Certified Ethical Hacker (CEH), Second Edition

18 Hours

Please select the start dates for your courses below.

Scheduled Start:

18+ Hours of Video Instruction

Learn everything you need to know to pass the Certified Ethical Hacker exam.


Certified Ethical Hacker (CEH) Complete Video Course provides a complete overview of the topics contained in the EC-Council Blueprint for the CEH exam. With 5 modules containing more than 18 hours of training, this course covers all concepts in the objectives so you can master the knowledge you need to pass the exam.

Build your ethical hacking skills with the foundations of reconnaissance, footprinting, enumeration, and vulnerability analysis and dive into hacking web servers, applications, wireless networks, IoT devices, and mobile platforms. Veteran security experts Omar Santos, Nick Garner, and Bo Rothwell provide a thorough foundation through demos and best practices for security risk analysis, as well as hacking tools and methods. With this knowledge, you will be able to confidently mitigate and help guard your network from the multifaceted attacks that you will encounter while also preparing you to pass the CEH exam.

Regardless of your level of experience, this video course explores all sides of a multi-pronged cybersecurity attack to ensure that you are prepared to combat attack threats.

Skill Level

  • Intermediate

Learn How To

  • Perform footprinting and reconScan networks
  • Perform and take countermeasures against enumeration
  • Conduct a vulnerability analysis
  • Hack systems and cover your tracks
  • Use and prevent malware
  • Perform network sniffing
  • Conduct social engineering methodologies and learn how to prevent them from happening
  • Perform Denial-of-Service (DoS) and session hijacking attacks, as well as take measures to guard against them
  • Hack web servers and applications using multiple tools and techniques
  • Perform attacks using SQL injection
  • Use the best tools and techniques for hacking wireless networks
  • Deploy IDS, firewalls, and honeypots, as well as learn how to evade them
  • Understand and learn how to use cloud computing for penetration testing
  • Understand cryptography and cryptanalysis
  • Exploit the vulnerabilities of Internet of Things (IoT) devices
  • Understand the vulnerabilities of and methods to hack mobile devices

Who Should Take This Course

  • Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam
  • Anyone interested in becoming a cybersecurity professional
  • Anyone interested in ethical hacking (penetration testing)

Course Requirements

Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have 2 years of information security experience in each of the 5 CCISO domains via the application form. Please go to the EC-Council website for more information.

About Pearson Learn IT Video Training

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more.


Learning Partner