CEH - Certified Ethical Hacker v11 Training




Per Participant

Course Description

CEHv11 training courses have been designed with the assistance of top Ethical hackers. It makes you understand weaknesses and vulnerabilities that help companies strengthen their system security controls to control the threat of an incident. The CEHv11 Training course will allow you to act and think like a malicious attacker or hacker to be better positioned to set up security infrastructure and secure future attacks. The CEH 11th version continues to evolve with the most modern and advanced tools, operating systems, tactics, technologies, and exploits.

What's new in CEH v11 Training Course?

With this new version, 11 EC-Council have taken all that the CEH already is and included extra to make it even more advanced, detailed, better, and concise. Here are some important updates of the CEH Training Course to be implemented in CEHv11 (version 11) Training course:

  • Cloud: Container Kubernetes, Docker, Technology,
  • Incorporation of Parrot OS: AnonSurf, WifiPhisher
  • Operation Technology: PLC, SCADA, ICS, Side-Channel attacks, HML based attacks
  • WPA3: WP3 Encryption and cracking
  • New Lab Designs and OSs
  • Re-Mapped to NICE/ NIST Framework
  • Emerging Attack Vectors: Targeted ransomware, Fileless malware, Web Shell, and Web API threats
  • Enhanced Cloud Security, OT, and IoT Modules
  • 1. OT (Operational Technology) Attacks
  • 2. IoT Threats
  • 3. Cloud−Based Threats
  • Malware Reverse Engineering: Dynamic and Static Malware Analysis
  • Hacking Challenges On Steroids
  • Modern Malware Analysis
  • Improved Lab Time and Hands−on Focus
  • The majority of IT departments have made CEH compulsory for security-related positions. CEH v11 certified ethical hacker employees earn 44% higher perks than non-certified workers.


Steps to become a certified

The CEH exam is a 4-hour exam with 125 multiple-choice questions. This knowledge-based exam will test your Information Security Threats and Attack Vectors skills, Attack Detection, Attack Prevention, Procedures, Methodologies, and more!

  • First, enroll for an official CEH v11 training.
  • Take up and clear your official CEH V11 certification exam from either EC-Council or through Pearson Vue
  • Please take part in the CEH practical session, which is for 6 hours with clear it with a 70% score
  • Become a Certified Ethical Hacker Master
Access our exam for blueprint for CEH

Prerequisites for this training

There are no prerequisites to take up this ethical hacking certification training course.

Who should attend this course?

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security/ITAuditors
  • Risk/Threat/VulnerabilityAnalyst
  • System Administrators
  • NetworkAdministratorsandEngineers


Oops! For this course, there are currently no public schedules available. Clicking on "Notify Me" will allow you to express your interest.

For dates, times, and location customization of this course, get in touch with us.

You can also speak with a learning consultant by calling 800-961-0337.

What you will learn

  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.
  • Perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
  • Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend sniffing.
  • Social engineering techniques and how to identify theft attacks to audit humanlevel vulnerabilities and suggest social engineering countermeasures.
  • DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
  • Session hijacking techniques to discover network-level session management, authentication/authorization, cryptographic weaknesses, and countermeasures.
  • Web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
  • Web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
  • SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
  • Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools.
  • Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Threats to IoT and OT platforms and learn how to defend IoT and OT devices securely.
  • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.


  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography
  • Tools Covered

    Tools Covered


    Yes, our Certified Ethical Hacking course is accredited by EC-Council.

    After the course you are eligible to apply in the cyber security domain of any corporate house.

    CEH training is beneficial for the following professionals:

  • Ethical hackers
  • System Administrators
  • Network Administrators and Engineers
  • Auditors & Security Professionals
  • Network Security Professionals
  • Site Administrators
  • Security Officers
  • Anyone else entrusted with the responsibility of safeguarding the integrity of the network infrastructure
  • Students who have completed their training through an authorized channel will need to provide certificates of attendance (COA) in order to proceed with the exam.

    Upon completing the CEH (Master) program, consisting of CEH ANSI and CEH (Practical), the CEH (Master) designation is awarded. Once the candidate achieves both the CEH ANSI and CEH Practical certifications he/she will become get CEH Master.

    Labs will conduct on EC-Council-designed iLabs and the access period is 6 months.

    The tools you'll need to attend the Ethical Hacking Course are:

  • Windows: Windows XP SP3 or higher
  • Mac: OSX 10.6 or higher
  • Internet speed: Preferably 512 Kbps or higher
  • Headset, speakers, and microphone: You'll need headphones or speakers to hear instructions clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone or separate speakers and microphone.
  • A student who enrolled for Certified Ethical Hacker (CEH) V11 certification training will get:

  • A copy of the course material
  • CEH v11 Sample Papers
  • Access to EC-Council iLabs
  • A course completion certificate from an EC-Council Accredited Training Center
  • The cost of the Certified Ethical Hacker (CEH) V11 certification exam is USD 500.

    Learners who are self-preparing for the examination must pay a USD 100 application fee and submit two years of relevant work experience in the information security domain.

    Your Certified Ethical Hacker certification is valid only for three years. There are recertification requirements to earn 120 credits within the three-year cycle period to maintain your CEH certification.

    CEH (ANSI)

    Exam Title Certified Ethical Hacker (ANSI)
    Exam Type Multiple-choice
    Application Cost USD 100
    Total Questions 125
    Exam Duration 4 Hours
    Passing Score 60% to 85%
    Languages English

    CEH (Practical)

    Exam Title Certified Ethical Hacker (Practical)
    Number of Practical Challenges 20
    Test Format iLabs Cyber Range
    Duration 6 Hours
    Availability Aspen-iLabs
    Passing Score 70%

    Recommended Certifications

    With Microtek Learning, you’ll receive:

    • Certified Instructor-led training
    • Industry Best Trainers
    • Official Training Course Student Handbook
    • Pre and Post assessments/evaluations
    • Collaboration with classmates (not available for a self-paced course)
    • Real-world knowledge activities and scenarios
    • Exam scheduling support*
    • Learn and earn program*
    • Practice Tests
    • Knowledge acquisition and exam-oriented
    • Interactive online course.
    • Support from an approved expert
    • For Government and Private pricing*

    * For more details call: +1-800-961-0337 or Email: info@microteklearning.com

    Request Call

    Our Clients

    For many years, Microtek Learning has been helping organizations, leaders, and professionals to reach their maximum performance by addressing the challenges they are facing.

    • 300+ enterprise clients
    • 100,000+ professionals trained
    • Service 70 of the Fortune 100
    • 96% of our clients would recommend us
    our clients

    Our Awards

    our awards

    Skills you will gain

    • Trojans backdoors and countermeasures
    • IDS firewalls and honeypots
    • Advanced hacking concepts
    • Network packet analysis
    • Mobile and web technologies
    • Advanced log management
    why choose us



    CEH course was simple and easy to understand. Overall, my experience was great.

    Marta Smith


    • (5)
    Accredited By

    Course Details

    • Duration: 5 Days
    • Skill Level: Intermediate
    • Certification: Yes
    • Enrolled: 712
    • Price: $1999
    • Course PDF: Click Here
    side post side mode

    CEH v11

    Talk to Learning Advisor