CEH
Back to course catalogue
Cybersecurity Courses Ethical Hacking & Offensive Security

CEH

Certified Ethical Hacker preparation and practical attack logic

CEH introduces learners to structured offensive security thinking with a strong ethical and defensive frame. It covers attack surfaces, information gathering, enumeration, common exploit logic, web attack fundamentals, password threats, and the reporting mindset expected in professional engagements.

3 Months Online Live Batches Online only
CEH
CEH
CEH
Programme snapshot

CEH

Sploit Academy positions CEH as more than a short course. The aim is to help learners build a professional standard of communication, technical execution, and evidence-based completion that supports real hiring conversations and long-term career growth.

LevelIntermediate
Duration3 Months
Guided live hours72 hours
Practical lab hours31 hours
Self-study structure60 hours
Completion awardSploit Academy Certificate of Completion
How the programme is delivered
Live online trainer-led batch classes
Module-by-module labs with guided review
Structured homework, mentor checkpoints, and revision support
Professional documentation habits built into every stage
Mentor support

Learners receive structured trainer direction, module-by-module review, practical correction on submitted work, and consistent guidance on how to turn course output into confident professional performance.

Detailed curriculum

Module-by-module breakdown

Each module includes focused topic coverage, guided time estimates, practical lab work, and a clear professional outcome.

This module develops practical depth in ethical hacking framework and legal awareness and connects it directly to the wider objectives of CEH, so learners understand not only what to do, but why each step matters in professional practice.

Topics covered

Core principles and terminology for reconnaissance 4 guided hours

Ethical hacking framework and legal awareness is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Implementation workflow, setup, and structured practice in scanning 3 guided hours

Ethical hacking framework and legal awareness is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Security, policy, quality control, and operational checks in enumeration 3 guided hours

Ethical hacking framework and legal awareness is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Troubleshooting, optimisation, and review activities in web attack logic 3 guided hours

Ethical hacking framework and legal awareness is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Case study, documentation, and exam-style reinforcement in post-exploitation awareness 3 guided hours

Ethical hacking framework and legal awareness is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Labs in this module

Guided build lab for ethical hacking framework and legal awareness 3 practical hours

Learners follow a trainer-led scenario, configure the environment, and validate the expected output step by step.

Scenario lab linked to ceh 3 practical hours

A realistic case is used to apply module knowledge under timed conditions with documented decision making.

Troubleshooting and evidence lab 2 practical hours

Learners fix faults, capture evidence, explain the reasoning, and submit professional notes or screenshots.

Module outcome

By the end of this module, learners will be able to explain, apply, and document ethical hacking framework and legal awareness in a way that supports the standards expected across ceh roles and certification preparation.

This module develops practical depth in reconnaissance, scanning, and enumeration and connects it directly to the wider objectives of CEH, so learners understand not only what to do, but why each step matters in professional practice.

Topics covered

Core principles and terminology for scanning 4 guided hours

Reconnaissance, scanning, and enumeration is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Implementation workflow, setup, and structured practice in enumeration 3 guided hours

Reconnaissance, scanning, and enumeration is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Security, policy, quality control, and operational checks in web attack logic 3 guided hours

Reconnaissance, scanning, and enumeration is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Troubleshooting, optimisation, and review activities in post-exploitation awareness 3 guided hours

Reconnaissance, scanning, and enumeration is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Case study, documentation, and exam-style reinforcement in reporting 3 guided hours

Reconnaissance, scanning, and enumeration is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Labs in this module

Guided build lab for reconnaissance, scanning, and enumeration 3 practical hours

Learners follow a trainer-led scenario, configure the environment, and validate the expected output step by step.

Scenario lab linked to ceh 3 practical hours

A realistic case is used to apply module knowledge under timed conditions with documented decision making.

Troubleshooting and evidence lab 2 practical hours

Learners fix faults, capture evidence, explain the reasoning, and submit professional notes or screenshots.

Module outcome

By the end of this module, learners will be able to explain, apply, and document reconnaissance, scanning, and enumeration in a way that supports the standards expected across ceh roles and certification preparation.

This module develops practical depth in system, network, and web attack concepts and connects it directly to the wider objectives of CEH, so learners understand not only what to do, but why each step matters in professional practice.

Topics covered

Core principles and terminology for enumeration 2 guided hours

System, network, and web attack concepts is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Implementation workflow, setup, and structured practice in web attack logic 2 guided hours

System, network, and web attack concepts is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Security, policy, quality control, and operational checks in post-exploitation awareness 2 guided hours

System, network, and web attack concepts is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Troubleshooting, optimisation, and review activities in reporting 2 guided hours

System, network, and web attack concepts is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Case study, documentation, and exam-style reinforcement in reconnaissance 2 guided hours

System, network, and web attack concepts is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Labs in this module

Guided build lab for system, network, and web attack concepts 2 practical hours

Learners follow a trainer-led scenario, configure the environment, and validate the expected output step by step.

Scenario lab linked to ceh 2 practical hours

A realistic case is used to apply module knowledge under timed conditions with documented decision making.

Troubleshooting and evidence lab 2 practical hours

Learners fix faults, capture evidence, explain the reasoning, and submit professional notes or screenshots.

Module outcome

By the end of this module, learners will be able to explain, apply, and document system, network, and web attack concepts in a way that supports the standards expected across ceh roles and certification preparation.

This module develops practical depth in password, wireless, and malware fundamentals and connects it directly to the wider objectives of CEH, so learners understand not only what to do, but why each step matters in professional practice.

Topics covered

Core principles and terminology for web attack logic 2 guided hours

Password, wireless, and malware fundamentals is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Implementation workflow, setup, and structured practice in post-exploitation awareness 2 guided hours

Password, wireless, and malware fundamentals is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Security, policy, quality control, and operational checks in reporting 2 guided hours

Password, wireless, and malware fundamentals is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Troubleshooting, optimisation, and review activities in reconnaissance 2 guided hours

Password, wireless, and malware fundamentals is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Case study, documentation, and exam-style reinforcement in scanning 2 guided hours

Password, wireless, and malware fundamentals is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Labs in this module

Guided build lab for password, wireless, and malware fundamentals 2 practical hours

Learners follow a trainer-led scenario, configure the environment, and validate the expected output step by step.

Scenario lab linked to ceh 2 practical hours

A realistic case is used to apply module knowledge under timed conditions with documented decision making.

Troubleshooting and evidence lab 2 practical hours

Learners fix faults, capture evidence, explain the reasoning, and submit professional notes or screenshots.

Module outcome

By the end of this module, learners will be able to explain, apply, and document password, wireless, and malware fundamentals in a way that supports the standards expected across ceh roles and certification preparation.

This module develops practical depth in reporting, defence awareness, and certification prep and connects it directly to the wider objectives of CEH, so learners understand not only what to do, but why each step matters in professional practice.

Topics covered

Core principles and terminology for post-exploitation awareness 2 guided hours

Reporting, defence awareness, and certification prep is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Implementation workflow, setup, and structured practice in reporting 2 guided hours

Reporting, defence awareness, and certification prep is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Security, policy, quality control, and operational checks in reconnaissance 2 guided hours

Reporting, defence awareness, and certification prep is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Troubleshooting, optimisation, and review activities in scanning 2 guided hours

Reporting, defence awareness, and certification prep is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Case study, documentation, and exam-style reinforcement in enumeration 2 guided hours

Reporting, defence awareness, and certification prep is taught through live explanation, structured walkthroughs, guided activities, and applied review linked to ceh.

Labs in this module

Guided build lab for reporting, defence awareness, and certification prep 2 practical hours

Learners follow a trainer-led scenario, configure the environment, and validate the expected output step by step.

Scenario lab linked to ceh 2 practical hours

A realistic case is used to apply module knowledge under timed conditions with documented decision making.

Troubleshooting and evidence lab 2 practical hours

Learners fix faults, capture evidence, explain the reasoning, and submit professional notes or screenshots.

Module outcome

By the end of this module, learners will be able to explain, apply, and document reporting, defence awareness, and certification prep in a way that supports the standards expected across ceh roles and certification preparation.

Entry requirements
  • Networking basics recommended
  • Comfort using Windows or Linux environments
  • Motivation for security-focused study
Completion requirements
  • Attend live cohort sessions
  • Complete guided security labs
  • Pass the final internal CEH-aligned review
Assessment and final consolidation
Attendance and participation in scheduled live batch sessions
Module lab submissions with evidence of practical completion
Knowledge checks, review tasks, and trainer feedback cycles
Final assessment, capstone, or mock-certification style review
Capstone / final consolidation

The programme ends with a practical consolidation phase where learners combine the main ideas from CEH into a structured final task, demonstrate professional reasoning, and present evidence of completion in a recruiter-friendly format.

Upcoming batch starts

This three-month programme opens four live online batches every year and is designed for focused skills development in a compact guided format.

10 May 2026
Online Live Batch
Global Online Campus
ScheduleTue & Thu • 7:00 PM – 9:00 PM GMT
Seats24 available
10 Aug 2026
Online Live Batch
Global Online Campus
ScheduleSat & Sun • 1:00 PM – 4:00 PM GST
Seats23 available
10 Nov 2026
Online Live Batch
Global Online Campus
ScheduleTue & Thu • 7:00 PM – 9:00 PM GMT
Seats22 available
10 Feb 2027
Online Live Batch
Global Online Campus
ScheduleSat & Sun • 1:00 PM – 4:00 PM GST
Seats21 available
Career outcomes

Sploit Academy is designed to create skilled professionals who can present themselves credibly for opportunities across regions and industries.

Junior Security Analyst
Vulnerability Assessment Associate
Penetration Testing Trainee
Security Operations Professional
Course pricing
Live batch course fee $1,099 All courses are currently available online in scheduled batches only.
One-to-one online class $1,868 Premium private delivery for learners who want dedicated trainer time and a personalised pace.
Online recorded course Currently not available Recorded course option will be announced later.
Payment options
Stripe (Visa / Mastercard)
Payoneer
PayPal
Annual batch structure
3-month programmes4 batch starts every year
6-month programmes2 batch starts every year
1-year programmes1 flagship batch every year
Professional positioning

Sploit Academy positions CEH as more than a short course. The aim is to help learners build a professional standard of communication, technical execution, and evidence-based completion that supports real hiring conversations and long-term career growth.

Admissions

Ready to enrol in CEH?

Applications are reviewed for live online batches and premium private class enquiries.

Related courses

More programmes in Ethical Hacking & Offensive Security

Web Application Penetration Testing
Cybersecurity Courses Ethical Hacking & Offensive Security

Web Application Penetration Testing

Practical web testing methodology for modern applications

Learn how to assess web applications professionally through testing workflow, validation, and reporting.

Duration 3 Months
Level Intermediate
View Course Details
Mobile & API Security
Cybersecurity Courses Ethical Hacking & Offensive Security

Mobile & API Security

Security testing foundations for APIs and modern digital services

Develop practical awareness of API risk, mobile service exposure, and secure testing methodology.

Duration 3 Months
Level Intermediate
View Course Details
Sploit Red Team Associate
Cybersecurity Courses Ethical Hacking & Offensive Security

Sploit Red Team Associate

Advanced offensive mindset and structured simulated adversary training

A premium pathway for learners developing broader offensive security capability and disciplined attack simulation.

Duration 6 Months
Level Advanced
View Course Details