Skip links

Certified Ethical Hacker (CEH v13)

Certified Ethical Hacker (CEH v13)

Introduction to the CEH v13 Certified Ethical Hacker (CEH) is the pioneering certification in ethical piracy, created by the EC-Council. Recognized worldwide, it is the standard of reference for all professionals wishing to learn to think like a hacker... in order to better defend computer systems. The latest version v13 introduces a revolutionary dimension [...]

Table of Contents

Introduction to the CEH v13

The Certified Ethical Hacker (CEH) is the pioneering certification in ethical hacking, created by theEC-Council. Recognized worldwide, it is the standard of reference for all professionals wishing to learn to think like a hacker... in order to better defend computer systems.

The version v13, the most recent, introduces a revolutionary dimension :artificial intelligence applied to offensive ethicsproviding learners with the most current and relevant cybersecurity skills.

Why choose CEH v13?

  • International Recognition
    Valid in more than 140 countries, CEH is required by many companies and governments for offensive security roles.
  • Directly operational competencies
    Thanks to its 221 practical laboratories, the programme plunges participants into realistic scenarios of attacks and defence.
  • In-depth and structured learning
    20 modules covering the whole lifecycle of a cyberattack, from recognition to post-operation.
  • New: Integration of artificial intelligence
    Learn how to use AI to detect threats, automate information gathering, bypass defenses and better protect complex environments.
  • A springboard for your career
    The CEH certification paves the way for post sloper, Cybersecurity consultant, SOC analyst, Security auditor, etc.

Educational content of CEH v13

The programme is designed in a modular way for a gradual increase in competence. Here is an overview of the 20 main modules:

  1. Introduction to Ethical Piracy
    Fundamentals of ethics, legal framework, hacking methodology.
  2. Recognition and collection of information
    OSINT techniques, footprinting, Google hacking, active/passive recognition.
  3. Network Scan
    Nmap, port recognition, network vulnerability scan.
  4. List
    Extraction of information on hosts and services.
  5. Vulnerability analysis
    Automatic Scanners, CVE, Vulnerability Management.
  6. Piracy of systems
    Techniques of compromise, escalation of privileges, backdoors.
  7. Malwares : Trojan horses, virus, worms
    Operation, infection, countermeasures.
  8. Network Sniffering
    Package interception, MITM, ARP poisoning.
  9. Social engineering
    Phishing, phone attack, human exploitation.
  10. Denial of Service (DoS and DDoS)
    Saturation attacks, protocol attacks.
  11. Session Hijacking
    Diversion of user sessions, tokens, cookies.
  12. Avoiding defenses
    IDS escape techniques, firewalls and antivirus.
  13. Web server hijacking
    HTTP vulnerabilities, Apache/IIS/Nginx operation.
  14. Attacks on web applications
    SQLi, XSS, CSRF, Directory Traversal.
  15. Deep SQL Injection
    Dump of databases, bypass authentication.
  16. Wireless network security
    WPA/WPA2 cracking, Evil Twin, attacks on AP.
  17. Mobile Hacking
    Android/iOS: reverse engineering, software flaws.
  18. Cloud Hacking
    Cloud-specific vulnerabilities, Shadow IT.
  19. Cryptography
    Symmetrical and asymmetric encryption, attacks on SSL/TLS.
  20. Use of AI in ethical hacking
    Use of AI to automate attacks and defense.

Practical laboratories (Labs)

The CEH v13 includes 221 practical exercises to implement techniques learned in secure environments.

  • Virtual network of vulnerable machines
  • Simulated Business Attack Scenarios
  • Access to the Cyber Range EC-Council with monthly challenges

CEH vs Hacker Malveillant: same method, opposite purpose

Jurisdiction

Hacker Ethics

Malveliant Hacker

Recognition

Operation

Privilege climb

Ethics

Legal framework

Objective

Protect

Nure

Gamification & Leaderboard

  • Participation in Monthly global competitions
  • Classifications for the best scores on labs
  • CTF challenges with automatic notation

Move to CEH Master

Once the CEH certification is obtained, it is possible to continue with the CEH Practical, a 100% review based on a virtual environment, placing you in the skin of an ethical hacker. Obtaining both titles (CEH + Practical) grants you the prestigious title of CEH Master.

Professional opportunities and average wages

Post

Average annual wage (overall)

Ethical Hacker

$95,000

Penetration Testing

$110,000

SOC Analyst

$85,000

Security auditor

$100,000

Cybersecurity consultant

$120,000+

Whose address is this?

  • Cybersecurity professionals
  • System/network administrators
  • IT auditors
  • SOC Analysts
  • Computer Security Students
  • Anyone passionate about offensive cybersecurity

Tools used in training

  • Nmap
  • Metasploit
  • Burp Suite
  • Wireshark
  • John the Ripper
  • Aircrack-ng
  • Nikto
  • OpenVAS
  • ...and more 300 ethical hacking tools

Educational methodology

  • Theory + practice each module
  • Official EC-Council support
  • Evaluation tests at each stage
  • CEH final examination (125 questions, 4 hours)

Information on the examination

  • Format: MCQ
  • Number of questions: 125
  • Duration: 4 hours
  • Language: English (translations available)
  • Score required: Variable (60%-85% depending on the exam version)

How to train at the CEH?

Several formats available according to your pace and preferences:

  • Online training at your own pace (iLearn)
  • Online online training (iWeek)
  • Training in enterprises or approved centres
  • Self-training with official resources

Registration and contact

You can take the CEH training with a EC-Council Official Partner Centre, as SecureValley

Table of Contents

Get certified with industry-leading cybersecurity certifications from EC-Council, PECB, Palo Alto Networks, and more.

This website uses cookies to improve your web experience.
EnglishenEnglishEnglish
0