Become a Certified Ethical Hacker (C|EH)
"*" indicates required fields
Role | Basic | Intermediate | Advanced |
---|---|---|---|
(211) Forensic Analyst | C|HFI | ||
(212) Cyber Defense Forensics Analyst | C|HFI | ||
(221) Cyber Crime Investigator | C|HFI | ||
(411) Technical Support Specialist | C|ND | ||
(422) Data Analyst | C|CISO | ||
(441) Network Operations Specialist | C|ND | C|EH | |
(451) System Administrator | C|ND | ||
(461) Systems Security Analyst | C|ND | ||
(511) Cyber Defense Analyst | C|EH | ||
(521) Cyber Defense Infrastructure Support Specialist | C|ND | C|EH | |
(541) Vulnerability Assessment Analyst | C|EH | ||
(611) Authorizing Official/Designating Representative | C|CISO | ||
(612) Security Control Assessor | C|CISO | ||
(631) Information Systems Security Developer | C|ND | ||
(632) Systems Developer | C|ND | ||
(641) Systems Requirements Planner | C|ND | ||
(651) Enterprise Architect | C|ND | ||
(661) R&D Specialist | C|EH | ||
(671) System Testing & Evaluation Specialist | C|ND | C|EH | |
(722) Information Systems Security Manager | C|CISO | ||
(751) Cyber Workforce Developer and Manager | C|CISO | ||
(752) Cyber Policy and Strategy Planner | C|CISO | ||
(801) Program Manager | C|CISO | ||
(802) IT Project Manager | C|CISO | ||
(803) Product Support Manager | C|CISO | ||
(804) IT Investment/Portfolio Manager | C|CISO | ||
(805) IT Program Auditor | C|CISO | ||
(901) Executive Cyber Leadership | C|CISO |
Ethical Hacking Introduction | Foot Printing and Reconnaissance | Scanning Networks | Enumeration |
Vulnerability Analysis | System Hacking | Malware Threats | Sniffing |
Social Engineering | Denial-of-Service | Session Hijacking | Evading IDS, Firewalls, and Honeypots |
Hacking Web Servers | Hacking Web Applications | SQL Injection | Hacking Wireless Networks |
Hacking Mobile Platforms | IoT Hacking | Cloud Computing | Cryptography |
Please visit the C|EH training page, complete the form, and speak with a career advisor to guide you through the certification process and assist you with any other queries regarding the course.
Training Options: iLearn (Self-Study) / iWeek (Live Online) / Master Class / Training Partner (in person)
The C|EH examination is conducted in two phases:
For more information, visit: C|EH training program
Is the C|EH worth it? Over the course of 20 years, the C|EH has consistently proved its value, enabling cyber security experts to reach new heights in both their personal and professional journeys. Here are some highlights from the C|EH Hall of Fame Report in which thousands of seasoned cyber security professionals were surveyed about the program.
"*" indicates required fields
Glassdoor. (2023, June 14). How much does a Cyber Defense Infrastructure Support Specialist make? https://www.glassdoor.com/Salaries/cyber-defense-infrastructure-support-specialist-salary-SRCH_KO0,47.htm#
Glassdoor. (2023, June 14). How much does a Cyber Security Researcher make? https://www.glassdoor.com/Salaries/cyber-security-researcher-salary-SRCH_KO0,25.htm
Glassdoor. (2023, June 14). How much does a Network Operations Specialist make? https://www.glassdoor.com/Salaries/united-states-network-operations-specialist-salary-SRCH_IL.0,13_IN1_KO14,43.htm
Glassdoor. (2023, June 14). How much does a Test & Evaluation Specialist make? https://www.glassdoor.com/Salaries/test-evaluation-specialist-salary-SRCH_KO0,26.htm
Salary.com. Cyber Defense Analyst Salaries in the United States. https://www.salary.com/research/salary/position/cyber-defense-analyst-salary/
Salary.com. (2023, July 25). Vulnerability Analyst Salary. https://www.salary.com/research/salary/recruiting/vulnerability-analyst-salary
"*" indicates required fields