Certified Ethical Hacker (CEH)

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Our Training

Courses with Information Warfare Center take you though the entire hacking process and use the IWC Cyber Live Fire Range (CLFR), a portable Cyber Range on an External Hard Drive that you can take home with you to hone your tradecraft.

Our team primarily uses this CLFR during real work penetration tests and Red Team exercises. It is not only built for training, but as a main assessment system.

About the Exam

  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
  • Download the CEH Brochure

Passing Score for the CEH

"In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%." - EC-Council.org

Now through June 31, all Certified Ethical Hacker (CEH) Boot Camps come with our Exam Pass Guarantee. This means even if you fail your first attempt at the CEH exam, you can take it a second time FREE!


Information Warfare Center Services

The CEH Domains:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography
Interviewed with CyberSpeak with InfoSec Institute on Red Team operations.

Other EC-Council courses we offer:

  • ECSA/LPT Prep
  • Certified Network Defender (CND)
  • Certified Hacking Forensic Investigator (CHFI)
  • Certified Chief Information Security Officer (CCISO)
  • Certified Threat Intelligence Analyst (CTIA)

Regional offering: Colorado based information security certification boot-camps in Colorado Springs, Denver,and Fort Collins area. Ask about the Colorado Discount!

International offering: We have taught courses on six continents. Our instruction is in English, but we do work with translators when needed.

Contact us for course availability!

EC-Council ATC Best Newcomer Pearson Vue Authorized Test Center

Extra InfoSec Resources: Cyber Secrets


Information Warfare Center Cyber Live Fire Range

Build-a-Lab: Cyber Live Fire Range

Do you want to learn how to conduct vulnerability assessments or penetration tests but don’t know where to start? Are you getting into computer forensics and want some more hands on practice with more tools and environments? Well, we have something that might just save you some time and money.

Information Warfare Center not only offers ethical hacking, penetration testing, and digital forensics training, we now have a standalone lab environment prebuilt for both training and operational use. This mobile lab has been designed to boot off of a USB drive and works with almost any PC. This e-book walks you though how to build one yourself. It is a step by step guide to building your own Portable, encrypted, Kali based lab.