EC-Council Certified Ethical Hacker (CEH) v13

Attain the world’s number 1 credential in ethical hacking!

$1,699 - $2,499
Exam & certification included

What you'll learn

Understand the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
Learn how attackers exploit networks, systems, web applications, wireless environments, and cloud platforms
Learn the methodologies, tools, and techniques used by ethical hackers to identify and mitigate cybersecurity threats
Apply AI-powered techniques to automate threat detection, analysis, and defensive security operations

Description

ec council ceh min

EC-Council Certified Ethical Hacker (CEH) v13

$1,699

Attain the world’s number 1 credential in ethical hacking!

From the creators of Certified Ethical Hacker (CEH) comes the new and evolved version 13 with added AI capabilities. Structured across 20 learning modules covering over 550 attack techniques and 221 hands-on labs, CEH provides you with the core knowledge you need to thrive as a cybersecurity professional.

The CEH v13 training program prepares cybersecurity professionals to think and operate like attackers – legally and ethically – in order to better defend organizations against modern cyber threats.

What is Certified Ethical Hacking?

Ethical hacking is the authorized practice of testing systems, networks, and applications to identify vulnerabilities before malicious attackers can exploit them.

The CEH framework teaches professionals how cyber attackers operate – including reconnaissance, exploitation, persistence, and evasion techniques – while emphasizing defensive strategies and risk reduction.

The following references for this course are also available:

The CEH curriculum covers modern attack surfaces including:

  • Enterprise networks and operating systems
  • Web servers and web applications
  • Wireless and mobile platforms
  • Cloud and IoT environments
  • Malware and advanced persistent threats
  • AI-driven attacks and defenses

The course follows a structured ethical hacking methodology aligned with industry frameworks such as MITRE ATT&CK and modern incident response practices.

Why Should You Attend?

CEH is one of the world’s most recognized ethical hacking certifications and has been trusted by governments, enterprises, and security professionals for over 20 years. The latest version integrates Artificial Intelligence (AI) throughout the ethical hacking lifecycle, enabling students to automate analysis, identify advanced threats faster, and secure emerging technologies.

Through structured instruction, hands-on labs, and real-world attack simulations, learners gain practical skills required to assess vulnerabilities, exploit weaknesses responsibly, and implement effective countermeasures across enterprise environments.

Cyber threats continue to evolve rapidly, with attackers increasingly leveraging automation and AI to bypass traditional defenses. Organizations need professionals who understand attacker methodologies and can proactively identify weaknesses.

The CEH program equips learners with:

  • Practical penetration testing and vulnerability assessment skills
  • AI-enhanced cybersecurity capabilities
  • Real-world attack simulation experience
  • Knowledge aligned with government and enterprise security frameworks
  • Skills applicable across more than 45 cybersecurity job roles CEH v13 Brochure

According to CEH program data:

  • 97% of professionals reported improved ability to safeguard their organizations
  • 92% of hiring managers prefer candidates with CEH certification
  • CEH remains one of the most globally recognized ethical hacking credentials

Educational Approach

This training combines theory, demonstrations, and extensive hands-on practice:

  • Structured learning across 20 comprehensive modules
  • Real-world attack scenarios and guided exercises
  • Cloud-based cyber range with live targets and vulnerable systems
  • Exposure to 4,000+ commercial-grade security and hacking tools
  • Over 221 hands-on labs covering modern attack techniques
  • AI-assisted ethical hacking workflows integrated throughout the course CEH v13 Brochure

Students apply skills through simulated ethical hacking engagements designed to mirror real enterprise environments.

Prerequisites

Participants should have:

  • Basic understanding of networking and operating systems
  • Foundational cybersecurity knowledge
  • Familiarity with information security concepts is recommended but not required

Examination

The CEH certification includes two exam options:

CEH Knowledge-Based Exam

  • 4-hour exam
  • 125 multiple-choice questions
  • Covers threats, methodologies, attack vectors, and defensive strategies

CEH Practical Exam (Optional – CEH Master Path)

  • 6-hour hands-on practical assessment
  • Real-world cyber range challenges
  • Demonstrates applied ethical hacking skills

Both exams are accredited under ANAB ISO/IEC 17024 and approved under U.S. DoD workforce requirements.

Certification

After passing the certification exam(s), candidates earn:

  • Certified Ethical Hacker (CEH) credential
  • Optional CEH Master designation after completing both knowledge and practical exams

The certification validates competency in ethical hacking methodologies, vulnerability analysis, exploitation techniques, and cybersecurity defense practices.

CEH certifications are recognized across numerous Department of Defense Cyber Workforce Framework (DCWF) roles, including:

  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Incident Responder
  • Digital Forensics Analyst
  • Information Systems Security Manager
  • Cyber Crime Investigator

Training Access & Included Materials

iLearn (Self-Paced) Format

Students enrolled in the iLearn format receive:

  • One year of access to self-paced training videos
  • Six months of access to the iLabs hands-on lab environment
  • One certification exam voucher valid for one year

MasterClass Online (Live Instructor-Led) Format

Students enrolled in the MasterClass Online format receive:

  • Live instructor-led training delivered in a one-week schedule
  • Six months of access to the iLabs hands-on lab environment
  • One certification exam voucher valid for one year

Audience

Security analysts and penetration testers
System and network administrators
Cybersecurity engineers and consultants
Incident responders and SOC personnel
Government and defense contractors
IT professionals transitioning into cybersecurity roles

Curriculum

117 lesson
Introduction to Ethical Hacking
Information Security Overview
Hacking Concepts
Ethical Hacking Concepts
Hacking Methodologies and Frameworks
Information Security Controls
Information Security Laws and Standards
Footprinting and Reconnaissance
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Internet Research Services
Footprinting through Social Networking Sites
Whois Footprinting
DNS Footprinting
Network and Email Footprinting
Footprinting through Social Engineering
Footprinting Tasks using Advanced Tools and AI
Footprinting Countermeasures
Scanning Networks
Network Scanning Concepts
Scanning Tools
Host Discovery
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Scanning Beyond IDS and Firewall
Network Scanning Countermeasures
Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Assessment Tools
Vulnerability Assessment Reports
System Hacking
Gaining Access
Escalating Privileges
Maintaining Access
Clearing Logs
Malware Threats
Malware Concepts
APT Concepts
Trojan Concepts
Virus and Worm Concepts
Fileless Malware Concepts
AI-based Malware Concepts
Malware Analysis
Malware Countermeasures
Anti-Malware Software
Sniffing
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Sniffing Countermeasures
Social Engineering
Social Engineering Concepts
Human-based Social Engineering Techniques
Computer-based Social Engineering Techniques
Mobile-based Social Engineering Techniques
Social Engineering Countermeasures
Denial-of-Service
DoS/DDoS Concepts
Botnets
DDoS Case Study
DoS/DDoS Attack Techniques
DoS/DDoS Attack Countermeasures
Session Hijacking
Hijacking Concepts
Application-Level Session Hijacking
Network-Level Session Hijacking
Session Hijacking Tools
Session Hijacking Countermeasures
Evading IDS, Firewalls, and Honeypots
IDS, IPS, and Firewall Concepts
IDS, IPS, and Firewall Solutions
Evading IDS/Firewalls
Evading NAC and Endpoint Security
IDS/Firewall Evading Tools
Honeypot Concepts
IDS/Firewall Evasion Countermeasures
Hacking Web Servers
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Countermeasures
Patch Management
Hacking Web Applications
Web Application Concepts
Web Application Threats
Web Application Hacking Methodology
Web API and Webhooks
Web Application Security
SQL Injection
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
Evasion Techniques
SQL Injection Countermeasures
Hacking Wireless Networks
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Attack Countermeasures
Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Device Management
Mobile Security Guidelines and Tools
IoT and OT Hacking
IoT Hacking
OT Hacking
Cloud Computing
Cloud Computing Concepts
Container Technology
Serverless Computing
Cloud Computing Threats
Cloud Hacking
AWS Hacking
Microsoft Azure Hacking
Google Cloud Hacking
Container Hacking
Cloud Security
Cryptography
Cryptography Concepts and Encryption Algorithms
Applications of Cryptography
Cryptanalysis
Cryptography Attack Countermeasures

Review My Order

0

Subtotal