Pearson
Certified Ethical Hacker (CEH) Specialization
Pearson

Certified Ethical Hacker (CEH) Specialization

Prepare for the Certified Ethical Hacker (CEH) certification exam.. Master ethical hacking techniques and exam-focused skills to prepare for the Certified Ethical Hacker (CEH) certification exam and strengthen your knowledge of cybersecurity defense strategies.

Pearson

Instructor: Pearson

Included with Coursera Plus

Get in-depth knowledge of a subject
Intermediate level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace
Earn a Certificate
With paid plans
Get in-depth knowledge of a subject
Intermediate level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace
Earn a Certificate
With paid plans

What you'll learn

  • Master reconnaissance techniques, including footprinting, scanning, and enumeration, to gather critical information about target systems.

  • Develop skills in system hacking, vulnerability analysis, and implementing countermeasures to protect against various cyber threats.

  • Understand and apply ethical hacking principles to enhance the security and integrity of digital infrastructures.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

July 2025

27 practice exercises

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Pearson

Specialization - 8 course series

What you'll learn

  • Master the fundamentals of information security and cybersecurity.

  • Understand and apply ethical hacking methodologies.

  • Navigate security laws and standards with confidence.

  • Plan and scope penetration testing assessments effectively.

Skills you'll gain

Cybersecurity, Computer Security, Security Controls, Threat Modeling, Penetration Testing, Data Security, Information Systems Security Assessment Framework (ISSAF), Cyber Security Assessment, Cyber Security Policies, Cyber Security Strategy, Vulnerability Assessments, Exploitation techniques, and Cyber Threat Intelligence

What you'll learn

  • Master footprinting methodologies and Open Source Intelligence (OSINT) techniques.

  • Conduct comprehensive network scanning to identify live hosts and open ports.

  • Utilize advanced tools for effective reconnaissance and information gathering.

  • Develop skills in enumeration to extract detailed target system information.

Skills you'll gain

Network Analysis, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Network Security, Cyber Security Assessment, Network Protocols, and Open Source Technology

What you'll learn

  • Conduct thorough vulnerability analysis to identify and prioritize system weaknesses.

  • Master system hacking techniques, including privilege escalation and command execution.

  • Understand and counteract various malware threats, including APTs and fileless malware.

  • Develop strategies to enhance cybersecurity defenses and protect digital environments.

Skills you'll gain

Information Systems Security, Malware Protection, Vulnerability Assessments, Infrastructure Security, Threat Management, Network Security, Cyber Security Assessment, Exploitation techniques, Threat Detection, Penetration Testing, and Vulnerability Management

What you'll learn

  • Master techniques in sniffing, social engineering, and session hijacking.

  • Understand and counteract denial-of-service attacks with effective strategies.

  • Learn to evade and defend against IDS, IPS, and firewall systems.

  • Develop skills to implement robust network security measures and countermeasures.

Skills you'll gain

Intrusion Detection and Prevention, Network Security, Cybersecurity, Network Analysis, Firewall, Exploitation techniques, Vulnerability Assessments, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Security Strategy, and Human Factors (Security)

What you'll learn

  • Master web server and application attack methodologies and countermeasures.

  • Identify and exploit vulnerabilities using the OWASP Top 10 framework.

  • Perform and defend against SQL injection attacks with advanced techniques.

  • Secure APIs and web services against modern cyber threats.

Skills you'll gain

Web Servers, Application Security, Web Applications, Cloud Security, Application Programming Interface (API), Authentications, Security Controls, Open Web Application Security Project (OWASP), SQL, Exploitation techniques, Vulnerability Assessments, and Penetration Testing

What you'll learn

  • Master techniques to exploit and secure wireless network vulnerabilities.

  • Evaluate and protect mobile applications on Android and iOS platforms.

  • Identify and mitigate security threats in IoT and operational technology systems.

  • Safeguard critical infrastructure components like SCADA and ICS devices.

Skills you'll gain

Internet Of Things, Mobile Security, Wireless Networks, Network Security, Information Systems Security, Infrastructure Security, Application Security, Vulnerability Assessments, Cybersecurity, and Encryption

What you'll learn

  • Identify and mitigate vulnerabilities in cloud environments.

  • Implement cryptographic techniques for secure data storage and transmission.

  • Understand and apply post-quantum cryptography algorithms.

  • Develop secure cloud applications using DevSecOps best practices.

Skills you'll gain

Cloud Security, Data Encryption Standard, Cryptography, Data Security, Cloud Computing, Cyber Security Assessment, Encryption, Public Key Infrastructure, Advanced Encryption Standard (AES), and Key Management

What you'll learn

  • Develop a foundational understanding of AI threats and LLM security frameworks.

  • Master techniques to mitigate risks such as prompt injection and training data poisoning.

  • Implement best practices for securing AI supply chains and protecting sensitive information.

  • Enhance AI system resilience through proactive security testing and incident response strategies.

Skills you'll gain

Generative AI, Prompt Engineering, Large Language Modeling, LangChain, Threat Modeling, LangGraph, Security Strategy, Responsible AI, Incident Response, Continuous Monitoring, Vulnerability Assessments, Threat Detection, Artificial Intelligence, Information Systems Security, and MITRE ATT&CK Framework

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Pearson
Pearson
268 Courses12,712 learners

Offered by

Pearson

Compare with similar products

Rating
Level
Skills
Tools
Last updated
Number of practice exercises
Degree eligibility
Part of Coursera Plus

You might also like

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions