EC-Council Launching CEHv7: New Standard in InfoSec Training

Share Article

The most advanced, hands-on ethical hacker training is now official: Certified Ethical Hacker Version 7.

Hackers pose an escalating risk to US businesses and government agencies, so the EC-Council, a leading global cybersecurity training organization, is launching the next generation of its successful “Certified Ethical Hacker” program - with a 35-city worldwide launch on March 14.

The new program, known as CEH Version 7 (CEH v7) has been dramatically enhanced to provide the most intense, hands-on training for ethical hacking. The course combines class metrics, advance lab environments and cutting edge hacking techniques presented through updated presentation materials.

“Network security professionals must constantly defend against malicious attacks from highly sophisticated hackers,” said Jay Bavisi, founder and president of the EC-Council. “In order to defend their networks, they must have a thorough understanding of offensive tactics as well as a comprehensive understanding of how hackers think. We have devoted a great deal of time and resources into developing the next generation of the Certified Ethical Hacker program. Version 7 is the culmination of those efforts and will provide a highly advanced hands-on training environment to create superior network defenders.”

“To better prepare information security professionals for the real world threats they face, we have added some exciting, new tools in CEH v7 to expand the ethical hackers’ arsenal,” Bavisi said.

These new tools include iLabs and the Frankenstein code repository:

●    iLabs is a subscription service that will allow students to test CEH v7 labs and attack theories in the safety of a virtualized server environment that will react just like a live network. Students will be able to access iLabs with just a web browser.

●    Frankenstein repository is a new database for students to search, download and install the latest hacking and penetration testing tools; hands-on training in the latest hacker techniques like DDoS and buffer overflows; plus hours of video demonstrating real-world hacking. Certified members will have access to Frankenstein even after they finish their CEH studies so that they have access to the most current attacks found in the wild.

As part of CEH v7, students will learn how network perimeter defenses work - by attacking their own networks as if they were hackers. As part of this process, students will learn real world applications like how intruders escalate privileges and how to secure a system. Specific training topics include Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and more.

The CEH program is highly respected in the information security field worldwide. In February 2010, it was officially added to Department of Defense directive 8570 (DoD 8570) as a baseline certification in the Computer Network Defense categories.

Don’t miss the launch of the next standard in information security training, Certified Ethical Hacker Version 7, March 14, 2011. For more information, visit the EC-Council website or follow us on Twitter:


The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigator (CHFI) program, License Penetration Tester (LPT) program and various other programs offered in over 60 countries around the globe. EC-Council has trained over 80,000 individuals and certified more than 30,000 security professionals. These certifications are recognized worldwide and have received endorsements from various government agencies including the US federal government, National Security Agency (NSA), Committee on National Security Systems (CNSS), US Army, FBI, Microsoft and CERTs (Computer Emergency Response Team) of various nations. The UUS Department of Defense has included the CEH program into its Directive 8570, making it one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP).


Share article on social media or email:

View article via:

Pdf Print

Contact Author

Michael Sias
Visit website