Are you ready to think like a hacker — and defend like a pro?
The EC-Council Certified Ethical Hacker (CEH) v13 program is your gateway into the world of ethical hacking and offensive security. This intensive 5-day training is designed to equip cybersecurity professionals with the skills and mindset of malicious hackers — while teaching how to apply those techniques ethically, legally, and effectively.
CEH v13 is packed with 220+ hands-on labs, 3,500 advanced hacking tools, and a fully revamped syllabus aligned with today’s threat landscape. Learners will dive deep into malware analysis, network scanning, system and web app attacks, and much more — all in a real-world, performance-based environment.
Ideal
for IT professionals, network admins, security officers,
and anyone responsible for system integrity, this
certification empowers you to anticipate threats,
respond swiftly to incidents, and safeguard digital
assets with confidence.
Take your cybersecurity career to the next level —
master the hacker’s playbook, and outsmart
cybercriminals from the inside out.
This depends on the exam. Some of our exams state the exact passing score as a percentage required. Some of our exams' passing scores are based on the knowledge and skills needed to demonstrate competence in the subject matter and the difficulty of the questions that are delivered to a candidate.
The actual cut score (the number of items you need to answer correctly) is based on input from a group of subject-matter experts who review the diffculty of the questions in relation to the expected skills of the target audience. As a result, the number of items that you have to answer correctly varies depending on the difficulty of the questions delivered when you take the exam. This ensures that regardless of which combination of items you see, the evaluation of skills is fair. If you see a more difficult set of questions, the number of correct answers needed to pass is less than if you see an easier set of questions. As a result, providing a simple percent correct wouldn't provide useful information to someone who had to take the exam multiple times and saw different combinations of questions with different levels of difficulty.
Because the number of correct answers needed to pass varies based on the difficulty of the questions delivered, if you see a difficult combination of questions, your performance may actually be higher in relation to the passing standard even though you answered fewer questions (in other words, a lower percentage) correctly than if you saw an easier set of questions. Scaled scores simplify your ability to evaluate improvements in your performance over time. This is a standard practice across the certification and licensure industry.
Information Security Overview
Hacking Concepts
Ethical Hacking Concepts
Hacking Methodologies and Frameworks
Information Security Controls
Information Security Laws and Standards
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Internet Research Services
Footprinting through Social Networking Sites
Who is Footprinting
DNS Footprinting
Network and Email Footprinting
Footprinting through Social Engineering
Footprinting Tasks using Advanced Tools and AI
Port and Service Discovery
OS Discovery (Banner Grabbing/OS Fingerprinting)
Network Scanning Countermeasures
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP and NFS Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Vulnerability Assessment Concepts
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Gaining Access
Gaining Access
Maintaining Access
Clearing Logs
Malware Concepts
APT Concepts
Trojan Concepts
Virus and Worm Concepts
Fileless Malware Concepts
Malware Analysis
Malware Countermeasures
Anti-Malware Software
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Sniffing Countermeasures
Social Engineering Concepts
Human-based Social Engineering Techniques
Computer-based Social Engineering Techniques
Mobile-based Social Engineering Techniques
Social Engineering Countermeasures
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
DoS/DDoS Attack Countermeasures
Session Hijacking Concepts
Application-Level Session Hijacking
Network-Level Session Hijacking
Session Hijacking Tools
Session Hijacking Countermeasures
IDS, IPS, and Firewall Concepts
IDS, IPS, and Firewall Solutions
Evading IDS/Firewalls
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Tools
Web Server Attack Countermeasures
Patch Management
Web Application Concepts
Web Application Attacks
Web Application Hacking Methodology
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
Evasion Techniques
SQL Injection Countermeasures
Wireless Concepts
Wireless Threats
Wireless Hacking Methodology
Wireless Attack Countermeasures
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Device Management
Mobile Security Guidelines and Tools
IoT Hacking
OT Hacking
Cloud Computing Concepts
Container Technology
Serverless Computing
Cloud Computing Threats
Cloud Attacks
Cloud Hacking
AWS Hacking
Microsoft Azure Hacking
Google Cloud Hacking
Container Hacking
Cloud Security
Cryptography Concepts and Encryption Algorithms
Cryptography Tools
Applications of Cryptography
Cryptanalysis
Cryptanalysis Tools
Cryptography Attack Countermeasures
Upon successfully passing the examination for this course, participants will be awarded a certificate, an example of which is shown below.