CEH

EC-CouncilMidDoD 8570

Exam fee

$1199

Exam code

312-50

Renewal

3yr

Certification intelligence synthesized from exam data, employer demand signals, and community feedback using the DecipherU Methodology, designed by Julian Calvo, Ed.D.

CEH (Certified Ethical Hacker) — Honest Certification Intelligence

This analysis was produced using the DecipherU Methodology, designed by Julian Calvo, Ed.D. (Learning Sciences). It cross-references real-time labor market data from the Bureau of Labor Statistics, threat intelligence frameworks from MITRE ATT&CK, occupational skill profiles from ONET, and community response data from cybersecurity professionals currently in these roles.*


Is the CEH Worth Your $1,199?

Let's start with the number that matters: $1,199 for an exam that no employer actually requires.

That's the uncomfortable truth about the CEH. It's one of the most recognized names in offensive security, and simultaneously one of the most criticized certifications among practitioners who actually do penetration testing for a living. The gap between those two facts is where you need to make your decision.

Here's the ROI math. If the CEH gets you into a DoD-adjacent role or a federal contractor position that requires DoD 8570 compliance, the return is real. Those roles pay $85,000 to $115,000 depending on clearance level and location, and the CEH satisfies the IAT Level II and IAM Level II requirements under 8570. If you're targeting that specific market, $1,199 is a reasonable investment.

If you're targeting commercial pen testing, red teaming, or offensive security at a private firm, the CEH's ROI gets harder to defend. The OSCP (Offensive Security Certified Professional) at $1,499 is more respected in those circles, more technically demanding, and more likely to get you past a hiring manager who has actually done offensive work. The $300 price difference is irrelevant compared to the credibility difference.

The honest version: the CEH is a credential that looks good on paper to people who don't do pen testing, and looks mediocre to people who do. Whether that's a problem depends entirely on who's reading your resume.


Who Should Get the CEH (and Who Should Skip It)

Get the CEH if:

You're targeting federal government work, DoD contracts, or cleared positions. The 8570 approval is real, and many federal HR systems are built around that framework. A hiring manager at a defense contractor may not know what OSCP stands for, but they know their compliance checklist, and CEH is on it.

You're in a GRC or security management role and need offensive security credibility without becoming a full-time pen tester. The CEH's breadth-over-depth approach actually fits this use case. You'll understand enough about attack techniques to have informed conversations with red teams and write better security policies.

You're outside the US. The CEH has stronger brand recognition internationally than most US practitioners realize. In the Middle East, Southeast Asia, and parts of Latin America, the CEH is often the first offensive security cert that enterprise hiring managers recognize by name. If you're in those markets, the credential signal is stronger than the US community's skepticism would suggest.

You need a DoD 8570 qualifier and you're not ready for OSCP. The CEH is a multiple-choice exam. OSCP is a 24-hour hands-on practical. If you're six months into your security career and need to check a compliance box for a government contractor role, CEH is the more accessible path right now.

Skip the CEH if:

You want to work at a serious offensive security firm, a mature red team, or any shop where the hiring manager has an OSCP, GPEN, or CRTO. In those environments, the CEH is a yellow flag, not a green one. It signals you studied for a multiple-choice exam rather than building hands-on skills.

You're entry-level and trying to break in. The CEH assumes you have five years of IT experience (though EC-Council will waive this if you take their official training). If you're still building foundational skills, Security+ and then CySA+ will serve you better and cost you $800 less.

You're choosing between CEH and OSCP and you have the technical foundation for OSCP. The market has spoken clearly on this one. OSCP wins in commercial offensive security, consistently.


What the Exam Actually Tests

The 312-50 exam is 125 multiple-choice questions over four hours. That format tells you something important about what EC-Council is measuring.

The exam tests recognition, not execution. You'll need to know what a specific attack technique is called, which phase of the ethical hacking methodology it belongs to, and which tool is commonly associated with it. You won't need to actually run the tool, interpret its output under pressure, or pivot through a network.

Topics that show up heavily based on community reports from recent test-takers:

The five phases of ethical hacking (reconnaissance, scanning, gaining access, maintaining access, covering tracks) are foundational to the exam's structure. Questions are often framed around which phase a given action belongs to.

Footprinting and reconnaissance get significant coverage. Expect questions on passive OSINT techniques, DNS enumeration, Google dorking, and tools like Maltego and Shodan.

Network scanning and enumeration: Nmap syntax, banner grabbing, OS fingerprinting. The exam expects you to recognize what specific Nmap flags do, not just that Nmap exists.

Web application attacks: SQL injection, XSS, CSRF, and the OWASP Top 10 show up consistently. The depth here is conceptual rather than technical.

Cryptography fundamentals: symmetric vs. asymmetric, common algorithms, PKI basics. This section trips up people who skipped it in their study plan.

Social engineering: phishing types, pretexting, physical security. The CEH treats this as a legitimate attack vector, which it is.

Malware types and their behaviors: ransomware, trojans, rootkits, fileless malware. Expect definitional questions rather than analysis questions.

What the exam doesn't test well: actual tool proficiency, real-world attack chains, post-exploitation, Active Directory attacks, or anything resembling a realistic engagement. If you've spent time in a home lab running BloodHound against a vulnerable AD environment or chaining exploits in HackTheBox, that knowledge helps, but the exam won't directly reward it the way OSCP does.

The passing score is 70%, though EC-Council uses a scaled scoring system that adjusts based on exam version. Most test-takers report the exam is passable with 60 to 80 hours of focused preparation if you already have a networking and security foundation.


The Efficient Study Path

Don't buy EC-Council's official courseware unless your employer is paying for it. The official training runs $850 to $1,500 on top of the exam fee, and the community consensus is that it's not worth the premium for self-studiers.

Phase 1: Foundation Check (1-2 weeks)

Before you spend money on CEH prep, confirm you have solid networking fundamentals. You should be comfortable with TCP/IP, subnetting, common protocols (HTTP, DNS, SMTP, FTP, SMB), and basic Linux command line. If those feel shaky, spend two weeks on Professor Messer's free CompTIA Network+ materials first. The CEH exam assumes this knowledge and won't teach it to you.

Phase 2: Core Study (4-6 weeks)

Matt Walker's "CEH Certified Ethical Hacker All-in-One Exam Guide" (McGraw-Hill) is the community's top recommendation for self-study. It covers the exam domains without the bloat of official EC-Council materials. Budget $40 to $60 for the book.

Supplement with Darril Gibson's practice questions or the Boson CEH practice exam set. Boson's questions are harder than the actual exam, which is exactly what you want. If you're consistently scoring 75%+ on Boson, you're ready.

Phase 3: Hands-On Reinforcement (ongoing, parallel to Phase 2)

The exam doesn't require hands-on skills, but building them makes the conceptual material stick faster. TryHackMe has a structured "Jr Penetration Tester" learning path that covers most of the CEH's technical domains in a practical environment. It costs $14/month. Spend 30 minutes a day on labs while you're reading Walker's book.

HackTheBox's "Starting Point" machines are free and give you exposure to real attack chains. Even if the exam won't test this directly, understanding what SQL injection actually looks like in practice makes the multiple-choice questions trivial.

Phase 4: Exam Simulation (1-2 weeks before exam)

Run full 125-question timed practice exams. Identify your weak domains and go back to Walker's chapters on those specific areas. Don't memorize questions. Understand why the correct answer is correct and why the distractors are wrong. EC-Council changes question wording frequently enough that memorization fails.

Total realistic timeline: 8 to 12 weeks for someone with a networking background. 16 to 20 weeks for someone coming from a non-technical background.

Total realistic cost (self-study path): $1,199 exam + $50 book + $28 TryHackMe (two months) = $1,277. That's the honest number.


CEH vs. the Alternatives

CEH vs. CompTIA PenTest+ ($404)

PenTest+ is cheaper by $795 and covers similar conceptual ground. It's also DoD 8570 approved (CSSP Analyst category). If your primary goal is a compliance checkbox for a government or contractor role, PenTest+ gets you there for a third of the price.

The tradeoff: CEH has stronger brand recognition, particularly with non-technical hiring managers and in international markets. PenTest+ is newer and less established in those environments. If you're applying to roles where the hiring manager knows what they're looking at, PenTest+ is the smarter financial choice. If you're applying to roles where name recognition matters more than technical depth, CEH has the edge.

CEH vs. CompTIA CySA+ ($404)

These aren't really competing for the same role. CySA+ is a defensive cert focused on threat detection, SOC analysis, and incident response. CEH is offensive-focused. If you're not sure whether you want to go offensive or defensive, CySA+ is the lower-risk investment. It's cheaper, more broadly applicable, and the skills transfer well into SOC analyst, threat intel, and IR roles. CEH is a more specialized bet.

CEH vs. OSCP ($1,499)

This is the real comparison for anyone serious about offensive security.

OSCP requires you to compromise machines. Plural. Under time pressure. With no multiple-choice safety net. Passing OSCP means you demonstrated you can actually do the work. Passing CEH means you demonstrated you can identify the correct answer from four options.

In commercial pen testing, OSCP wins. Consistently. Hiring managers at serious offensive security firms treat OSCP as a meaningful signal and CEH as a nice-to-have at best.

The catch: OSCP is genuinely hard. The PWK course and lab access require real preparation, and the 24-hour exam has a meaningful failure rate. If you're not ready for OSCP, CEH is not a bad stepping stone, as long as you're honest with yourself that it's a stepping stone and not a destination.

The honest recommendation: If you have a specific DoD or federal contractor role in mind and CEH satisfies the 8570 requirement, get the CEH. If you're building toward commercial offensive security, skip CEH and invest that $1,199 toward OSCP prep and the exam fee. If you're budget-constrained and need an offensive security credential, PenTest+ at $404 covers more ground per dollar.


What Changes After You Pass

The CEH will not transform your career overnight. That's not cynicism; it's calibration.

What it does: it gets you past automated resume filters at federal contractors and government agencies that screen for 8570-compliant certifications. That's a real and specific benefit. CyberSeek data shows that cleared cybersecurity roles pay a 15 to 25% premium over equivalent non-cleared positions. If the CEH is your entry point into that market, the long-term return is meaningful.

It also gives you a structured vocabulary for offensive security concepts. After studying for the CEH, you'll be able to discuss attack phases, common TTPs, and tool categories with enough fluency to hold your own in conversations with red teamers. That matters in GRC roles, security architecture, and management positions where you need to understand offensive work without doing it yourself.

What it doesn't do: it won't get you a pen testing job at a firm that runs actual engagements. Those hiring managers want to see OSCP, GPEN, CRTO, or evidence of real work: CTF rankings, HackTheBox Pro Hacker status, a GitHub full of custom tooling, or a portfolio of write-ups. The CEH doesn't substitute for any of that.

Salary impact is hard to isolate because the CEH is rarely the deciding factor in an offer. In federal and contractor roles where it satisfies a compliance requirement, it can be the difference between qualifying for a role and not qualifying. In those cases, the salary impact is the entire salary of the role, which is significant. In commercial roles, the impact is minimal on its own.

Outside the US, particularly in the Gulf Cooperation Council countries, India, and Southeast Asia, the CEH carries more weight than it does in North America. Professionals in those markets report that the CEH is often a hiring requirement at local firms and multinationals operating in the region, which changes the ROI calculation considerably.


Keeping It Current

The CEH renews every three years through EC-Council's ECE (EC-Council Continuing Education) program. You need 120 ECE credits over the three-year cycle to maintain the credential.

ECE credits come from activities like attending security conferences, completing EC-Council courses, publishing research, or participating in CTF competitions. The credit requirements are achievable if you're actively working in security. If you've left the field or gone into management, accumulating 120 credits over three years requires intentional effort.

The renewal fee is $80 per year ($240 over the three-year cycle), bringing your total cost of ownership to roughly $1,517 for the first three years.

Whether it's worth maintaining depends on your career trajectory. If you're in a DoD-adjacent role where 8570 compliance is ongoing, yes, maintain it. If you've moved into commercial offensive security and passed OSCP, the CEH becomes less relevant and the $240 renewal cost is better spent on a new certification or lab subscription.

One practical note: EC-Council has faced criticism over the years for aggressive upselling of their training products during the renewal process. You don't need to buy their courses to earn ECE credits. Free options include SANS webcasts, BSides conference attendance, and documented CTF participation. Know your options before you engage with their renewal portal.


The Bottom Line

The CEH is a legitimate credential with a specific use case: DoD 8570 compliance and international markets where EC-Council's brand recognition is strong. In those contexts, $1,199 is a defensible investment.

In every other context, the money works harder elsewhere. PenTest+ covers similar ground for $795 less. OSCP carries more weight in commercial offensive security for $300 more. CySA+ opens more doors if you're not committed to the offensive path.

The certification community's frustration with the CEH isn't that it's a bad exam. It's that it's priced like a premium credential while delivering a multiple-choice assessment of conceptual knowledge. That gap is real, and you deserve to know about it before you hand over $1,199.

If the CEH fits your specific situation, get it and prepare efficiently. If it doesn't, the alternatives are better. The decision is yours to make with accurate information, not vendor marketing.

Wondering if CEH is right for you?

Take a free behavioral assessment to discover which certifications align with your natural strengths and career goals.

CEH Guide: Is It Worth It? Cost, ROI, Study Path | DecipherU | DecipherU