Certified Ethical Hacker (CEH) v13 with Exam (312-50)

Master the art of ethical hacking with the Certified Ethical Hacker (CEH) v13, designed for cybersecurity professionals to stay ahead with cutting-edge techniques, tools, and AI integration.

Course Thumbnail

Essential Skills Gained

Checkmark

Understand ethical hacking phases and preventative countermeasures.

Checkmark

Implement skills to think like hackers for improved security infrastructure.

Checkmark

Design real-world ethical hacking solutions in consequence-free environments.

Checkmark

Execute comprehensive vulnerability assessments and penetration tests.

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • Cybersecurity Professionals
  • Network Administrators
  • Security Analysts
  • IT Managers

Description

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v13 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”  CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.   CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.   In its 13th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.  The CEH v13 program immerses you in real-world ethical hacking through the dynamic CEH practice environment. With CEH Engage, you’ll sharpen your skills and prove you have what it takes to thrive as an ethical hacker. New to CEH v13, learners will embark on their first emulated ethical hacking engagement. This four-phase engagement requires students to think critically and test the knowledge and skills gained by capturing a series of flags in each phase. It demonstrates the live application of skills and abilities in a consequence-free environment through EC-Council’s new “Cyber Range.” As you complete your training and labs, CEH Engage empowers you to put theory into practice through a mock hacking engagement. You’ll navigate a real-world, four-part engagement, targeting an emulated organization. Using a capture-the-flag format, you’ll progress by answering critical “flag” questions, gaining hands-on experience in a full-scale ethical hacking operation. This course includes one remote exam voucher for the CEH - Certified Ethical Hacker exam (312-50).

Calendar icon

Upcoming Course Dates

September 15-19, 2025

7:00 AM - 3:00 PM

Virtual: Online - America/Los_Angeles

Enroll

$3599

December 1-5, 2025

8:00 AM - 4:00 PM

Virtual: Online - America/Denver

Enroll

$3599

Course Outline

Download PDF

Module 01: Introduction to Ethical Hacking

  1. Fundamentals of information security

  2. Basics of ethical hacking

  3. Information security controls

  4. Relevant laws and procedures

Module 02: Footprinting and Reconnaissance

  1. Techniques and tools for footprinting

  2. Reconnaissance methods

Module 03: Scanning Networks

  1. Network scanning techniques

  2. Countermeasures

Module 04: Enumeration

  1. Enumeration techniques

  2. BGP and NFS exploits

  3. Countermeasures

Module 05: Vulnerability Analysis

  1. Identifying security loopholes

  2. Vulnerability assessment tools

Module 06: System Hacking

  1. System hacking methodologies

  2. Steganography and steganalysis attacks

Module 07: Malware Threats

  1. Types of malware

  2. Malware analysis procedures

  3. Countermeasures

Module 08: Sniffing

  1. Packet sniffing techniques

  2. Defenses against sniffing

Module 09: Social Engineering

  1. Social engineering concepts

  2. Identification of theft attempts

Module 10: Denial-of-Service

  1. DoS and DDoS attack techniques

  2. Countermeasures and protections

Module 11: Session Hijacking

  1. Session hijacking techniques

  2. Network session management vulnerabilities

Module 12: Evading IDS, Firewalls, and Honeypots

  1. Evasion techniques

  2. Tools for auditing network perimeters

Module 13: Hacking Web Servers

  1. Web server attack methodologies

Module 14: Hacking Web Applications

  1. Web application hacking methodologies

Module 15: SQL Injection

  1. SQL injection techniques

  2. Countermeasures

Module 16: Hacking Wireless Networks

  1. Wireless network vulnerabilities

  2. Security tools and countermeasures

Module 17: Hacking Mobile Platforms

  1. Mobile platform attack vectors

  2. Mobile security guidelines

Module 18: IoT Hacking

  1. IoT attack methodologies

  2. Countermeasures

Module 19: Cloud Computing

  1. Cloud computing threats and attacks

  2. Security techniques and tools

Module 20: Cryptography

  1. Encryption algorithms

  2. Cryptography attacks

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.