EC-Council Accredited Training Center

What's new in CEH v11

A Certified Ethical Hacker is a skilled professional with a global certification from EC-Council, who understands and knows how to look for weaknesses and vulnerabilities in target systems (firewall, server, network, software, mobile app, etc); and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). Being accredited to the International Council of Electronic Commerce Consultants, popularly known as the EC Council, which is the owner and creator of the Certified Ethical Hacker or the CEH along with many cyber security credentials, it is one of the most sought after GLOBAL certification among security professionals all over the world. The CEH certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral point of view.

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

What's new in CEH v11?

With the CEH v11 we've taken all that the CEH already is and added more to it, to make it even better, more advanced, more detailed, and yet succinct.

  • Cloud: Container Technology, Docker, Kubernetes
  • Parrot Os: WifiPhisher, AnonSurf
  • Operation Technology: ICS, SCADA, PLC; HML based attacks, Side-Channel attacks
  • WPA3: WP3 Encryption and cracking
  • Malware Reverse Engineering: Static and Dynamic Malware Analysis
  • Emerging Attack Vectors: Fileless malware, targeted ransomware, Web API threats and Web Shell
  • Hacking Challenges On Steroids

Course Rating

View All Reviews »

Students Enrolled and Counting…

Full List of Alumni »

Why Become A Certified Ethical Hacker (CEH)?

The EC-Council Certified Ethical Hacker (CEH) course helps you to earn
Advanced Security

in the worldwide information security domain.

Course Syllabus »

The CEH training & certification course is one of the
Most Trusted &

ethical hacking training program.

Nowadays IT departments have made
CEH Certification
a compulsory qualification for security-related posts.

CEH-certified professionals typically earn
Higher Salaries
than their non-certified colleagues.

Jobs »

Highlights of some of what sets CEH v11 apart from the rest:

Highlights of some of what sets CEH v11 apart from the rest



40 hours - 2 classes per week



  1. Basic Knowledge of Software, Database and Networking
  2. If you do not have the above knowledge, please complete our "INDUSTRY READY" Courses to be eligible -
    Industry Ready C Programming
    Industry Ready Data Structure
    Industry Ready RDBMS
Course Fees

Course Fees

Class Room Training


Online Training


What You Will Get?

40 Hours
in-depth training by best faculties from cyber security industry

Study Materials
and examination voucher

Certificate of Completion after examination and alumni status

Introducing The Break-The-Code Challenge With CEH v11

24 incredible hacking challenges across 4 levels of complexity that cover 18 attack vectors, including the OWASP Top 10 as a part of our Gamification Platform are now included as part of CEH v11!

Introducing The Break-The-Code Challenge With CEH v11

Course Benefits:

  1. The certification is provided by EC-Council, one of leading certification authorities in the field of cyber security. The certificate is valid in India and abroad as well.
  2. This course introduces you to all the techniques and different kind of attacks as well as how to defend these attacks to make your website/network more secure.
  3. Compared to other courses in cyber security EC-Council’s CEH is a course which provides vast in-depth understanding of how things are happening with numerous labs and is mainly focused on practical knowledge rather than just being theoretical. To know more about the course please click
  4. After completing this course, you will be able to successfully identify, stop and prevent latest cyber attacks.

Additional Benefits Included With CEH v11 Worth $1319

Additional Benefits Included With CEH v11 Worth $1319

*For promo Terms and Conditions contact an Authorized Training Center/Re-seller/Distributor
**Discount – This represents the discount that will be provided from the list price on the EC-Council Store
***Offer valid from September 16 to October 31, 2020

Your Course Path

CEH Course Path

Course Details

  1. This course is designed as per latest EC-Council’s CEH exam syllabus (CEH v11).
  2. The code for the CEH exam is 312-50 (ECC EXAM), 312-50 (VUE).
  3. It is a multiple choice examination at the end of the course.
  4. Course duration is 40 hours.
  5. Main focus will be on both theoretical and practical parts, with hands on experience of most of the attacks.
Module 01: Introduction to Ethical Hacking2 Hours - 7 Topics
  • Information Security Overview (Day 1)
  • Information Security Threats and Attack Vectors (Day 1)
  • Hacking Concepts (Day 1)
  • Ethical Hacking Concepts (Day 1)
  • Information Security Controls (Day 1)
  • Penetration Testing Concepts (Day 1)
  • Information Security Laws and Standards (Day 1)
  • Footprinting Concepts (Day 2)
  • Footprinting through Search Engines (Day 2)
  • Footprinting through Web Services (Day 2)
  • Footprinting through Social Networking Sites (Day 2)
  • Website Footprinting (Day 2)
  • Email Footprinting (Day 2)
  • Competitive Intelligence (Day 2)
  • Whois Footprinting (Day 2)
  • DNS Footprinting (Day 2)
  • Network Footprinting (Day 2)
  • Footprinting Through Social Engineering (Day 2)
  • Footprinting Tools (Day 2)
  • Footprinting Countermeasures (Day 2)
  • Footprinting Penetration Testing (Day 2)
  • Network Scanning Concepts (Day 3)
  • Scanning Tools (Day 3)
  • Scanning Techniques (Day 3)
  • Scanning Beyond IDS and Firewall (Day 3)
  • Banner Grabbing (Day 3)
  • Draw Network Diagrams (Day 3)
  • Scanning Pen Testing (Day 3)
  • Enumeration Concepts (Day 4)
  • NetBIOS Enumeration (Day 4)
  • SANP Enumeration (Day 4)
  • LDP Enumeration (Day 4)
  • SMTP and DNS Enumeration (Day 4)
  • Other Enumeration Techniques (Day 4)
  • Enumeration Countermeasures (Day 4)
  • Enumeration Pen Testing (Day 4)
  • Vulnerability Assessment Concepts (Day 5)
  • Vulnerability Assessment Solutions (Day 5)
  • Vulnerability Scoring Systems (Day 5)
  • Vulnerability Assessment Tools (Day 5)
  • Vulnerability Assessment Reports (Day 5)
  • System Hacking Concepts (Day 6)
  • Cracking Passwords (Day 6)
  • Escalating Privileges (Day 6)
  • Executing Applications (Day 6)
  • Hiding Files (Day 6)
  • Covering Tracks (Day 6)
  • Penetration Testing (Day 6)
  • Malware Concepts (Day 7)
  • Trojan Concepts (Day 7)
  • Virus and Worm Concepts (Day 7)
  • Malware Analysis (Day 7)
  • Countermeasures (Day 7)
  • Anti-Malware Software (Day 7)
  • Malware Penetration testing (Day 7)
  • Sniffing Concepts (Day 8)
  • Sniffing Technique: MAC Attacks (Day 8)
  • Sniffing Technique: DHCP Attacks (Day 8)
  • Sniffing Technique: ARP Poisoning (Day 8)
  • Sniffing Technique: Spoofing Attacks (Day 8)
  • Sniffing Technique: DNS Poisoning (Day 8)
  • Sniffing Tools (Day 8)
  • Countermeasures (Day 8)
  • Sniffing Detection Techniques (Day 8)
  • Sniffing Pen Testing (Day 8)
  • Social Engineering Concepts (Day 9)
  • Social Engineering Techniques (Day 9)
  • Insider Threats (Day 9)
  • Impersonation on Social Networking Sites (Day 9)
  • Identity Theft (Day 9)
  • Countermeasures (Day 9)
  • Social Engineering Pen Testing (Day 9)
  • DoS/DDos Concepts (Day 10)
  • DoS/DDos Attack Techniques (Day 10)
  • Botnets (Day 10)
  • DDoS Case Study (Day 10)
  • DoS/DDos Attack Tools (Day 10)
  • Countermeasures (Day 10)
  • DoS/DDos Protection Tools (Day 10)
  • DoS/DDos Penetration Testing (Day 10)
  • Session Hijacking Concepts (Day 11)
  • Application Level Session Hijacking (Day 11)
  • Network Level Session Hijacking (Day 11)
  • Session Hijacking Tools (Day 11)
  • Countermeasures (Day 11)
  • Penetration Testing (Day 11)
  • IDS, Firewall and Honeypot Concepts (Day 12)
  • IDS, Firewall and Honeypot Solutions (Day 12)
  • Evading IDS (Day 12)
  • Evading Firewalls (Day 12)
  • IDS/Firewall Evading Tools (Day 12)
  • Detecting Honeypots (Day 12)
  • IDS/Firewall Evasion Countermeasures (Day 12)
  • Penetration Testing (Day 12)
  • Web Server Concepts (Day 13)
  • Web Server Attacks (Day 13)
  • Web Server Attacks Methodology (Day 13)
  • Web Server Attack Tools (Day 13)
  • Countermeasures (Day 13)
  • Patch Management (Day 13)
  • Web Server Security Tools (Day 13)
  • Web Server Pen Testing (Day 13)
  • Web App Concepts (Day 14)
  • Web App Threats (Day 14)
  • Hacking Methodology (Day 14)
  • Web App Hacking Tools (Day 14)
  • Countermeasures (Day 14)
  • Web App Security Testing Tools (Day 14)
  • Web App Pen Testing (Day 14)
  • SQL Injection Concepts (Day 15)
  • Types of SQL Injection (Day 15)
  • SQL Injection Methodology (Day 15)
  • SQL Injection Tools (Day 15)
  • Evasion Techniques (Day 15)
  • Countermeasures (Day 15)
  • Wireless Concepts (Day 16)
  • Wireless Encryption (Day 16)
  • Wireless Threats (Day 16)
  • Wireless Hacking Methodology (Day 16)
  • Wireless Hacking Tools (Day 16)
  • Bluetooth Hacking (Day 16)
  • Countermeasures (Day 16)
  • Wireless Security Tools (Day 16)
  • Wireless Pen Testing (Day 16)
  • Mobile Platform Attack Vectors (Day 17)
  • Hacking Android OS (Day 17)
  • Hacking iOS (Day 17)
  • Mobile Spyware (Day 17)
  • Mobile Device Management (Day 17)
  • Mobile Security Guidelines and Tools (Day 17)
  • Mobile Pen Testing (Day 17)
  • IoT Concepts (Day 18)
  • IoT Attacks (Day 18)
  • IoT Hacking Methodology (Day 18)
  • IoT Hacking Tools (Day 18)
  • Countermeasures (Day 18)
  • IoT Pen Testing (Day 18)
  • Cloud Computing Concepts (Day 19)
  • Cloud Computing Threats (Day 19)
  • Cloud Computing Attacks (Day 19)
  • Cloud Security (Day 19)
  • Cloud Security Tools (Day 19)
  • Cloud Penetration Testing (Day 19)
  • Cryptography Concepts (Day 20)
  • Encryption Algorithms (Day 20)
  • Cryptography Tools (Day 20)
  • Public Key Infrastructure (PKI) (Day 20)
  • Email Encryption (Day 20)
  • Disk Encryption (Day 20)
  • Cryptanalysis (Day 20)
  • Countermeasures (Day 20)

Hacking Tutorials

Read All Tutorials »
Building a career in Digital Forensic - How promising is the future? A thorough career guide
Building a career in Digital Forensic - How promising is the future? A thorough career guide
Read Details »

Hacking Videos

Explore All Videos »
How to Hiding Your Secret File using Steganography?
View On Youtube »

Get In Touch

Related Course

Enroll Now »

CEH Exams

Prove Your Skills and Abilities With Online, Practical Examinations.

CEH Exams

Certified Ethical Hacker (CEH) Certification

The CEH exam is a 4-hour exam with 125 multiple choice questions. This knowledge based exam will text your skills in Information Security Threats and Attack Vectors, Attack Detection, Attack Prevention, Procedures, Methodologies and more!

Pay & Book Your Seat »

CEH Practical Certification

  • Port scanning tools (e.g., Nmap, Hping)
  • Vulnerability detection
  • Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
  • SQL injection methodology and evasion techniques
  • Web application security tools (e.g., Acunetix WVS)
  • SQL injection detection tools (e.g., IBM Security AppScan)
  • Communication protocols
  • Scanning (e.g., Port scanning, banner grabbing, vulnerability scanning, network discovery, proxy chaining, IP spoofing)
  • Cryptography
  • Cryptography toolkit (e.g., OpenSSL)
  • Web server attack methodology
  • Operating environments (e.g., Linux, Windows, Mac)
  • Web application hacking methodology
  • Encryption algorithms
  • System hacking (e.g., password cracking, privilege escalation, executing applications, hiding files, covering tracks)
  • Vulnerability scanning
  • Exploitation tools
  • Application/file server
  • Database structures
  • Wireless and Bluetooth hacking methodology
  • Wireless terminologies
  • Wireless encryption
  • Network/wireless sniffers (e.g., Wireshark, Airsnort)
  • Malware (e.g., Trojan, virus, backdoor, worms)
  • Botnet
  • Malware analysis
  • Network sniffing
  • Backups and archiving (e.g., local, network)
  • Data analysis
  • Log analysis tools
  • Cryptanalysis tool (e.g., CrypTool)

This is the next step to become a CEH Master after you have achieved your CEH certification. Within CEH Practical you will have a limited amount of time to complete 20 challenges testing your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VM’s and applications with solutions to uncover vulnerabilities.

CEH (Practical) »

CEH Master

Upon Completing the CEH (Master) program, consisting of CEH and CEH (Practical), the CEH (Master) designation is awarded. Once you have achieved both the CEH and CEH Practical certifications you are now a CEH Master. CEH Masters have shown proficiency at a master level in the Knowledge, Skills, and abilities of Ethical Hacking with a total 6 hours of testing to prove their competency.

CEH (Master) »
Know Your Faculty
Mr. Sandeep Sengupta
Mr. Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer

21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.

He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.

Mr. Kirit Sankar Gupta
Mr. Kirit Sankar Gupta
B. Tech (IT), OSCP, CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP

A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensic and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).

Mr. Sanchayan Bhaumik
Mr. Sanchayan Bhaumik
ME (Jadavpur University), MCA (WBUT), CEH, CHFI, CEI

With 7 years of experience in Information Security audit and Forensic Investigation, Mr. Sanchayan Bhaumik is working as Information Security Analyst at ISOEH and has successfully conducted various Vulnerability Assessment and Penetration Testing / audit, as well as Forensic Investigation for leading corporate houses and Government entities.

He has worked as an Assistant Professor at Sikkim Manipal University & Guest Faculty at National Institute of Pharmaceutical Education and Research. His research domain is AI, Machine Learning and Cryptography. He has presented several research papers in international conferences. At ISOEH his job profile includes VAPT, Forensic Assignments & Teaching advance courses on penetration testing, creating hacking tools using python, AI & ML.

Mr. Saumitra Biswas
Mr. Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

Ms. Amrita Acharya
Ms. Amrita Acharya
M Tech in CSE, ISO 27001 Lead Auditor (IRCA/BSI)

After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as security analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.

Mr. Subhendu Bhadra
Mr. Subhendu Bhadra
ECSA, CEH, CCNA, Android Pentesting, Reverse Engineering

A Certified Ethical Hacker & CCNA, Mr. Subhendu Bhadra has expertise in exploit writing using Python, Ruby and Bash and is working as a Information Security Analyst and Faculty at ISOEH. Passionate about gadgets and technology, he has created several projects using Arduino. Well versed with networking and various programming languages, Suvendu is developing new hacking tools using Python.

Mr. Anubhav Kettry
Mr. Anubhav Khettry
Certificate EC-Council Instructor (CEIv2), CEH, CHFI

Anubhav Khettry is a Certified Ethical Hacker. His area of interest includes Network Penetration Testing (NPT), Web Application Penetration Testing (WAPT) & RDBMS concepts. He is currently a part of ISOEH as Information Security Analyst and faculty.

Mr. Saugata Sil
Mr. Saugata Sil

Saugata Sil is a Certified Ethical Hacker (CEH). His area of interest is Python, Networking, Ethical Hacking, Front-end Development, Vulnerability Assessment, Web Application Pentesting, Android Application Pentesting and API Pentesting. Previously he worked as a Front-end developer and Software developer. As well as he also bug hunting and he has been acknowledged for reporting critical vulnerabilities to Dell, TripAdvisor, HealthifyMe, Spacex and many more. He has a passion for teaching & likes to guide students to apply cyber security knowledge in real-life scenarios. He is currently a part of ISOAH as a faculty member & Security Researcher Analyst.

Mr. Sagar Neogi
Mr. Sagar Neogi

Sagar Neogi is a Certified Ethical Hacker (CEH). His area of interest is Python, Reverse Engineering, Vulnerability Assessment and Penetration Testing. He is proficient in network design & hardening. He has a passion for teaching & likes to guide students to apply cyber security knowledge in the real-life scenario. He is currently a part of ISOEH as a faculty member & research analyst.

Mr. Somdeb Chakraborty
Mr. Somdeb Chakraborty
MSc in Computer Application, CEH, CHFI, CCNA, Android Development

Mr. Somdeb Chakraborty is a Certified Ethical Hacker (CEH) & Computer Hacking Forensic Investigator (CHFI), whose expertise lies in penetration testing. His areas of interest are Networking, Python, Vulnerability Assessment and Penetration Testing. He is also CCNA Global Certified (CISCO ID# CSCO13549504). Previously he worked as a software and web development trainer at The EDGE College in tie up with Vinayaka mission Sikkim University. He is working as an Information Security Analyst in the Indian School of Ethical Hacking.

Mr. Debraj Basak
Mr. Debraj Basak
B.Tech (EE), CEH v11, CCNA 3.0

Debraj Basak is a Certified Ethical Hacker (CEH). His area of interest is Advance Python, C Programming, Networking, Ethical Hacking, Hacking Tools Development, Vulnerability Assessment, Web Application Pentesting and Network Pentesting. He is also skilled in HTML, CSS, PHP & DBMS. Currently he is doing research on Malware Analysis and Reverse Engineering. He has a passion for teaching & likes to guide students to apply cyber security knowledge in real-life scenarios. He writes technical content as a hobby.


Ratings & Reviews

CEH v10.0

Course Rating
Based On
1749 Students Rating

Date: 25.10.2019
Course: CEH v10

One of the finest institutes for industrial training in Kolkata. Got an opportunity to learn Ethical Hacking from amazing teachers. Special thanks to Mr. Samyajit Mukherjee for introducing and guiding me through this course.

Date: 22.10.2019
Course: CEH v10

One of the best institutions for learning ethical hacking in west bengal Saumyajit nody mukharjee a very helpful person, helps during the time of admission and during many times.

(Student of WBUT)
Date: 19.07.2019
Course: CEH v10

Trainers are very friendly and co-operative. Environment is healthy and the course is project based so it is very interesting to learn Topics covered are relevant to our works.


How CEH Transformed Careers: Success Stories of Cyber Security Professionals

Job Prospects & Job Sources

The CEH v11 course opens up numerous career advancement opportunities, it helps to prepare you for different roles in infosec domain like computer network defence analyst, infrastructure support, infosec incident responder, infosec auditor, intrusion analyst, security manager, and other related high-profile roles.

The following are the career prospects of CEH enumerated.

Cyber security is a blooming field

Cyber security is a blooming field with excellent potential in the IT market, and is a very important aspect of any company.

The rising demands for cyber security

The demands for cyber security is rising exponentially both in Indian market as well as abroad.

United States faced a shortfall of cyber security professionals

According to Cyber Seek, an initiative funded by the National Initiative for Cyber Security Education (NICE), the United States faced a shortfall of almost 314,000 cyber security professionals as of January 2019. Same can be said for India as well.

Course designed for cybercrime department or any Government organization

This course is not only for IT sector but also for professionals who are in the cybercrime department or any Government organization dealing with cybercrimes, espionage or cyber security as a whole.

According to NASSCOM India requires 77,000 ethical hackers

As according to a study by NASSCOM India requires 77,000 ethical hackers every year out of which the job market can only provide 15000. The demand being way more than the supply Ethical Hacking is one of the most sought after and promising professions at the moment.

Average earning of a Certified Ethical Hacker

Financially also this profession is paying and secure enough. In India on an average a certified ethical hacker earns an average salary of Rs 367,249 per year which increases with experience cumulatively upto more than 15 lakh per year.

Designation Salary in Rs.
Security Analyst 3.7 lakhs
Information Security Analyst 4.3 lakhs
Certified Ethical Hacker (CEH) 3.5 lakhs
Security Consultant (Computing / Networking / Information Technology) 5.5 lakhs
Information Security Manager 12 lakhs
Experience Salary in Rs.
Less than 1 year 3 lakhs
1-4 years 3.8 lakhs
5-9 years 7.7 lakhs
10-19 years 5.5 lakhs
20 years and more 14.4 lakhs
Employers Salary in Rs.
Tata Consultancy Services Limited 1.5 to 9 lakhs
Wipro Technologies Limited 2.5 to 14.5 lakhs
International Business Machines (IBM) Corp. 3 to 6 lakhs
EY (Ernst & Young) 2.4 to 6 lakhs
HCL Technologies Ltd. 2 to 7 lakhs


About The Program

Program Outline

EC-Council places great emphasis on the quality of its instructors. A 17-year-old will not be teaching security to professionals at our accredited training centres. Certainly, experience is the greatest teacher. However, EC-Council adheres to a code of ethics and encourages security professionals with significant years of teaching experience in the industry and a security background to handle our security related programs.

The program focuses on hacking techniques and technologies from an offensive perspective. This advanced security program is regularly updated to reflect the latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.

EC-Council believes in giving back to the security community as it has partaken of it. When you are a Certified Ethical Hacker, you are more than a security auditor or a vulnerability tester or a penetration tester alone. You are exposed to security checklists that will help you audit the organization's information assets, tools which will check for vulnerabilities that can be exploited and above all a methodology to assess the security posture of your organization by doing a penetration test against it. In short, the knowledge you will acquire has practical value to make your work place a more secure and efficient one.

Consider this: A security defense programeducates candidates regarding proper configuration, firewalls, or rather pre-emptive security. CEH takes the alternative approach – defense in depth by attacking the systems. This is in sharp contrast to programs that teach defensive tactics alone. CEH imparts offensive tactics supplemented with defensive countermeasures. This ensures that the CEH professional can have a holistic security perspective of the organization.

Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. These techniques extend beyond the technology domain and can be applied to test security policies and procedures. Hacking technologies are used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. As technology advances, the skills required to execute a hack are much lesser as pre-compiled programs are available to effect havoc with simple point and click.

Congratulations on becoming a CEH! You have joined an elite group of professionals around the world. Your next level is to become an EC-Council Certified Security Analyst (E|CSA) or proceed with the CEH (Practical).


Exam Policies

Can I pursue self-study and attempt the exam instead of attending formal training?

The answer is yes. You must show 2 years of work experience in security related field. You must also submit a CEH exam eligibility application and obtain an authorization from EC-Council before you can attempt the exam. For more details, please click HERE.

To be eligible to apply to sit for the CEH (ANSI) Exam, a candidate must either:
  • Hold a CEH certification of version 1 to 7,
    * (Prior to being ANSI accredited, EC-Council’s certifications were named, based on versions – CEHV1, CEHV2 etc. During that time, candidates that attempted the certification exams were vetted for eligibility. In order to avoid “being double bill”, the EC-Council Certification department shall issue a waiver of the application fee of any candidate that has a CEH V1- CEH V7 certification and wishes to attempt the CEH ANSI certification.)
  • or Have a minimum of 2 years work experience in InfoSec domain (You will need to pay USD100 as a non-refundable application fee);
  • Or Have attended an official EC-Council training (All candidates are required to pay the $100 application fee; however, your training fee shall include this fee)
  • As various consumer laws across the world to prohibit any type of “price fixing”, EC-Council Certification department is unable to prescribe minimum pricing for its exams. This allows a free market approach which benefits our certification community.
  • As the price of an exam vouchers is many times bundled with official training by our accredited partners, the price may vary depending on the region, training facilities, training partner, the trainers experience, cost of proctoring the exam and even the mode of training of the partner.
  • It is imperative that we make it clear that no student shall be deemed to have any added advantage whatsoever from one mode of training to another in order to challenge the CEH ANSI exam as the exam is a standard exam for everyone, regardless of the method of training.
  • Should any training partner attempt to tell you otherwise, we ask that you lodge an official complaint with the EC-Council certification department so that the necessary action can be taken against the training partner.

On an average, application processing time would be between 5-10 working days once the verifiers on the application respond to EC-Council’s requests for information.

No, the $100 application fee is not refundable.

The application process is valid for 3 months from the date of approval.

Yes, the application form is mandatory for all test takers who want to take the exam directly without undergoing training.

Once your application is approved you can proceed to purchase your exam voucher either from EC-Council Online Store or from one of our authorised training channels.

The CEH (ANSI) exam is an MCQ (Multiple Choice Question) exam. This exam is available at the ECC Exam Centre and the Pearson Vue Centre.

The exam voucher code is valid for 1 year from the date of receipt.

For those attempting the exam at a physical testing centre (ETC/ Pearson Vue), the exam will be proctored by a proctor authorised at the testing centre.
For those attempting the exam remotely (ECC/ ProctorU), The exam will be proctored remotely by an authorised proctor.

The Exam is a 4-hour session.

This exam does not have a set passing score/ percentage, the number of items that you must answer correctly varies depending on the difficulty of the questions delivered when you take the exam. To understand how the scoring pattern works, visit the scoring section here.

Sessions should be booked at least 3 days in advance of the desired exam date.
Note: All exam sessions are proctored by EC-Council Certification department.



Isn't this knowledge harmful? Why do you make it available so easily to the public?

EC-Council fulfils its social responsibility by ensuring that only persons with a minimum of two years of security related experience are eligible for the program. In addition, all candidates are required to sign an agreement where they agree to respect the knowledge acquired and not misuse it in any way. The candidate also agrees to abide by all legal laws of their respective countries of residence in the use of thus acquired knowledge. Besides the CEH exam is a tough one to pass as students must have in-depth knowledge to achieve the globally recognized ethical hacking certification.

Does it matter if an elite hacker writes a buffer overflow or a script kiddy runs a tool if the target system gets compromised anyway? The point here is that the enemy may be intellectually great or small, but he/she requires just one port of entry to wreck damage while the organization has the entire perimeter to guard with limited time and resources.

The ANSI accredited Ethical Hacking program is primarily targeted at security professionals who want to acquire a well-rounded body of knowledge to have better opportunities in this field. Acquiring a Certified Ethical Hacking Certification means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.

Once you are ready to proceed with your exam, please ensure you understand the below:
  • You need to run an equipment test
  • You need to carry an identification proof
  • You should hold an valid exam voucher

Yes, the CEH (ANSI) is a part of the EC-Council Continuing Education Scheme.

The value of CEH lies in its practical value. Over 18 domains, students are exposed to business risks and the potential damage that can occur due to negligence. Students will be able to make an informed decision regarding the amount of risk a company can face if it chooses to address a security concern.

Enroll Now

Fields marked with * are mandatory.

Online Interactive Classroom with dedicated Faculty

Course Fees


Weekday Batches:
Reg. Date
Start Date
End Date
Jun, 2022
Jun, 2022
Aug, 2022
Weekend Batches:
Reg. Date
Start Date
End Date
Jun 2022
Jun, 2022
Aug, 2022
Pay Now
Internal Assessment (Practical) : Catch the flag(CTF)

Member of:

Data Security Council of India