EC-Council Certified Ethical Hacker v11


EC-Council Certified Ethical Hacker (CEH) v11

Ethical Hacking Course Overview

Certified Ethical Hacking (CEH) V11 Certification training is one of the globally-recognized cybersecurity courses for professionals globally. This CEH Certification course is ideal for professionals who manage IT security aspect across infrastructure that overarches physical, cloud, and hybrid environments. This 5-day Certified Ethical Hacking course is also ideal for professionals who are looking to make an entry into the cybersecurity domain and who are looking to clear their CEH V11 examination.

The goal of this course is to help you master an ethical hacking methodology that can be used in penetration testing to lawfully assess the security of a system. This course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker certification exam (312-50) from EC-Council.

CEH v11 Training is the second course in the new Vulnerability Assessment and Penetration Testing (VAPT) Track developed by EC-Council. In the latest version, EC-Council has added topics and concepts considering the recent advancements in the field of cybersecurity. The course equips you with the understanding of the latest commercial hacking tools, practices, and methodologies used by real-world hackers.

EC Council security experts have designed over 140 labs, which mimic real-time scenarios to help you “live” through an attack as if it were real. You’ll also be given access to over 2,200 commonly used hacking tools to immerse you into the hacker world.

Why take Certified Ethical Hacker?

Since its introduction in 2003, CEH continues to be considered a standard within the information security community. With the increasing number of cyberattacks and the advancement in these attack methods, organizations endeavor to search for security enthusiasts who have a thorough understanding of security concepts to aid the construction and maintenance of a hack-proof environment.

CEH v11 Certification Course exposes you to such a posture that aims to impart the idea and measures necessary to maintain security. The newly introduced topics echo with the current cybersecurity market requirements.

EC-Council has introduced a new hacking challenge called “Break the code challenge” as a part of their Gamification Platform that contains challenges of different complexities covering various attack vectors. It provides you an extensive hands-on experience of the various scenarios that you might have to face as a security defender in an organization.

Lastly, given the many cybersecurity attacks and great volume of personal data at risk, plus the potential legal liabilities, the need for certified ethical hackers is quite high. This course is a must-take for anyone responsible for network and data security who is looking to get CEH certified.

Who would benefit from the CEH Certification Course?

A Certified Ethical Hacker (C|EH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The C|EH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Target Audience
Penetration Tester
IT Security Administrator
Information security Analyst
Mid-level Security Assurance Auditor
System Security Administrator
Network Security Engineer
SOC Security Analyst
Solution Architect
Senior Security Consultant
Security Compliance Analyst
Vulnerability Assessment Analyst, and more
Course Pre-Requisite
  • Basic idea of networking and its components
Overview Course Outline About the exam

Learning Objectives for CEH v11 Training Course

Successful completion of the CEH v11 certification training empowers you with across the board understanding of:

  • Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
  • Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
  • Performing network scans, host and port discovery by utilizing different scanning tools
  • Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
  • Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
  • Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
  • Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
  • Packet sniffing concepts, techniques, and protection against the same.
  • Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defense tools
  • Security solutions like firewall, IPS, honeypots, their evasion, and protection
  • Web server and web application-based attacks, methodologies
  • SQL injection, hijacking, and evasion techniques
  • Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
  • Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
  • Operational Technology (OT) essentials, threats, attack methodologies and attack prevention. The concept of OT is a new addition.
  • Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
  • Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
  • Cloud computing, threats and security, essentials of container technology and serverless computing

The courseware of CEH v11 Certification Training is designed to provide you a strong and deep understanding of various verticals of security, starting with preparing a base and advancing to the latest scenarios. Provided is the list of modules with a brief description of what it talks about.

Module 01: Introduction to Ethical Hacking: This module introduces you to the basic concepts of hacking, what is hacking, who are hackers, their intent, and other related terminologies.

The next modules dive deeper into the various phases of hacking, which would help you in thinking with the mindset of a hacker.

Module 02: Footprinting and Reconnaissance: Gathering information from various sources using footprinting tools and how to defend against the same.

Module 03: Scanning Networks: Different techniques to identify and scan the network, host, and port discovery by utilizing various scanning tools.

Module 04: Enumeration: Finding detailed information about the hosts and ports discovered during scanning. This module now includes sub-domains like NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking, along with the countermeasures.

Module 05: Vulnerability Analysis: It introduces the concepts of vulnerability assessment, its types, along with a hands-on experience of tools that are currently used in the industry.

Module 06: System Hacking: It focuses on the “how” part. How to gain access of the system, how to escalate privileges, how to maintain access, and how to clear your tracks.

The next modules help to develop a deeper understanding of various defense and attack methodologies and concepts that aid the process of hacking.

Module 07: Malware Threats: Malware threat terminologies, viruses, worms, trojans, their analysis, and countermeasures to prevent data loss. The introduction and analysis of malware like, Emotet and fileless that are gaining popularity have been updated under this section. APT concepts have also been added.

Module 08: Sniffing: Packet sniffing techniques, associated tools, and related defensive techniques.

Module 09: Social Engineering: Since humans are the most significant vulnerability for any organization, it becomes essential to understand how attackers use them for their purpose for carrying out attacks like identity theft, impersonation, insider threat, and how to defend against such social engineering attacks.

Module 10: Denial-of-Service: As DoS and DDoS are some of the most common purposes of attackers, this module talks about these attacks, use cases, and the related attack and defense tools.

Module 11: Session Hijacking: To provide a deeper understanding of the technique, its purpose, tools used along with the countermeasures.

Module 12: Evading IDS, Firewalls, and Honeypots: Understand the terminologies and working of these inline defenses and techniques to learn how to evade these while performing an attack.

Module 13: Hacking Web Servers: Web servers based attacks, methodologies, tools used, and defense

Module 14: Hacking Web Applications: Web application-based attacks, techniques, and mitigation.

Module 15: SQL Injection: An in-depth understanding of the top OWASP top 10 web app vulnerability, it’s working and the mitigation.

Module 16: Hacking Wireless Networks: Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts

Module 17: Hacking Mobile Platforms: Management of mobile devices, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems

Module 18: IoT Hacking: Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices. Operational Technology (OT) essentials, introduction to ICS, SCADA, and PLC, threats, attack methodologies, and attack prevention. The concept of OT is a new addition.

Module 19: Cloud Computing: Cloud computing, threats, and security. Additionally, the essentials of container technology and serverless computing have been added.

Module 20: Cryptography: Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis.


Exam Codes 312-50 (ECC EXAM), 312-50 (VUE)
Number of Questions 125 questions per exam
Type of Questions Multiple choice
Length of Test 4 Hours / 240 Minutes
Recommended Experience No prior experience necessary
Languages English
Retirement Usually three years after launch
Testing Provider ECC EXAM / Pearson VUE
Passing Score In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

Course Highlights

EC-Council Authorized Partner
96% passing rate
Get certified at an affordable price
Blended learning delivery model
CEI Certified Trainers


  • Unit 15B Penthouse Atherton Place, Tomas Morato, Corner Don A. Roces Ave, Quezon City, 1103 Metro Manila
  • +(632) 7905 8718


View our Course Documents below with the current Curriculum and Pricing presented in an easy to read guide for the course offered.


Day 5 of Certified Ethical Hacker training. Enlightened! what an awesome learning experience! Thanks.

Christopher Kolling

Security Associate Principal, USA

The training material for C|EH was perfect! It had an abundance of knowledge and I was delighted to learn multiple practices to find and exploit vulnerabilities within a system.

Seth Henry

Systems Engineer, USA

After attaining the Certified Ethical Hacker (C|EH) credential, I deduced that the program prepares its attendees not only for acing the exam, but also to face real-world cybersecurity challenges with ease.

The program gave me an in-depth knowledge of ethical hacking - its various technologies, processes, and rules.

Ceiler Hidalgo

Data Privacy Manager, Brazil

Before I started the C|EH training, I had some knowledge about KaliLinux, BackTrack, Wireshark and other tools, but the C|EH gave me a more advanced training on these tools and more, like Armitage, Metasploit, Burp Suite, Nmap, Zenmap, Nessus, and many more.

Iskren Yankov

Chief Expert Information Security Officer, Bulgaria

At vero eos et accusamus et iusto odio digni goikussimos ducimus qui to bonfo blanditiis praese. Ntium voluum deleniti atque.

Melbourne, Australia
(Sat - Thursday)
(10am - 05 pm)

No products in the cart.

Subscribe to our newsletter

Sign up to receive latest news, updates, promotions, and special offers delivered directly to your inbox.
No, thanks