Created by EC Council, CEH Certification (short for Certified Ethical Hacker), is one of the most sought-after cybersecurity certifications. Internet technologies have revolutionized the way a lot of business is done, and in doing so puts computer systems at great risk. Companies and organizations around the globe need cybersecurity professionals on staff to safeguard their systems. The demand for qualified cybersecurity professionals is expected to remain high for the foreseeable future.
Many organizations, including the DoD and ANSI, have endorsed and/or accredited the CEH course.
CEH certification training is designed to provide what electronic commerce and cybersecurity professionals need—the skills to thoroughly assess and measure threats to informational assets, identify system vulnerabilities to prevent being hacked.
One of the best ways to prepare for CEH certification is with the CEH Certification Bundle. ONLC Training Centers is an EC-Council Accredited Training Center, so you can be sure training is authorized, high-impact and geared for certification success. Along with outstanding training the CEH Certification Bundle provides...
The CEH Bundle is discounted so you're paying far less than retail for training and the supporting components. The cost of the bundle is only slightly more than retail of the CEH class alone.
The certification exam and exam insurance are included along with access to iLabs, Cyber Range and the self-study online video courses.
This bundle has training for up to 4 EC Council certifications: CEH, CEH Practical, CHFI or CPENT and scoring 90%+ on CPENT exam earns LPT-Master certification!
CEH Certification Bundle purchasers will also receive 20% OFF Voucher for their next EC-Council course.
Included is the "next step" after CEH—a self-study certification course (your choice!) of either CPENT to develop skills moving toward a career in penetration testing, or CHFI for a career in computer forensics.
Our CEH Certification Bundle has you covered with great training and savings. Earning any or all of these in high-demand cybersecurity certifications proves your skills and dedication, will enhance your resume and add value to your professional status.
(Bundle elements cannot be purchased separately. The choice of CPENT or CHFI is yours.)
This is authorized CEH training—ONLC is an EC Council Accredited Training Center.
Cyber Range. A cyber range provides a controlled environment for professionals to learn, practice, compete, and assess skill levels against realistic target networks and infrastructure while deploying real attacks, training participants in the real countermeasures required to prevent or respond to those attacks. A cyber range is a place to practice new skills, hone existing ones, and succeed or fail without consequence, which is integral to the development of essential cybersecurity skills and tactics that will be used on the job.
Exam Insurance. If you fail either certification exam that's in your bundle on the first attempt, we will pay for your next attempt. Any further attempts can be purchased at the reduced “retry” rate.
Call to purchase your CEH Certification Bundle today! Bundles must be purchased by phone. All major credit cards accepted. Contact an ONLC Advisor during business hours...
|Click Title for Dates & Outlines||Days||Fee|
|CEH: Certified Ethical Hacking Training Bundle|
|Certified Ethical Hacker (CEH)||5||$3495|
A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. The individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker.
The CEH training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
CEH v11 (prefix: 312-50)
Once you've earned CEH Certification and gained experience you'll be ready to tackle CEH Practical certification exam. The preparatory course for CEH Practical is the CEH course. While there is no additional course or training required, EC Council strongly recommends candidates only attempt the CEH Practical exam if they have attended the CEH course or equivalent.
CEH Practical is a rigorous, six-hour exam that requires candidates to demonstrate the application of ethical hacking techniques. It is not a simulated exam but rather, it mimics a real corporate network through the use of live virtual machines, networks, and applications, designed to test your skills. You will be presented with scenarios and will be asked to demonstrate the application of the knowledge acquired in the CEH course to find solutions to real-life challenges.
Certification Exam: Certified Ethical Hacker (Practical)
Schedule your exam via the EC-Council Exam Center at https://www.eccexam.com .
Short for Certification Penetration Testing, CPENT this an advanced-level cybersecurity certification. Unlike other penetration testing programs that follow a generic kill chain methodology, CPENT teaches how to build and write effective penetration tests on filtered networks and various technologies. While ethical hacking exposes learners to hacking tools and technologies, CPENT takes it further by exploring how to write exploits and build tools to outthink and thwart attacks.
CPENT is fully online, remotely proctored and can be taken as one continuous 24-hour session OR broken into two 12-hour sessions
Pen Test Report Submission - record of the candidate's actions completed during the exam. It is due within 7 days of concluding the full exam. Certification will not be awarded without it.
Schedule your exam via the EC-Council Exam Center at https://www.eccexam.com .
IMPORTANT NOTE: Your CPENT exam score determines if you earn LPT Master Certification (below).
Those who choose CPENT for their Bundle already have what's needed to possibly earn LPT Master certification. CPENT training is the prep for LPT Master. While there is no additional course or training required, those who score 90% or higher on their CPENT Exam will earn Licensed Penetration Tester Master certification.
A certified LPT Master can among other skills:
CHFI is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer investigation techniques are being used by police, government and corporate entities globally who often use EC-Council's CHFI certification to prove one's cyber security skills.
CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
Schedule your exam via the EC-Council Exam Center at https://www.eccexam.com .
EC Council First Look Webinars - FREE with code ONLC
Get a sneak peek into EC Council certification courses with First Look Sessions. These 3-hour webinars provide an overview of the kind of content you can expect from a full EC Council course! Some sessions include live lab demonstrations (where applicable). These previews are delivered by an EC-Council Certified Master Instructor. Register with code ONLC and the event is free. First Look Topics & Dates (.pdf)
Education Advisors for Assistance
Our advisors can answer questions about our classes and certification. They can also help you determine a training path that is right for you based on your background and career goals. Advisors are available weekdays toll free or chat.
ONLC Training Centers Coast to Coast
We schedule every instructor-led (ILT) class at each of our ONLC Training Centers locations -- same dates. Our training rooms are outfitted with the equipment needed for class and provide an interruption-free space so you can concentrate fully on learning. Find ONLC centers near me .
Live Classes from Your Own Location
You can attend our live, instructor-led classes from the comfort and convenience of your home or office. The setup is really easy and you don't have to have the class software on your device. Follow our easy setup video . If you're still not sure about the setup contact an ONLC Advisor toll free for assistance.
Call ONLC to purchase your CEH Certification Bundle! We accept all major credit cards. Bundles are only available for purchase by phone. Contact an ONLC Advisor weekdays to purchase...
* Bundle Terms & Conditions
|Virtual Ethical Hacker training|
|Alabama||Birmingham Ethical Hacker training||Huntsville Ethical Hacker training|
|Mobile Ethical Hacker training||Montgomery Ethical Hacker training|
|Arkansas||Bentonville Ethical Hacker training||Little Rock Ethical Hacker training|
|Arizona||Mesa Ethical Hacker training||Phoenix Ethical Hacker training|
|Scottsdale Ethical Hacker training||Tucson Ethical Hacker training|
|California||Bakersfield Ethical Hacker training||Glendale Ethical Hacker training|
|Irvine Ethical Hacker training||Los Angeles Ethical Hacker training||Los Angeles Ethical Hacker training|
|Manhattan Beach Ethical Hacker training||Orange Ethical Hacker training||Pleasanton Ethical Hacker training|
|Riverside Ethical Hacker training||Sacramento Ethical Hacker training||San Diego Ethical Hacker training|
|San Diego Ethical Hacker training||San Diego Ethical Hacker training||San Francisco Ethical Hacker training|
|San Jose Ethical Hacker training||Walnut Creek Ethical Hacker training||Woodland Hills Ethical Hacker training|
|Colorado||Boulder Ethical Hacker training||Centennial Ethical Hacker training|
|Colorado Springs Ethical Hacker training||Denver Ethical Hacker training||Ft. Collins Ethical Hacker training|
|Grand Junction Ethical Hacker training||Lakewood Ethical Hacker training||Loveland Ethical Hacker training|
|Connecticut||Cheshire Ethical Hacker training||Danbury Ethical Hacker training|
|Rocky Hill Ethical Hacker training||Shelton Ethical Hacker training||Stamford Ethical Hacker training|
|District of Columbia||Washington Ethical Hacker training|
|Delaware||Wilmington Ethical Hacker training|
|Florida||Boca Raton Ethical Hacker training||Bonita Springs Ethical Hacker training|
|Bradenton Ethical Hacker training||Fort Lauderdale Ethical Hacker training||Fort Myers Ethical Hacker training|
|Fort Walton Beach Ethical Hacker training||Jacksonville Ethical Hacker training||Kissimmee Ethical Hacker training|
|Lakeland Ethical Hacker training||Melbourne Ethical Hacker training||Miami Ethical Hacker training|
|Miramar Beach Ethical Hacker training||Orange Park Ethical Hacker training||Orlando Ethical Hacker training|
|Orlando Ethical Hacker training||Pensacola Ethical Hacker training||Plantation Ethical Hacker training|
|Tallahassee Ethical Hacker training||Tampa Ethical Hacker training|
|Georgia||Alpharetta Ethical Hacker training||Atlanta Ethical Hacker training|
|Duluth Ethical Hacker training||Kennesaw Ethical Hacker training||Macon Ethical Hacker training|
|Martinez Ethical Hacker training||Savannah Ethical Hacker training|
|Iowa||Bettendorf Ethical Hacker training||Des Moines Ethical Hacker training|
|Idaho||Boise Ethical Hacker training|
|Illinois||Chicago Ethical Hacker training||Gurnee Ethical Hacker training|
|Joliet Ethical Hacker training||Oak Brook Ethical Hacker training||Peoria Ethical Hacker training|
|Schaumburg Ethical Hacker training||Warrenville Ethical Hacker training|
|Indiana||Carmel Ethical Hacker training||Evansville Ethical Hacker training|
|Fort Wayne Ethical Hacker training||Greenwood Ethical Hacker training||Indianapolis Ethical Hacker training|
|South Bend Ethical Hacker training|
|Kansas||Lenexa Ethical Hacker training||Wichita Ethical Hacker training|
|Kentucky||Florence Ethical Hacker training||Lexington Ethical Hacker training|
|Louisville Ethical Hacker training|
|Louisiana||Baton Rouge Ethical Hacker training||Lafayette Ethical Hacker training|
|New Orleans Ethical Hacker training|
|Massachusetts||Boston Ethical Hacker training||Braintree Ethical Hacker training|
|Danvers Ethical Hacker training||East Longmeadow Ethical Hacker training||North Andover Ethical Hacker training|
|Norwell Ethical Hacker training||Woburn Ethical Hacker training||Worcester Ethical Hacker training|
|Maryland||Annapolis Ethical Hacker training||Bethesda Ethical Hacker training|
|Columbia Ethical Hacker training||Frederick Ethical Hacker training||Germantown Ethical Hacker training|
|Greenbelt Ethical Hacker training||Owings Mills Ethical Hacker training||Rockville Ethical Hacker training|
|Towson Ethical Hacker training|
|Maine||Portland Ethical Hacker training|
|Michigan||Ann Arbor Ethical Hacker training||Grand Rapids Ethical Hacker training|
|Livonia Ethical Hacker training||Novi Ethical Hacker training||Southfield Ethical Hacker training|
|Troy Ethical Hacker training|
|Minnesota||Bloomington Ethical Hacker training||Maple Grove Ethical Hacker training|
|Minneapolis Ethical Hacker training||Woodbury Ethical Hacker training|
|Missouri||Columbia Ethical Hacker training||Lee's Summit Ethical Hacker training|
|O'Fallon Ethical Hacker training||Springfield Ethical Hacker training||St. Louis Ethical Hacker training|
|St. Louis Ethical Hacker training|
|Mississippi||Ridgeland Ethical Hacker training|
|Montana||Great Falls Ethical Hacker training|
|North Carolina||Asheville Ethical Hacker training||Chapel Hill Ethical Hacker training|
|Charlotte Ethical Hacker training||Charlotte Ethical Hacker training||Fayetteville Ethical Hacker training|
|Greensboro Ethical Hacker training||Raleigh Ethical Hacker training||Raleigh Ethical Hacker training|
|Wilmington Ethical Hacker training|
|North Dakota||Fargo Ethical Hacker training||Grand Forks Ethical Hacker training|
|Nebraska||Omaha Ethical Hacker training|
|New Hampshire||Bedford Ethical Hacker training||Concord Ethical Hacker training|
|Portsmouth Ethical Hacker training|
|New Jersey||Bridgewater Ethical Hacker training||Mahwah Ethical Hacker training|
|Morristown Ethical Hacker training||Mount Laurel Ethical Hacker training||Paramus Ethical Hacker training|
|Princeton Ethical Hacker training||Red Bank Ethical Hacker training|
|New Mexico||Albuquerque Ethical Hacker training|
|Nevada||Henderson Ethical Hacker training||Las Vegas Ethical Hacker training|
|Reno Ethical Hacker training|
|New York||Albany Ethical Hacker training||Bohemia Ethical Hacker training|
|Brooklyn Ethical Hacker training||Buffalo Ethical Hacker training||Liverpool Ethical Hacker training|
|Mt. Kisco Ethical Hacker training||New York Ethical Hacker training||Rochester Ethical Hacker training|
|Uniondale Ethical Hacker training|
|Ohio||Beachwood Ethical Hacker training||Beavercreek Ethical Hacker training|
|Cincinnati Ethical Hacker training||Cincinnati Ethical Hacker training||Cleveland Ethical Hacker training|
|Columbus Ethical Hacker training||Columbus Ethical Hacker training||Dublin Ethical Hacker training|
|Independence Ethical Hacker training||Toledo Ethical Hacker training||Westlake Ethical Hacker training|
|Oklahoma||Oklahoma City Ethical Hacker training||Tulsa Ethical Hacker training|
|Oregon||Portland Ethical Hacker training||Salem Ethical Hacker training|
|Pennsylvania||Allentown Ethical Hacker training||Conshohocken Ethical Hacker training|
|Erie Ethical Hacker training||Huntingdon Valley Ethical Hacker training||Lancaster Ethical Hacker training|
|Malvern Ethical Hacker training||Mechanicsburg Ethical Hacker training||Philadelphia Ethical Hacker training|
|Pittsburgh Ethical Hacker training||Pittsburgh Ethical Hacker training||South York Ethical Hacker training|
|State College Ethical Hacker training||Wexford Ethical Hacker training|
|Rhode Island||West Warwick Ethical Hacker training|
|South Carolina||Columbia Ethical Hacker training||Greenville Ethical Hacker training|
|Mt. Pleasant Ethical Hacker training||North Charleston Ethical Hacker training|
|Tennessee||Knoxville Ethical Hacker training||Memphis Ethical Hacker training|
|Murfreesboro Ethical Hacker training||Nashville Ethical Hacker training|
|Texas||Allen Ethical Hacker training||Amarillo Ethical Hacker training|
|Austin Ethical Hacker training||Austin Ethical Hacker training||Bryan Ethical Hacker training|
|Dallas Ethical Hacker training||Dallas Ethical Hacker training||Denton Ethical Hacker training|
|El Paso Ethical Hacker training||Fort Worth Ethical Hacker training||Houston Ethical Hacker training|
|Irving Ethical Hacker training||Katy Ethical Hacker training||Keller Ethical Hacker training|
|Plano Ethical Hacker training||San Antonio Ethical Hacker training||San Antonio Ethical Hacker training|
|Southlake Ethical Hacker training||Sugar Land Ethical Hacker training||The Woodlands Ethical Hacker training|
|Utah||Provo Ethical Hacker training||Salt Lake City Ethical Hacker training|
|Virginia||Alexandria Ethical Hacker training||Arlington Ethical Hacker training|
|Charlottesville Ethical Hacker training||Fairfax Ethical Hacker training||Forest Ethical Hacker training|
|Fredericksburg Ethical Hacker training||Glen Allen Ethical Hacker training||Herndon Ethical Hacker training|
|Manassas Ethical Hacker training||McLean Ethical Hacker training||Norfolk Ethical Hacker training|
|Reston Ethical Hacker training||Richmond Ethical Hacker training||Roanoke Ethical Hacker training|
|Stafford Ethical Hacker training||Virginia Beach Ethical Hacker training|
|Washington||Bellevue Ethical Hacker training||Bothell Ethical Hacker training|
|Federal Way Ethical Hacker training||Lacey Ethical Hacker training||Puyallup Ethical Hacker training|
|Seattle Ethical Hacker training|
|Wisconsin||Brookfield Ethical Hacker training||Green Bay Ethical Hacker training|
|Madison Ethical Hacker training|
|West Virginia||Martinsburg Ethical Hacker training|
|Wyoming||Casper Ethical Hacker training||Cheyenne Ethical Hacker training|