CEH — Complete Guide

EC-Council$1199 exam feemid levelDoD 8570 ApprovedRenews every 3 years

Certification intelligence synthesized from exam data, employer demand signals, and community feedback using the CyberPathIQ Methodology, designed by Julian Calvo, Ed.D.

Is CEH Worth It? An Honest ROI Analysis

The Certified Ethical Hacker (CEH) sits in an awkward position in the cybersecurity market: it's one of the most recognized certifications by HR departments and hiring managers who don't work in security, and one of the most criticized certifications by practitioners who do. That tension is exactly what you need to understand before spending $1,199.

The numbers: CEH holders report average salaries between $85,000 and $115,000 in the United States, with penetration testers and ethical hackers on the higher end of that range. That sounds compelling until you realize that CompTIA PenTest+, which covers similar ground, costs $404 — less than a third of the price. The salary premium attributable specifically to CEH versus other mid-level security credentials is difficult to isolate, and the honest answer is that the data doesn't support a clear CEH-specific salary bump. Where CEH earns its money back: The certification is DoD 8570/8140 approved, which means if you're pursuing government contracts, federal employment, or roles supporting the Department of Defense, CEH can be a checkbox requirement that unlocks entire job categories. In that specific context, the $1,199 is a straightforward business expense. If your employer is paying for it — and many government contractors will — the ROI calculation changes entirely. Where it doesn't: If you're in the private sector, targeting a red team role at a tech company, or planning to freelance as a penetration tester, the CEH is unlikely to differentiate you the way an OSCP (Offensive Security Certified Professional) will. Hiring managers at mature security organizations know that CEH is primarily multiple-choice and knowledge-based, not hands-on. You can pass CEH without ever exploiting a live system. That's a real limitation. Scenario: You're a network administrator with three years of experience, eyeing a transition into a security analyst or junior pen tester role at a defense contractor. Your employer will reimburse the exam fee. In this case, CEH is a rational move — it satisfies the DoD 8570 requirement, signals your intent to specialize, and costs you nothing out of pocket. Now flip the scenario: you're self-funding, targeting a boutique pen testing firm, and you have six months to study. Spend that $1,199 on OSCP instead. The market will reward you more.

---

Who Should Get This Certification (and Who Shouldn't)

Get CEH if you:

  • Work in or are targeting federal/DoD-adjacent roles. This is the single strongest use case. DoD 8570 compliance is a real requirement, and CEH satisfies it at the IAT Level II and IASAE Level I categories. If your career path runs through government contracting, this certification has concrete, non-negotiable value.
  • Have employer sponsorship. At $1,199, the cost-benefit math improves dramatically when someone else is paying. Many large defense contractors and MSSPs (Managed Security Service Providers) budget for CEH as a standard employee development expense.
  • Are early in a security transition and need a structured curriculum. CEH's courseware covers 20 modules across a broad attack methodology framework — reconnaissance, scanning, enumeration, exploitation, malware, social engineering, and more. If you're coming from IT support or networking and need a structured map of offensive security concepts, the curriculum has genuine educational value even if the credential itself is debated.
  • Need a credential that non-technical stakeholders recognize. If you're in a consulting role where you're presenting to C-suite clients or writing proposals, "Certified Ethical Hacker" reads clearly to people who don't know what OSCP means. That's a real, if superficial, advantage.

Skip CEH if you:

  • Are self-funding and targeting hands-on pen testing roles. The OSCP is the industry standard for a reason — it requires you to actually compromise machines in a lab environment. Hiring managers at serious security firms know the difference. Spend your money there.
  • Already hold Security+ or CySA+. The knowledge overlap is significant. You may be better served by moving up to OSCP or specializing with something like eJPT (eLearnSecurity Junior Penetration Tester) before jumping to CEH.
  • Are a senior practitioner. CEH is a mid-level credential. If you have five or more years in security, it's unlikely to move the needle on your compensation or career trajectory.
  • Expect it to teach you to hack. This is the most important caveat. CEH teaches you about hacking. It does not make you a hacker. If your goal is practical offensive skill development, platforms like Hack The Box, TryHackMe, and the OSCP lab environment will develop your actual capabilities far more effectively.

---

What the Exam Actually Tests

The CEH exam (312-50) consists of 125 multiple-choice questions with a 4-hour time limit. The passing score varies by exam form but typically falls between 60% and 85% — EC-Council uses a cut score system that adjusts based on question difficulty.

The exam is knowledge-based, not performance-based. You will not be asked to exploit a machine. You will be asked to identify what tool performs a specific function, what a particular attack technique is called, or what the correct sequence of steps in a methodology is.

Domain breakdown (approximate):
  • Background and Information Security Fundamentals (~6%): Laws, standards, and ethical hacking concepts
  • Reconnaissance and Footprinting (~9%): Passive and active information gathering techniques
  • Scanning and Enumeration (~9%): Network scanning, port scanning, service enumeration
  • Vulnerability Analysis (~6%): Vulnerability scanning tools and methodologies
  • System Hacking (~12%): Password cracking, privilege escalation, maintaining access, covering tracks
  • Malware Threats (~6%): Trojans, ransomware, fileless malware concepts
  • Sniffing and Social Engineering (~9%): Network sniffing techniques, phishing, pretexting
  • Web Application Hacking (~16%): SQL injection, XSS, CSRF, web server attacks
  • Wireless and Mobile Security (~6%): WPA2 cracking, Bluetooth attacks, mobile platform vulnerabilities
  • Cloud, IoT, and OT Security (~6%): Cloud attack vectors, IoT threats, SCADA/ICS concepts
  • Cryptography (~6%): Encryption algorithms, PKI, cryptanalysis basics
  • Evading IDS, Firewalls, and Honeypots (~6%): Evasion techniques and detection avoidance
What trips people up: EC-Council questions are notorious for having two answers that seem correct, with the "right" answer being the one that matches EC-Council's specific terminology or methodology. This means studying from EC-Council's official materials — even if you find them dry — is not optional. Third-party resources are useful supplements, but the exam tests EC-Council's framework specifically. Practical component: EC-Council introduced a practical exam option (CEH Practical) that involves a 6-hour lab environment. This is separate from the standard 312-50 and costs additional money. If you want the CEH to carry more weight with technical hiring managers, completing the practical component is worth considering — it's the version of the credential that actually demonstrates hands-on capability.

---

Study Strategy: The Efficient Path

Most candidates with a solid IT or networking background need 60 to 90 days of consistent study to pass CEH. If you're coming from a pure development or non-technical background, budget 120 days.

Step 1: Assess your baseline (Week 1)

Take a free practice exam before you study anything. Resources like Boson, Exam-Labs, or free question banks on GitHub will give you a rough sense of where you stand. If you're scoring above 50% cold, you have a solid foundation. Below 40% means you need to shore up fundamentals first.

Step 2: Primary study material (Weeks 2–8)

The official EC-Council courseware is comprehensive but expensive if purchased separately. Your options:

  • EC-Council Official Curriculum — Most complete, most aligned to exam terminology. Required if you're taking the instructor-led course path.
  • Matt Walker's "CEH Certified Ethical Hacker All-in-One Exam Guide" — The most widely recommended third-party book. Covers all domains, written in accessible language, and includes practice questions. Around $40–50.
  • Darril Gibson's study guides — Another solid option, particularly strong on the conceptual framework.
  • Udemy courses (look for courses by Ermin Kreponic or similar instructors with recent updates) — Typically $15–30 on sale, useful for visual learners.
Step 3: Tool familiarity (Weeks 4–10, overlapping)

You don't need to master these tools, but you need to know what they do and when you'd use them. The exam will test tool recognition:

  • Nmap — Port scanning and service detection
  • Metasploit — Exploitation framework
  • Wireshark — Packet capture and analysis
  • Burp Suite — Web application testing
  • Aircrack-ng — Wireless security testing
  • John the Ripper / Hashcat — Password cracking
  • Nikto — Web server scanning
  • Netcat — Network utility and backdoor tool

Set up a home lab using VirtualBox or VMware with Kali Linux. Spend time actually running these tools against intentionally vulnerable machines like DVWA (Damn Vulnerable Web Application) or Metasploitable. You won't need this for the multiple-choice exam, but it will cement the concepts and prepare you if you pursue the CEH Practical.

Step 4: Practice exams (Weeks 8–12)

This is where most people underinvest. Do not sit the exam until you're consistently scoring 75%+ on practice tests across multiple question banks. EC-Council's question style is specific enough that volume practice matters.

  • Boson ExSim — The gold standard for practice exams. Expensive (~$99) but the closest simulation of actual exam difficulty.
  • Exam-Labs — More affordable, large question bank, quality varies.
  • EC-Council's own practice tests — Available through their platform, worth using in the final two weeks.
Scenario: You're studying 1.5 hours per day on weekdays and 3 hours on Saturdays. At that pace — roughly 10 hours per week — a 90-day timeline gives you about 130 hours of study time. That's sufficient for most candidates with a networking or sysadmin background. Compress the timeline by cutting the tool lab time if you're purely focused on the multiple-choice exam; expand it if you're pursuing the practical component.

---

CEH vs. Alternatives: Head-to-Head

| Factor | CEH | CompTIA PenTest+ | CompTIA CySA+ |

|---|---|---|---|

| Cost | $1,199 | $404 | $404 |

| Exam format | Multiple choice | Multiple choice + performance-based | Multiple choice + performance-based |

| DoD 8570 approved | Yes | Yes | Yes |

| Industry recognition | High (HR/government) | Moderate | Moderate |

| Practical skill signal | Low | Moderate | Low-moderate |

| Best for | Federal/DoD roles | Pen testing generalists | Blue team/SOC analysts |

| Renewal | 3 years | 3 years | 3 years |

CEH vs. CompTIA PenTest+: PenTest+ covers similar offensive security content at a third of the price and includes performance-based questions that require you to demonstrate some practical thinking. For most people not targeting DoD roles, PenTest+ is the more cost-efficient choice. The tradeoff is that CEH has stronger brand recognition in government and enterprise procurement contexts. CEH vs. OSCP (not listed but critical to mention): OSCP costs approximately $1,499 for the 90-day lab package and is universally respected by technical hiring managers. If you're choosing between CEH and OSCP and you're targeting private-sector pen testing, OSCP wins without debate. The only reason to choose CEH over OSCP is DoD 8570 compliance or if you're not yet ready for OSCP's difficulty level. CEH vs. CySA+: These target different roles. CySA+ is a defensive/blue team credential focused on threat detection, analysis, and response. If you're not sure whether you want offensive or defensive security, CySA+ is a lower-cost way to explore the defensive side before committing to an offensive path.

---

Career Impact: What Changes After You Pass

Immediate effects: Your resume becomes searchable for roles that filter on "CEH" or "Certified Ethical Hacker." This matters more than it sounds — many ATS (Applicant Tracking Systems) at large employers and government contractors use keyword filtering. Adding CEH to your resume puts you in front of more initial screens. Salary impact: Expect modest but real movement. Entry-level security analysts with CEH report moving from $65,000–$75,000 ranges into $80,000–$95,000 roles, though it's difficult to attribute this entirely to the certification versus the job search activity it prompts. Mid-level practitioners report less dramatic impact because the credential is less differentiating at senior levels. Role access: CEH specifically opens doors to:
  • Penetration tester roles at government contractors (Booz Allen, Leidos, SAIC, Raytheon, etc.)
  • Security analyst roles requiring DoD 8570 compliance
  • Vulnerability assessment positions at MSSPs
  • Junior red team roles where the hiring manager values the credential for compliance purposes
What it won't do: CEH will not make you competitive for senior red team positions at mature security organizations, bug bounty programs, or elite consulting firms. Those environments value demonstrated skill — CTF (Capture the Flag) performance, OSCP, published CVEs, or a strong portfolio of real engagements — over credentials. Scenario: You pass CEH and update your LinkedIn. Within 60 days, you receive three recruiter messages for security analyst and junior pen tester roles at defense contractors in the $85,000–$100,000 range. You take one, spend 18 months building hands-on experience, then pursue OSCP. That's a realistic and effective career trajectory — CEH as a door-opener, OSCP as the credential that defines your ceiling.

---

Renewal and Maintenance

CEH requires renewal every 3 years through EC-Council's ECE (EC-Council Continuing Education) credit system. You need 120 ECE credits per renewal cycle.

What counts toward ECE credits:
  • Attending security conferences (DEF CON, Black Hat, BSides events) — typically 2–4 credits per event
  • Completing online courses on platforms like Cybrary, Udemy, or LinkedIn Learning
  • Writing security articles or blog posts
  • Participating in CTF competitions
  • Completing EC-Council's own training modules
Renewal fee: EC-Council charges an $80 annual maintenance fee ($240 over the three-year cycle) in addition to the ECE credit requirements. Budget for this when calculating total cost of ownership: $1,199 initial + $240 over three years = approximately $1,440 to maintain the credential through one renewal cycle. Practical advice: Don't let ECE credits accumulate as a last-minute scramble. If you're attending one security conference per year and completing a few online courses, you'll hit 120 credits without much effort. EC-Council's portal tracks your credits, and you can log activities throughout the cycle rather than all at once. If you let it lapse: EC-Council allows a grace period, but reinstatement requires fees and potentially retesting. If you're in a DoD role where the credential is tied to your clearance or contract requirements, lapsing has real professional consequences. Set a calendar reminder 6 months before your expiration date.

---

The Bottom Line

CEH is a credential that works best as a compliance checkbox and career entry point, not as a demonstration of offensive security mastery. If DoD 8570 is in your career path, or if your employer is funding it, pursue it without hesitation. If you're self-funding and targeting private-sector pen testing, the $795 you'd save by choosing PenTest+ — or the additional $300 you'd spend to get OSCP instead — will serve your career better.

The most honest framing: CEH is a credential that gets you into rooms. What you do once you're in those rooms depends on skills the exam doesn't test. Build both.

Wondering if CEH is right for you?

Take a free behavioral assessment to discover which certifications align with your natural strengths and career goals.

Start free assessment