Generated by GPT-5-mini| CEH (Certified Ethical Hacker) | |
|---|---|
| Name | Certified Ethical Hacker |
| Other names | CEH |
| Administered by | EC-Council |
| First awarded | 2003 |
| Type | Professional certification |
| Focus | Information security, penetration testing |
| Prerequisites | Varies; training or experience recommended |
CEH (Certified Ethical Hacker)
CEH (Certified Ethical Hacker) is a professional certification focused on offensive security techniques and penetration testing, administered by the International Council of E-Commerce Consultants (EC-Council). The credential is intended for information security practitioners who perform vulnerability assessments and penetration tests for organizations such as Microsoft Corporation, Amazon (company), Google LLC, IBM, and Cisco Systems. Employers including Deloitte, PricewaterhouseCoopers, Ernst & Young, KPMG, and government agencies like the United States Department of Defense and the United Kingdom Government frequently reference the certification in job descriptions for roles that interact with technologies from vendors such as Oracle Corporation, VMware, Inc., Red Hat, and Fortinet.
CEH provides a standardized measure of competency in ethical hacking and penetration testing used by professionals in firms like Accenture, Capgemini, BAE Systems, Raytheon Technologies, and Northrop Grumman. The credential is maintained by EC-Council and mapped against frameworks and regulations such as ISO/IEC 27001, NIST Cybersecurity Framework, Payment Card Industry Data Security Standard, and sometimes referenced in audit contexts involving Sarbanes–Oxley Act compliance. Recognized within hiring pipelines alongside credentials like those from CompTIA, (ISC)², and SANS Institute, CEH sits at the intersection of vendor-neutral assessment and applied offensive skills relevant to products from Apple Inc., Samsung Electronics, Huawei, and Siemens.
The program originated in the early 2000s under EC-Council leadership, growing parallel to the rise of organized cybersecurity markets shaped by incidents involving entities such as Yahoo!, Equifax, Target Corporation, Sony Pictures Entertainment, and Marriott International. CEH evolved in response to regulatory and operational pressures exemplified by events like the 2007 cyber attacks on Estonia and legislative measures influenced by incidents tied to Edward Snowden disclosures and policies in jurisdictions such as the European Union and the United States. Major revisions to the syllabus and exam were informed by partnerships and contributions from security firms including McAfee, Symantec Corporation, Palo Alto Networks, Check Point Software Technologies, and consulting arms of IBM and Cisco.
The certification is issued by EC-Council and typically requires passing a proctored exam or completing authorized training at affiliate institutions such as EC-Council University or corporate training partners used by AT&T, Verizon Communications, and BT Group. Exam content aligns with test delivery standards similar to those used by Prometric and Pearson VUE, and candidates often prepare using materials from publishers like Wiley and O'Reilly Media. Employers such as Lockheed Martin, General Dynamics, Siemens AG, and Siemens Healthineers consider CEH when evaluating candidates for roles that involve compliance with standards from NIST and legal frameworks like the Computer Fraud and Abuse Act.
CEH curriculum covers offensive domains and toolsets employed in assessments of systems made by Microsoft Corporation, Apple Inc., Google LLC, and network equipment vendors like Cisco Systems and Juniper Networks. Topics include reconnaissance, scanning, exploitation, post-exploitation, web application attacks targeting platforms such as WordPress, Drupal, Joomla!, wireless security for equipment from Intel Corporation and Broadcom Inc., and malware analysis influenced by research from labs like Kaspersky Lab, McAfee Labs, and CrowdStrike. The syllabus references protocol-level concerns related to TCP/IP stacks implemented by vendors like ARM Holdings and Intel, and integrates frameworks and methodologies popularized by organizations such as MITRE and its ATT&CK framework.
Holders pursue roles including penetration tester, vulnerability analyst, red team operator, security consultant, and application security engineer at companies like Facebook (Meta Platforms), Twitter (X), LinkedIn, Snap Inc., and Pinterest. CEH is used by staffing firms such as Robert Half and ManpowerGroup as a screening credential, and by government contractors bidding on work for agencies like the National Security Agency and Department of Homeland Security. Career trajectories often progress toward senior positions that require or incorporate credentials from (ISC)², SANS GIAC, and CISSP-level managerial qualifications.
Critiques of CEH have come from academics and practitioners associated with institutions like MIT, Stanford University, Carnegie Mellon University, University of Cambridge, and firms such as Mandiant for reasons including perceived emphasis on tool usage over deep exploit development, parallels drawn with debates involving Zero-day disclosure policy and responsible disclosure incidents tied to actors like Anonymous (hacker group) and vulnerabilities exploited in incidents affecting Equifax and SolarWinds. Controversies have also involved exam administration disputes and comparisons to certifications from SANS Institute and CompTIA regarding rigor and industry recognition.
Professionals frequently combine CEH with certifications like CISSP from (ISC)², GIAC Penetration Tester (GPEN) from SANS Institute, Offensive Security Certified Professional (OSCP) from Offensive Security, CompTIA Security+, and vendor credentials from Cisco and Microsoft. Continuing education pathways include specialized courses from SANS Institute, academic programs at Stanford University School of Engineering, Massachusetts Institute of Technology, and vendor academies at Microsoft Learn and AWS Training and Certification.
Category:Information technology certifications