What is the Certified Ethical Hacker Programme v10?

Cyber Security as a profession is ever-changing, the restriction of entry is increasing, the need for Skilled Cyber professionals continues to grow manifold, but it is being refined, as organizations look for professionals who have extraordinary skills and ability.

EC-Council raises the bar again for ethical hacking training and certification programs with the all-new CEH v10. The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training program that any information security professional will need. The Certified Ethical Hacker has been the absolute choice of the industry globally.

The Certified Ethical Hacker v10, in its 10th iteration, is updated to provide the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you in a “Hacker Mindset” in order to train you how to think like a hacker and better defend against future attacks.

You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.


  • Vital issues tormenting the information security world, incident management process, and penetration testing.
  • Various types of footprinting, footprinting tools
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Social Engineering techniques, identify theft, and social engineering countermeasures.
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Session hijacking techniques and countermeasures.
  • Different types of web server attacks, attack methodology, web application attacks, web application hacking methodology, and countermeasures.Trojans, Trojan analysis, and Trojan countermeasures.
  • SQL injection attacks and injection detection tools.
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  • Various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • Various threats to IoT platforms and understanding how to defend IoT devices securely.


1. Full conformity to NICE 2.0 Framework

C|EH v10 follows NICE framework’s Protect and Defend specialty area completely.

2. Addition of New Module Vulnerability Analysis

Understand how to perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems. This module covers the vulnerability management life cycle, and different approaches and tools used to perform the vulnerability analysis.

3. IoT Hacking

Understand the various potential threats to IoT platforms and learn how to defend IoT devices securely.

4. Focus on New Attack Vectors (e.g., Cloud, AI, ML, etc.)

C|EH provides an understanding of the various cloud computing threats and cloud computing attacks. It discusses cloud computing security and the necessary tools. It provides an overview of pen-testing steps which an ethical hacker should follow to perform a security assessment of the cloud environment.

Artificial Intelligence (AI) is an emerging solution used in defending networks against various attacks that an antivirus scan cannot detect. Learn how this can be deployed through the C|EH course.

5. Hacking Challenges at the End of Each Module

Challenges at the end of each module ensure you can put into practice what you have learned. They help a student understand how knowledge can be transformed as skills are used in real life scenarios.

6. Coverage of latest Malware

The course is updated to include the latest ransomware, banking and financial malware, IoT botnets, Android malware and more. By performing malware analysis, the detailed information regarding the malware can be extracted, analyzed and this is a crucial skill of an ethical hacker.

7. Hands-on Program

More than 40% of class time is assigned to the learning of practical skills and this is achieved through EC-Council labs. Theory to practice ratio for C|EH program is 60:40 providing students with a hands-on experience of the latest hacking techniques, methodologies, tools, tricks, etc.

C|EH comes integrated with labs to emphasize the learning objectives.C|EH v10 lab environment consists of latest operating systems including Windows Server 2016 and Windows 10 configured with Domain Controller, rewalls, and vulnerable web applications for honing the skills of hacking. It also provides additional labs that students can practice post-training on their own time, through EC-Council’s iLabs platform which students can purchase separately.

8. Covers latest hacking tools (Based on Windows, MAC, Linux, and Mobile)

The CEH v10 course includes a library of tools that are required by security practitioners and pentesters to uncover vulnerabilities across different operating platforms. This provides a wider option to students than any other programs in the market.

9. American National Standards Institute (ANSI) Accreditation

American National Standards Institute (ANSI) accreditation signifies that the certification holder has completed a prescribed course of study designed specifically to meet predefined industry requirements

Views: 56


You need to be a member of The Future of Education to add comments!

Join The Future of Education

A Learning Revolution Project

Education Quotes & Commentary

Twitter Feed

© 2018   Created by Steve Hargadon.   Powered by

Badges  |  Report an Issue  |  Terms of Service