Ec-council | Learning
Certified Ethical Hacker (CEH) v13

Master ethical hacking with the CEH program: identify attacks and flaws to secure your systems and obtain certification.
About the course Certified Ethical Hacker (CEH)
Course outline
Course outline
20 modules that will help you master the basics of ethical hacking and prepare you to take the CEH certification exam.
Module 1: Introduction to Ethical hacking
Module 2: Information collection and recognition
Module 3: Network analysis
Module 4: List
Module 5: Vulnerability analysis
Module 6: Piracy of systems
Module 7: Malware threats
Module 8: Sniffing
Module 9: Social engineering
Module 10: Denial of service
Module 11: Diversion of session
Module 12: Escape of IDS, firewalls and honeypots
Module 13: Web Server Piracy
Module 14: Web application hijacking
Module 15: SQL Injection
Module 16: Piracy of wireless networks
Module 17: Piracy of mobile platforms
Module 18: IoT and OT piracy
Module 19: Cloud computing
Module 20: Cryptography
Objectives of the course
Objectives of the course
Students following the CEH training will learn the essential skills to detect vulnerabilities and secure computer systems through ethical hacking and cybersecurity methodologies.
Information security issues –
Key issues affecting the world of information security, piracy methodologies and frameworks, information security controls, and information security laws and standards.
Collection of information (Footprinting) +
Different types of information gathering, collection tools, and associated countermeasures.
Network scan techniques and enumeration +
- Network scan techniques and countermeasures for these scans.
- Enumeration techniques and enumeration countermeasures.
Vulnerability assessment and tools +
The different types of vulnerability assessment and the tools used for these assessments.
Piracy of malware and systems +
- System hacking methodology.
- The different types of malware (troyal horses, viruses, worms, etc.), advanced persistent attacks (APT) and fileless malware, malware analysis procedure and corresponding countermeasures.
Sniffering and social engineering +
- The various sniffing techniques and their countermeasures.
- Social engineering techniques, identity theft and countermeasures.
DoS/DDoS attacks and diversion of sessions +
- Denial-of-service attack techniques (DoS/DDoS), botnets, DDoS attack tools, and countermeasures against such attacks.
- Sessional diversion techniques and associated countermeasures.
Escape of safety systems +
Escape techniques of firewalls, IDS, IPS, honeypots, NAC and termination points, escape tools and countermeasures.
Web attacks and SQL injections +
- Different types of attacks against web servers, web applications and web APIs, hacking methodologies and tools, as well as corresponding countermeasures.
- SQL injection attacks, injection methodology, escape techniques and countermeasures against SQL injection.
Piracy of wireless networks +
Various types of wireless encryption, threats and methods of wireless piracy, tools of piracy and Wi-Fi security, as well as countermeasures.
Mobile security and IoT +
- The vector of attack on mobile platforms, hacking on Android and iOS, mobile device management, mobile security guidelines and security tools.
- Different types of attacks on IoT (Internet of Things) and OT (operational technologies), piracy methodologies and tools, as well as countermeasures.
Cloud security and cryptography +
- Various cloud computing technologies, cloud threats and attacks, hacking methodology (including for AWS, Microsoft Azure, Google Cloud and container piracy) and associated security techniques and tools.
- Different types of encryption algorithms, cryptographic tools, cryptographic applications, cryptographic attacks and cryptographic tools.
Ethical piracy led by AI +
Ethical hacking driven by artificial intelligence.
Review
Obtain CEH certification
In order to obtain the CEH certification, candidates must take a formal course prior to attempting the CEH examination. Once the exam is successful, they receive their CHE certificate and membership privileges.
After proving their expertise through the CEH certification, candidates can go further by trying the CEH (Practical) exam. This 6-hour practical exam was designed by experts in ethical hacking. It assesses candidates' skills and capabilities in a timed environment, covering key operating systems, databases and networks.
Candidates who obtain both CEH and CEH (Practice) certifications receive the title of CEH Master, attesting to their complete mastery of ethical hacking skills.
CEH (ANSI)
Title of examination : Certified Ethical Hacker (ANSI)
Review Code : 312-50 (ECC EXAM), 312-50 (VUE)
Number of questions : 125
Format of the review : Multiple choice
Duration 4 hours
Availability : ECC EXAM* / VIEW
- Local proctor for private and in-person courses.
- Remote Proctor live for the online ECC exam option.
CEH Master
CEH Master –
About Certified Ethical Hacker Master
To obtain the CEH Master certification, you must pass the CEH practical exam. The CEH practical exam was designed to provide students with the opportunity to prove that they are capable of implementing the principles taught in the CEH course. This practical examination requires you to demonstrate the application of ethical hacking techniques such as threat vector identification, network scan, operating system detection, vulnerability analysis, system hacking, and more.
The CEH practical examination does not involve simulations. On the contrary, you will be confronted with a real environment designed to mimic a business network through the use of virtual machines, networks and live applications.
Successfully navigating and successfully meeting the challenges presented in the CEH practical exam is the next step after obtaining Certified Ethical Hacker (CEH) certification. By passing both the CEH exam and the CEH practical exam, you will get the additional CEH Master certification.
CEH Master Certification Holders +
Demonstrate understanding of attack vectors
Perform a network scan to identify active and vulnerable machines in a network
Performing a recovery of banners from the operating system, as well as enumeration of services and users
Perform system hacking, steganography, stegalysis attacks and hide its traces
Identify and use viruses, computer worms and malware to exploit systems
Perform package analysis (sniffing)
Conduct various attacks on web servers and web applications, including directory browsing, parameter modification, XSS attacks, etc.
Perform SQL Injection Attacks
Perform different types of cryptographic attacks
Conduct a vulnerability analysis to identify security gaps in the target organization's network, communications infrastructure and end systems
About the Review +
Review Title: Certified Ethical Hacker (Practice)
Number of practical challenges: 20
Duration: 6 hours
Availability: Aspen – iLabs
Review Format: Cyber Range iLabs
Passing score: 70%
How to prepare for the CEH (Practice):
Although we strongly recommend that candidates take the HEC and pass the HEC exam, there is no pre-defined eligibility criteria for those wishing to take the HEC (Practice) exam.
Review Monitoring:
We know that moving to an examination centre can be difficult for many. We are pleased to announce that you can take the CEH (Practical) exam from the comfort of your home, but you must be ready to be monitored by a dedicated EC-Cuncil team under strict supervision.
The examination dashboard code is valid for 3 months from the date of receipt. If you need to extend the validity of the code, please contact practicals@eccouncil.org before the expiry date. Only valid/active codes can be extended. The examination must be scheduled at least 3 days before the desired date. Examination slots are subject to availability.
Validity of the review:
The industry's confidence in our certifications is very important to us. We believe it is our duty to ensure that the holders of this certification are experienced ethical hackers, capable of acting in the real world to solve concrete challenges. Thus, the CEH (Master) is conceived as a practical exam that will test the skills of the ethical hacker beyond mere knowledge. This examination, monitored and practical, can last up to 6 hours.
We know that moving to an examination centre can be difficult for many. We are pleased to announce that you can take the CEH (Practical) exam from the comfort of your home, but you must be ready to be monitored by a dedicated EC-Cuncil team under strict supervision.
New
What's up in CEHv13?
Created by Certified Ethical Hacker (CEH) comes the new and advanced version 13, with artificial intelligence capabilities. Structured into 20 learning modules covering over 550 attack techniques, CEH provides you with the essential knowledge you need to excel as a cybersecurity professional.
Powered by AI
The world's first ethical hacking certification that exploits the power of artificial intelligence.
Practical experience
Improve your skills in real-life scenarios through practical labs, where you exercise attack vectors and master advanced hacking tools.
Efficiency increased by 40 per cent
Learn AI-driven techniques to increase cyber defence efficiency by 40% and optimize your workflow.
Comprehensive and updated programme
Master the latest advanced attack techniques, trends and countermeasures.
Double productivity
Advanced threat detection, improved decision-making, adaptive learning, enhanced reporting and repetitive task automation.
Practical skills, proven mastery
Participate in monthly global hacking competitions, face your peers and reach the standings.
Roles
Professional roles
- Cyber Security Forensic Analyst
- Cyber Security Analyst
- CND Security Specialist
- CND Fusion Analyst
- Cyberspace Network Defense (CND) Technician
- Cyber Red Team Operator
- Cyber Network Defense (CND) Analyst
- Cyber Security Forensic Analyst
- Computer Network Defense Intrusion Analyst
- Cyber Security Engineer
- Information Security Engineer
- CND Cyber Analyst
- Network Security Engineer
- Cyber Threat Analyst
- SOC Security Analyst
- Information Security Analyst
- IT Security Compliance Specialist
- Global Security Assurance Analyst
- Security Analyst Tier 3
- Security Operations Analyst
- Security Incident Response Analyst
- Penetration Testing
- Vulnerability Analyst
- Sr. Security Threat Analyst
- Third 3 NSOC Analyst
- Security Information Insurance Analyst
- Technical Security Analyst
- Information Security Manager
- Risk and Remediation Manager
- Systems Administrator
- Cybersecurity Network Analyst
- Cyber Security Vulnerability Analyst
- Risk Assessment - Security Consultant
- Information Security Associate – Insider Threat Analyst
- Security Architect, Manager
- Application Security Analyst
- Cyber Security System Engineer
- Software Security Analyst
- Network Analyst
- Information System Security Officer
- SOC Security Analyst
- Cyber Security Engineer II
- Senior Cyber Security Monitoring Analyst
- Cyber Security Incident Response, Incident Analyst
- Cyber Security Incident Response Engineer
- L2 Security Analyst
- Senior Information Insurance/Security Specialist
- Technical Operations Network Engineer
- IT Security Administrator


