top of page


Certified Ethical Hacker (CEH) v10

Certified Ethical Hackers use the knowledge and tools of malicious attackers to uncover vulnerabilities in an organization's computer systems. Upon assessing the target system's security posture, a CEH performs the indicated preventive, corrective and protective measures to safeguard the system before an actual breach can occur. CEH certification is vendor-neutral, so certified ethical hackers can protect a wide range of systems, regardless of make.

Skills Measured by the Certified Ethical Hacker Exam

Here are some of the key skills and knowledge areas covered in the CEH exam:

Certified Ethical Hackers

  • possess a strong background knowledge of networking, telecommunications, web and computer systems.

  • understand the current security protocols for popular operating environments, e.g., Linux, Windows & Mac OS.

  • "hack" into an organization's network/systems - with its permission - to assess weaknesses and vulnerabilities.

  • undertake preventive, corrective and protective countermeasures to safeguard systems against malicious attack.

  • have the ability to identify and crack multiple types of passwords, and effectively counter password attacks.

  • comprehend the terminology, stages, classes, phases and methodologies of ethical hacking.

  • can cover their tracks and erase digital evidence of networks and system intrusions.

  • understand cryptography & encryption techniques, and private/public key infrastructure.

  • adhere to a code of ethics governing professional conduct & the appropriateness of hacking.

  • understand common cyber attacks, e.g., social engineering, phishing, identity theft, URL obfuscation, trojans, dumpster diving, insider attacks, etc., and can undertake the appropriate evasion techniques and countermeasures.

Further detail can be found here:

bottom of page