CEH: Certified Ethical Hacker v12
Become an expert in cyber security with the Certified Ethical Hacker (CEH v12) training program from EC-Council. This globally recognized certification validates your knowledge and skills in detecting network vulnerabilities, preventing cyber-attacks, and safeguarding your organization's critical assets. With hands-on training, practical labs, assessments, and real-world simulations, you'll develop the skills and confidence to stay ahead of the ever-evolving threat of cybercrime. For career growth, become a certified ethical hacker today.
Exam
Certification by
per person
Level
Duration
Training Delivery Format
Face-to-face / Virtual Class
Associated Certification
per person
Level
Duration
Training Delivery Format
Face-to-face (F2F) / Virtual Class
Associated Certification
Class types
Public Class
Private Class
In-House Training
Bespoke
About this course
The EC-Council’s Certified Ethical Hacker (CEH v12) Training program will enhance your knowledge of essential security fundamentals. Certified Ethical Hacker (CEH V12) certification course is one of the most sought-after security qualifications in the world. This internationally recognized security course validates your ability to discover weaknesses in the organization’s network infrastructure and aids in the effective combat of cyber-attacks.
The C|EH v12 program is a specialized, one-of-a-kind training program to teach everything about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and a global hacking competition.
Who should attend?
The CEH certification is for you if you are:
- Mid-Level Information Security Auditor
- Cybersecurity Analyst
- Cybersecurity Auditor
- Network Security Engineer
- Security Administrator
- SOC Security Analyst
- Cyber Defense Analyst
- Network Engineer
- Vulnerability Assessment Analyst
- Senior Security Consultant
- Warning Analyst
- Information Security Manager
- Information Security Analyst 1
- Senior SOC Analyst
- Security Analyst L1
- Solution Architect
- Infosec Security Administrator
- Cybersecurity Consultant
Learning Outcome
After completing this course, you will be able to:
- Information security controls, laws, and standards
- Various types of foot printing, foot printing tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems
- System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
- Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures
- Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
- Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures
- DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures
- Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures
- Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures
- Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures
- SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
- Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
- Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools
- Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures
- Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools
- Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
- Threats to IoT and OT platforms and defending IoT and OT devices
- Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
Prerequisites
Basic understanding of network essentials and core concepts, including server and network components
Course Content
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 8: Sniffing
Module 9: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injections
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking & OT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
Certification
C|EH
For career growth. Become a certified Ethical Hacker
The renowned Certified Ethical Hacker (CEH) program, offers the most sought-after certification in the field of ethical hacking and enhances your career prospects significantly.
The key facts (CEH):
- The world’s No.1 Ethical Hacking Certification
- A structured professional course for aspiring cyber professional
- Work anywhere with CEH. It’s globally recognized
- A comprehensive program to master the 5 phases of ethical hacking
- Hands-on learning
- Flexible learning option: Love, online, or hybrid
Exam Details
C|EH v12 (MCQ Exam) | C|EH v12 (Practical Exam) | |
Number of Questions | 125 Questions | 20 Questions |
Exam Duration | 4 Hours | 6 Hours |
Exam Format | Multiple Choice Questions | iLabs Cyber Range |
Exam Delivery | ECCExam, VUE | – |
Exam Prefix | 312-50(ECCExam, VUE), 312-50 (VUE) | – |
Passing Score | 60%-80% | 70% |
FAQs
How can I prepare for the exam?
You can join our face-to-face public or virtual or Bespoke class. Just choose the right class type for your learning needs and goal.
As an alternative you can access to eCourseware for complete the CEH course
If I have no experience in IT security, is this course suitable for me?
CEH is an excellent starting point for a career in Cyber Security, but it’s important to have some prior knowledge before diving into it.
It is highly recommended to have at least 2 years of experience in IT security before attempting the CEH certification.
What are the responsibilities of a Certified Ethical Hacker (CEH)?
Certified Ethical Hackers are hired by organizations either to help improve the organization’s security posture. The function of ethical hacking involves a methodical practice of identifying, evaluating, testing, and reporting vulnerabilities in an organization.
Ethical Hackers can evaluate nearly any application or infrastructure they are tasked with, identify potential vulnerabilities, and provide recommendations on how those vulnerabilities can be remedied.
Is it beneficial to pursue a Certified Ethical Hacker (CEH) certification?
Holding a CEH certification proves to your potential employer that you possess the baseline knowledge and skills to be an effective and productive security team member.
Globally, there is an insufficient supply of qualified people in this field thus creating amazing job opportunities for Certified Ethical Hackers in nearly every industry.
Is the CEH certification considered valuable or reputable?
For over 20 years, EC-Council has worked to build the best Ethical Hacking Certification. The topics covered in the examination go through rigorous job task analysis and careful curation of exam domains.
CEH is recognized by various governments around the world including the United States Department of Defense, GCHQ in the UK, and many others.
Version releases are paced every 12-18 months, depending on major trends in the market, new tools, vulnerabilities, operating systems, and much more.
This shows why the CEH is very valuable and reputable certification

At this time, this course is available for private class and in-house training only. Please contact us for any inquiries.