared to
$103,866
in 2022, and with the 90th percentile earning above
$137,000
Experience, education levels, and other certifications typically increase earning potential, but it’s common to see starting salaries for ethical hackers that often exceed six figures.
We recommend searching your local job boards, viewing local salary information, and talking to potential employers to assess your own value in the market.
CEH
AI
has been ranked in the top 5 highest paid cybersecurity certifications for the last 10 years and continues to grow worldwide.
Is CEH
AI
a popular cybersecurity certification?
Currently in its 13th version, CEH is a very well-known certification in the cybersecurity field. A simple search for global job ads on LinkedIn
(as of September 2024)
shows over 22,000 available jobs seeking candidates with a
CEH
AI
certification.
CEH
AI
is currently mapped to 49 job roles across multiple industries based on job task analysis and a detailed survey of job roles demanding
CEH
AI
across CareerBuilder, LinkedIn, Dice, Indeed, Monster, and Naukri, a number significantly higher than other certifications such as SANS GPEN, OSCP, and Pentest+.
Is CEH
AI
in demand?
CEH
AI
is the most in-demand cybersecurity certification globally, representing the majority share of job ads seeking certified candidates. It’s also recognized as a baseline certification by the US Department of Defense for its cyber workforce.
CEH
AI
serves as the core content for over 1,200 colleges and universities across the globe that run computer science and cybersecurity degree programs. It’s the number one choice and most sought-after course for any candidate and organization looking for an ethical hacking course.
CEH
AI
is the world’s first cybersecurity certification recognized by the Department of Defense and ANAB to teach in-demand AI-driven cybersecurity skills.
CEH
AI
goes beyond ethical hacking – it’s the fundamental course for any cybersecurity career and can be applied to numerous job roles. The skills you’ll gain from
CEH
AI
apply to 49 job roles across 25+ industries.
Why should I consider getting CEH
AI
Knowledge, skills, opportunity, respect, proof – these are all words that circle
CEH
AI
for many of our certified members. The knowledge and skills attained through the program are second to none, covering the broadest possible set of domains in cybersecurity, while the certification itself shows employers that you’re qualified for the job and serious about proving it.
Holding industry-recognized, ANAB-accredited certifications proves to your current or prospective employer that a third party (EC-Council) has evaluated your knowledge and skills and conferred a certification to you based on your accomplishments in the program.
Since
CEH
AI
covers all the core domains of cybersecurity,
it opens many doors to diverse career paths. The practice of ethical hacking serves as the foundation for various specialized roles, and
CEH
AI
holders possess unmatched skills in applying AI to cybersecurity.
With reasonably priced training and certification available globally,
CEH
AI
is a small, short-term investment of your time and money with the potential for a lifetime of high-value returns.
After I get certified, does EC-Council help with job placement?
While EC-Council is not a staffing agency or recruiter, we have close ties with many employers seeking Certified Ethical Hackers. Our on-staff advisors are always available to work with you one-on-one to provide recommendations and guidance on finding the best opportunity that matches your ambition.
EC-Council has nearly 1,000 full-time employees across the world, all dedicated to providing you with the best experience in training, certification, and skill development. Our committed advisors are just a phone call away and are eager to discuss your career goals and guide you in any way they can.
We’re here to help.
Connect with an advisor
How much does CEH
AI
cost?
CEH
AI
pricing varies depending on a few factors. First, you need to decide whether you prefer online self-paced, online live, or in-person training.
Speak with one of our
career advisors
about
CEH
AI
costs and available funding options.
We are excited that you are considering this career path, and our team is here to help you find the best
CEH
AI
price that fits your budget and schedule.
How much does the CEH
AI
training cost?
CEH
AI
training is available worldwide in a variety of formats, including online self-paced, online live, and in-person boot camps at Authorized Training Centers (ATCs), and as part of education programs at colleges and universities. The cost of
CEH
AI
certification can varry by region and by format.
CEH
AI
training is typically very affordable, and with a broad range of options available, you have many options to evaluate.
We’re more than happy to guide you through this process. Feel free to contact us to confirm a price, validate the status of an ATC, or receive pricing for online training programs.
The fastest way to reach a local team is to
fill out the form
on this page, and we will contact you shortly.
Are there funding options available?
Funding options depend on the organization providing the training and the region you are in. EC-Council and many of its partners offer various options for funding your training, including payment plans, discount plans, and even military and tuition assistance programs through employers.
Which certification is best for hacking?
The
CEH
AI
program helps you understand hackers by getting you into their mindset. After all, to beat a hacker, you need to think like a hacker. There are both unethical and ethical hackers: unethical hackers engage in illegal or unlawful activities, while ethical hackers use their hacking knowledge to protect organizations and their assets.
The official
CEH
AI
course is the world’s number one ethical hacking certification. If you want to become one of the world’s best ethical hackers,
CEH
AI
is recommended by experienced professionals, organizations in both the private and public sectors, industry leaders, experts, and hiring managers.
In
CEH
AI
, you will also learn to hack AI systems and master AI skills to automate the 5 phases of the ethical hacking framework.
Which is the world’s #1 ethical hacking course?
EC-Council’s
Certified Ethical Hacker (
CEH
AI
) certification is the world’s number one ethical hacking certification.
In the
CEH
AI
Hall of Fame Survey Report, which collected responses from thousands of cybersecurity professionals, we discovered many key findings about the real-life impact of
CEH
AI
and how the program has
benefited
its many graduates.
Here are a few of our findings:
Over 1 in every 2
professionals received promotions after completing the
CEH
AI
program.
97% of the professionals stated that the skills they acquired during the
CEH
AI
program helped safeguard their organizations.
95% of the respondents chose
CEH
AI
for career growth.
93% of the professionals stated that
CEH
AI
skills improved their organizational security.
97% of the professionals found that
CEH
AI
labs accurately mimic real-world cyber threats.
Read the full
CEH Hall of Fame Report
Certification
How do I get certified?
To take the CEH
AI
Examination, you must first be deemed eligible.
We offer two paths to eligibility:
Attend official training
Online learning: Provided by iClass.
Authorized Training Center (ATC): Located in over 140 countries worldwide.
College or university: Institutions that are official EC-Council Academia Partners.
Eligibility application
Experience-based: If you possess the experience and don’t require training in the exam domains, you can skip the training and go straight to the exam.
Application process: If you do not attend official training, you will need to apply for exam eligibility.
Apply now
After approval: Once your application is processed and approved, EC-Council will work with you to determine the best delivery method for the exam. You may then take the 4-hour certification exam as scheduled.
All candidates attending official training at an EC-Council partner will have direct access to the examination, if they’re deemed eligible.
The exam can be proctored at the training center, online using EC-Council’s remote proctoring service, or at over 4,500 VUE testing centers worldwide.
What are the pass rates for CEH
AI
While EC-Council doesn’t publish pass rates for the exam, typical pass rates globally range from 60% to 85%. We offer a variety of test preparation materials and official training to help you ensure you’re ready to take the exam when the time comes.
The CEH
AI
exam is ANAB-accredited and undergoes extensive external validation to ensure it is fair for candidates of varying knowledge and experience levels.
Candidates should have 2 years of experience in IT security or complete official training. They should also possess strong knowledge of computing systems, networks, and various other IT topics.
The exam uses cut scores to determine pass/fail results. Cut scores are carefully set by psychometricians who regularly evaluate test question performance and average pass/fail results throughout the program.
Reviews from our certification members with limited experience or background have rated our exam as difficult, while more seasoned IT and security professionals typically find it moderately challenging, even with official training.
Review the exam domains and blueprint
What score do I need to pass the exam?
The CEH
AI
exam is a 4-hour, knowledge-based examination with multiple-choice questions. Each question is carefully weighted according to the domain and objective and carries its own cut score.
The CEH
AI
exam has multiple forms, each with a rotating set of questions. Because the questions and forms rotate, each exam has a cumulative cut score that is calculated as the aggregate of all question cut scores.
This rotation creates multiple variations of passing scores based on the exam form you receive. Typical passing cut scores range from 65% to 85%, providing the most equitable and fair approach to exam performance according to ISO/IEC 17024 testing standards.
CEH
AI
also offers a 6-hour, 100% practical exam in which students face 20 real-world scenarios.
Candidates can attempt both these exams to get a CEH (Master) credential. Both the above exams are US DoD 8140 approved and ANAB accredited.
Your cut scores and achieved scores will be shown on your exam transcript, which is available immediately after you complete the examination.
What if I don’t pass on my first attempt?
EC-Council’s official exam retake policy is available
here
Can I skip training and just get certified?
Yes, candidates who wish to bypass the official training and jump straight to the exam may apply for eligibility. If granted, you can take the examination directly.
Refer to the question ‘How do I get certified?’ in the FAQs above for the eligibility guidelines and application process.
I’ve watched videos on YouTube about CEH
AI
. Does that prepare me to take the exam?
While we recognize that there are some great resources on YouTube, EC-Council does not publish its official training on YouTube, nor do our authorized partners.
There are many self-published videos that claim to prepare you for the CEH
AI
exam. While they may provide valuable information, they are not a substitute for official CEH
AI
training and will not be accepted as a valid method of study when applying for exam eligibility.
How do I know if I’m ready to take the CEH
AI
exam?
The most common path students take to prepare for CEH
AI
is official training. Certified EC-Council instructors use official EC-Council training materials designed to take you through the various domains covered in the exam.
CEH
AI
also includes over 50% hands-on activities in a live Cyber Range, where you practice and apply the knowledge and skills learned in the course against live virtual systems in a controlled environment.
Students receive official exam prep test banks with mock exam questions broken down by domain to assess their level of readiness for the certification. We strongly recommend using these resources to prepare.
However, if you choose the direct eligibility route, review the domains covered in the exam and the exam blueprint based on your own knowledge and experience levels. You can self-assess your competency in each area and decide if you’re ready to attempt the exam.
Students in official CEH
AI
training receive free retakes based on the package they enroll in. Retake exams are also available to others for a fee, if required.
Do I have to maintain my certification?
Yes, all legitimate professional certifications have a recertification and maintenance process. The requirements are published under our EC-Council Continuing Education (ECE) Policy.
Read the ECE Policy
I’m currently studying CEH
AI
at a university. How do I request my certification exam?
Your options vary depending on your program, but we’re here to help.
EC-Council University
: Log in to your MyECCU account and connect with your counselor.
EC-Council Academia Partner:
Speak with your instructor to see if the university has included certification in the student resources. If not, you can write to
[email protected]
to connect with our student services team.
Training
Do I need Open AI API Credits for CEH
AI
The CEH
AI
exposes cybersecurity professionals to the use of AI in performing the role of an ethical hacker.
As Open AI owns the proprietary technology, the purchase of its API credits are required.
In order to complete all of the labs in CEH
AI
utilising this technology, we consumed less than $1 of credit in our test case, although individual results may vary based on usage. Each student is required to purchase the licenses individually.
In a situation where the students are unwilling or unable to buy Open AI APIs, EC-Council provides a comprehensive Lab Guide that include complete instruction sets with screenshots of each step that can aide their learning process. We also provide video-based walk-through of each lab for students to follow along without actually buying API credits.
How long does it take to become a Certified Ethical Hacker?
The total time it takes to become a certified ethical hacker can vary by student, but the typical answer is 5 days.
CEH
AI
official training is structured as a 5-day boot camp, with testing typically delivered at the end of the 5th day as a 4-hour exam.
Students who choose an on-demand or self-paced course through iClass or decide to defer their testing date may take longer to achieve the certification.
What does CEH
AI
cover?
The CEH
AI
program and exam cover a variety of topics that center around the tactics and procedures required to be a tactical cybersecurity professional. Spanning the entire kill-chain process, CEH
AI
includes topics such as foot printing and reconnaissance, scanning, gaining access, maintaining access, and covering tracks.
This 5-phase ethical hacking process applies to a variety of scenarios, including traditional on-premises networks, cloud, hybrid, and IoT systems, and stretches across a variety of topologies and application environments.
Students learn a variety of tools and techniques throughout this process, as well as how hackers will utilize the same TTPs to hack into organizations.
While CEH
AI
covers the core domains of cybersecurity, it also includes AI cybersecurity skills, empowering students to master AI-driven cybersecurity skills and learn to hack AI systems based on the OWASP TOP 10.
CEH
AI
addresses the latest emerging attack vectors and security strategies, enabling students to stay current.
What will I learn in CEH
AI
Security professionals attending this program will learn ethical hacking, including the Cyber Kill Chain, vulnerability assessment, and social engineering. You’ll explore how hackers operate, identify weaknesses in target systems, and apply remediation strategies to protect your organization from cyberattacks.
You’ll learn the core domains of cybersecurity, master the 5 phases of the ethical hacking framework, and automate all tasks using AI tools. So, you’ll learn not only how to use AI skills but also how to hack AI systems.
How do I learn ethical hacking?
Ethical hacking is crucial to cybersecurity and offers extensive growth opportunities. If you want to learn ethical hacking on your own, it may seem easy, but it requires a lot of experience and knowledge.
You need to stay up-to-date with the latest hacking trends and resources in order to combat the escalating cyber threats. In addition to technical skills, you should also be familiar with basic hacking tools, penetration testing, and other aspects of ethical hacking, including the use of AI in cybersecurity.
The ethical hacking phases require extensive training and practical experience in areas such as attack vectors and penetration testing, SQL injection attacks, denial of service attacks, firewall attacks, password cracking, enumeration, and cloud computing.
There are many online resources available for learning ethical hacking, but it can be difficult to choose the right one. Therefore, it is important to have a structured learning method from a reliable source.
An accredited program like the EC-Council’s CEH (Certified Ethical Hacker) is considered the gold standard in ethical hacking and is recognized worldwide. If you’re passionate about this field and enjoy thinking outside the box, then you can build a successful career in this field.
I see that CEH
AI
is part of a track. How does that work?
While the CEH
AI
program and certification stand on their own and are not required to be taken as part of a track sequence, many students choose to focus on specific specializations, such as digital forensics, threat intelligence, penetration testing, or executive leadership.
To support those specializations, EC-Council offers a series of certification tracks that focus on stacking the competencies required to excel in those fields.
Discover the available tracks and types of careers they lead into.
Cyber Career Track Guide
What do I get as a student in CEH
AI
Students attending official training for CEH
AI
, either through our online division iClass or in person at an Authorized Training Center, will receive the most comprehensive ethical hacking program on the market, enhanced with AI-driven skills.
The training resources stretch well beyond what you may be used to in a typical boot camp style course, as CEH
AI
not only supports you in the training program but also supports you after training and well into your career as a certified ethical hacker.
The unique framework in CEH
AI
– Learn, Certify, Engage, Compete – provides the following:
Courseware:
One-year access to all course materials, including cheat sheets.
Hands-on labs:
Six months of access to hands-on labs hosted in our Cyber Range to complement the 5 days of training.
Exam vouchers:
Vouchers with one-year validity and free retakes (available in selected CEH
AI
packages) if you are not successful on your first attempt.
Exam prep:
Practice in a mock exam environment to assess your readiness.
Post-certification support:
Engage practice range:
Participate in a mock ethical hacking engagement within a simulated organization – on your own time and at your own pace. Start with scanning and reconnaissance, identify vulnerabilities, and follow the CEH
AI
process to assess the target organization, leading all the way up to exploitation of the targets, including web servers, IoT devices, and IT/OT systems.
Compete:
After you complete your first engagement against the target organization, you’ll move on to Compete, where you can take part in monthly global hacking competitions available exclusively to certified ethical hackers. Face new scenarios each month, like malware analysis, ransomware, SCADA/ICS environments, hacking into power grids, web applications, and more.
Continuous Learning:
Ethical hacking video libraries: To further support your continuous learning and skill development, you’ll also receive access to our curated Ethical Hacking Video Libraries through CodeRed, featuring 2 to 4-hour online courses on topics such as Python for Pen testers, Opensource intelligence, Wireshark for Ethical Hackers, Ethical Hacking with Nmap, Windows Penetration Testing Essentials, Next Gen Firewalls, Applied Secure Smart City, Burp Suite: Web App Pen Testing, and more.
Is CEH
AI
a hands-on program?
Yes, every concept taught in CEH
AI
is supported by hands-on labs hosted in our Cyber Range. The training itself is split roughly 50/50 between lectures and discussions (50%) and hands-on labs (50%).
Additional hands-on practice is available in our 221 labs, featuring objective-based, CTF-style flags to challenge your critical thinking and applied knowledge. You’ll reinforce your ethical skills in our practice range, where you can hack, attack, and practice in live networks.
This is followed by 12 months of live competitions, all executed in our Cyber Range, ensuring 100% hands-on and applied learning experience.
We strongly believe you can’t really learn to hack just by reading a book. You must practice. If you are considering CEH
AI
, be prepared for an intensive hands-on program where you will practice and refine your skills as an ethical hacker.
Where can I find training?
Training is available globally through EC-Council
iClass
as well as through the world’s largest network of Authorized Training Centers (ATCs). EC-Council has over 900 ATCs across 145 countries.
If you are seeking credit-bearing programs at a college or university, EC-Council University offers bachelor’s and master’s programs in cybersecurity that incorporate CEH
AI
into the curriculum. Additionally, over 1,200 colleges and universities include CEH
AI
as part of their degree programs using our official Academia Courseware and Labs.
When selecting your training location, look for the Authorized Training Center Logo or the Official Academia Partner Logo to ensure you receive recognized and quality instruction.
Can I take CEH
AI
online?
Yes, CEH
AI
is available online through both self-paced learning and live instructor-led training. Click
here
for more information.
What are online ethical hacking classes?
Online ethical hacking classes are courses and training programs that teach you how to identify and mitigate cybersecurity vulnerabilities. One of the best online ethical hacking classes for starting a cybersecurity career or enhancing your IT skills is Certified Ethical Hacker (CEH
AI
).
CEH
AI
will equip you with core domain skills needed for cybersecurity, including identifying vulnerabilities, conducting penetration tests, implementing countermeasures, understanding legal policies, analyzing malware and attack techniques, and using multiple ethical hacking
CEH
AI
teaches you to think like a malicious hacker and understand their mindset. Online classes are typically delivered through live instructor-led sessions, hands-on labs, and assignments. Students also have the option of learning through self-paced recorded video lectures and in-person training.
What is the difference between live training and on-demand, self-paced training from EC-Council iClass?
iClass, EC-Council’s official eLearning division, provides two primary forms of training, Masterclass and iLearn.
Masterclass
: This is a live online instructor-led class with a set schedule. Award-winning instructors guide you through the CEH
AI
training module by module, incorporating hands-on lab time, breakout sessions for discussions, and live presentations of all course materials.
iLearn
: This is EC-Council’s on-demand training option. We have hand-selected the best instructors, flown them to our Albuquerque studio, and produced professional pre-recorded video lectures and lab walkthroughs that can be accessed through your iClass student account at any time, 24 hours a day, 365 days a year.
Is self-paced training the same as self-study?
No, they are not the same. While most students elect to attend official training, receiving the professional guidance of a certified instructor, others prefer to study on their own without official training.
This independent study approach is what we refer to as self-study. Materials for self-study are available for purchase at the EC-Council Store.
However, any student electing the self-study route will need to apply for exam eligibility as they have not attended official training.
How will CEH
AI
help me get a job?
Getting certified is about validating your knowledge. CEH
AI
is trusted by employers across the globe as a baseline cybersecurity certification. Certified ethical hackers hold various job titles and roles because the ethical hacking process is fundamental to many cybersecurity operations.
While some organizations have ethical hackers in their job role framework, they often take on other forms with a specialization such as Network Defender, Penetration Tester, Secure Coder, Cloud Security Engineer, Security Architect, Auditor, and even leadership roles.
What is an ATC?
Authorized Training Centers
(ATCs)
are computer training centers, consulting groups, and education companies that have partnered with EC-Council to offer official training leading to the CEH
AI
Certification.
ATCs must apply to EC-Council, which evaluates each potential partner individually to approve their business practice.
Once approved, ATCs must maintain Certified EC-Council Instructors (CEIs) who are also vetted by EC-Council for their certification and teaching experience. ATCs receive access to heavily discounted training materials, cyber ranges, practice ranges, and competition passes for their students.
ATCs compete globally each year to be recognized in our Circle of Excellence award ceremonies, where the top trainers and top training centers receive awards and recognition for their accomplishments in affecting the cybersecurity workforce.
Organizations displaying the ATC logo with EC-Council run official training programs that meet strict standards, ensuring a high-quality experience when you enroll in a CEH
AI
training program.
If your training center is not an ATC and claims to train you in CEH
AI
, beware. Such centers often result in very high failure rates on exams, frustrated students, outdated content, and a general lack of professionalism as organizations do not go through the proper channels to run official, authorized programs.
Students from these non-authorized centers frequently face difficulties obtaining refunds and eventually turn to EC-Council’s iClass division or an ATC to get the quality CEH
AI
training and certification experience they initially sought.
What is a CEI?
EC-Council implemented the Certified EC-Council Instructor (CEI) program to ensure instructors understand the subject matter they teach and provide great experience to our certification candidates.
Many CEIs are industry practitioners who also teach. The CEI program ensures that they carry an active CEH
AI
credential and have sufficient experience in teaching/instructing.
View the Certified EC-Council Instructor requirements.
CEI application process
If I take official training, do I still need to apply for the exam?
No. Attending official training is one of the two ways to become eligible to take the CEH
AI
exam. If you have completed official training through EC-Council or one of our Authorized Training centers, you will not need to apply for exam eligibility, pay the $100 application fee, or wait for reference checks to be approved.
ATCs are authorized to deliver the exam directly after you complete your training. If your training center advises you otherwise, please give us a call, and we’ll help resolve the issue or validate your training at an Authorized Training Center.
I’m ready! Can I get started with CEH
AI
today?
Yes, the fastest way to start with CEH
AI
is through our iClass program. Click
here
to get started right away.
Can I get a CEH
AI
through EC-Council University?
Yes, if you enroll as a student at EC-Council University (ECCU) and pursue a bachelor’s or master’s degree, many of the courses throughout the program align with industry certifications.
The CIS 404 Hacker Techniques, Tools, and Incident Handling program maps to the Certified Ethical Hacker exam. Students who complete this course through ECCU will be eligible to attempt the CEH
AI
exam.
CIS 404 Hacker Techniques, Tools, and Incident Handling +
What is the difference between education and training when it comes to CEH
AI
Delivery formats in education, specifically academic education and training, can vary greatly. While the content students go through is the same, the delivery formats vary greatly.
Education
CEH
AI
is delivered over a semester and typically lasts 8 to 12 weeks in an academic setting, such as at EC-Council University (ECCU) or one of our academic partners.
Students participate in lectures, complete lab work, engage in threaded discussions, complete mid-term and final assessments, receive college credit for the course, and then independently pursue certification by taking the examination
This approach is ideal for those seeking a more comprehensive and academically focused learning experience with rigorous assessments.
Training
Training, on the other hand, is often run in a condensed boot camp. CEH
AI
is an intensive 5-day program delivered in person or online where the instructor will take you through intensive lectures followed by hands-on practice of the concepts taught.
This 5-day format is referred to by many as the ‘firehose’ training approach. This approach immerses you in the entire domain set of the CEH
AI
program, with 2.5 days dedicated to hands-on practice. Frequently, our ATCs will host an examination at the end of the 5-day program late in the afternoon, resulting in 5 days of training and 4 hours of certification, all in one week.
Post-training, you then have access to the courseware for 2 years and the hands-on labs for 6 months. With CEH
AI
, you also gain post-course access to the Engage Practice Range, Global CEH
AI
Competitions, and the CodeRed learning libraries for continuous education.
Accreditation and recognition
Is CEH
AI
accredited?
Accreditations measure the capability of the certification body in various aspects, including program design, management, content, delivery, policy, discipline, financial viability, relevance of training, demand, and more.
CEH
AI
is accredited by:
ANAB (ANSI National Accreditation Board): Accredited under ISO/IEC 17024 standards.
The American Council on Education (ACE): Accredited under ACE ID ECCL-0002, CEH
AI
is credit bearing and transferrable for three elective credits.
Does the US military recognize CEH
AI
Yes, the CEH
AI
is recognized by the United States military. It is eligible for military benefit reimbursement through the US Army Ignited program and is approved by the US Department of Veterans Affairs for reimbursement utilizing Post-9/11 GI Bill funds.
CEH
AI
is also recognized across various military forces in their enlisted and officer ranks, meeting the requirements of over 320 distinct job roles.
Funding and reimbursement eligibility may vary depending on the specific branch of the military.
Does the Department of Defense recognize CEH
AI
Yes, the CEH
AI
is approved by the US Department of Defense (DoD) under Directive 8140 as meeting the baseline requirements for 4 out of the 5 Cybersecurity Service Provider Roles (CSSP) roles.
CSSP Analyst
CSSP Infrastructure Support
CSSP Incident Responder
CSSP Auditor
As mentioned in the 8140 Information Assurance Workforce Improvement Program, as per the latest DoD 8140, CEH
AI
is recognized for the following job roles:
111 – All-Source Analyst
141 – Warning Analyst
511 – Cyber Defense Analyst
531 – Cyber Defense Incident Responder
541 – Vulnerability Assessment Analyst
661 – Research & Development Specialist
8570 baseline certifications
What are the DCWF (DoD 8140) job roles that recognize CEH
AI
certification?
28 DCWF job roles that recognize EC-Council certifications.
EC-Council Certification
DoD 8140 Approved Work Roles
Certified Ethical Hacker (CEH)
111 – All-Source Analyst
141 – Warning Analyst
511 – Cyber Defense Analyst
531 – Cyber Defense Incident Responder
541 – Vulnerability Assessment Analyst
661 – Research & Development Specialist
Certified Ethical Hacker Practical (CEH Practical)
111 – All-Source Analyst
141 – Warning Analyst
511 – Cyber Defense Analyst
531 – Cyber Defense Incident Responder
541 – Vulnerability Assessment Analyst
661 – Research & Development Specialist
Certified Chief Information Security Officer (CCISO)
611 – Authorizing Official/Designating Representative
722 – Information Systems Security Manager
723 – COMSEC Manager
731 – Cyber Legal Advisor
801 – Program Manager
802 – IT Project Manager
803 – Product Support Manager
804 – IT Investment/Portfolio Manager
805 – IT Program Auditor
Computer Hacking Forensic Investigator (CHFI)
211 – Forensics Analyst
212 – Cyber Defense Forensics Analyst
221 – Cyber Crime Investigator
Certified Network Defender (CND)
511 – Cyber Defense Analyst
521 – Cyber Defense Infrastructure Support Specialist
531 – Cyber Defense Incident Responder
EC-Council Certified Incident Handler (ECIH)
531 – Cyber Defense Incident Responder
What other Government bodies recognize CEH
AI
The UK’s intelligence, security, and cyber agency, GCHQ (Government Communications Headquarters), approves EC-Council training as meeting the CYBOK requirements.
Can I get college credit by taking CEH
AI
Yes, you can earn college credit by taking the CEH
AI
program. If you are enrolled at EC-Council University (ECCU) or at a college or university that is an Official Academia Partner, your course will be credit-bearing.
If you attend a boot camp for CEH
AI
through a computer training center, college credits are typically not offered. However, CEH
AI
is accredited by the American Council on Education (ACE), with a recommended equivalent of 3 elective credits at the bachelor’s level.
Many colleges and universities accept ACE accreditation and consider awarding those credits to you upon enrollment.
ECCU
will also evaluate your transcript and, upon application to the university, award the three credits for your achieved certification.
Enroll Now
Top Courses
Discover our most popular certifications and see for yourself why participants rate them so highly.
Certified Chief Information Security Officer
The industry-leading certification to train professionals to succeed at the highest executive levels of the security industry.
View Course
Computer Hacking Forensic Investigator
Gain the knowledge and skills to perform effective digital forensics investigations and prepare organizations for forensic readiness.
View Course
Certified Penetration Testing Professional
Master pen testing skills in our live cyber ranges by learning how to conduct effective penetration tests.
View Course
Looking for something else?
See all certifications
Accreditations and Recognitions
EC-Council is recommended and endorsed by leading organisations and government bodies in the cybersecurity industry.
American Council on Education
The American Council on Education (ACE) is a membership organization that leads higher education with a united vision for the future.
ANSI National
Accreditation board
ANAB, the ANSI National Accreditation Board, provides accreditation services in over 75 countries and is the largest accreditation body in N. America.
Army Credentialing Assistance
Helps Army Soldiers with full tuition and exam cost coverage for IT, cybersecurity and project management certifications.
National Initiative for Cybersecurity Education
A partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.
Download Brochure
" indicates required fields
Ready to become a Certified Ethical Hacker?
Inquire Now!
Go to Top
" indicates required fields
Title
Tell us a little about yourself.
" indicates required fields
Certified Ethical Hacker (CEH)
Course Inquiry
" indicates required fields
Essentials For Educators
" indicates required fields
US