Certified Ethical Hacker (CEH) v13
Master cybersecurity skills to identify and remediate vulnerabilities, advance your IT career, and defend organizations against modern cyber threats through practical, hands-on training.
If you’re tasked with uncovering vulnerabilities before malicious hackers do, you need practical skills that work in real-world scenarios. The best hacking course equips you with the technical expertise to think like a hacker—and more importantly, to defend against them. By mastering the latest techniques in cybersecurity and ethical hacking, you’ll be able to identify weaknesses, assess risks, and implement effective countermeasures to protect organizational assets.
This course covers the comprehensive curriculum of the Certified Ethical Hacker (CEH) v13, an industry-standard certification. It dives into 21 detailed modules, including advanced reconnaissance, web application hacking, cloud security, IoT vulnerabilities, and AI-driven security tools. The training is aligned with current frameworks such as MITRE ATT&CK and the Cyber Kill Chain, ensuring your skills are directly applicable to modern cybersecurity environments. What sets this training apart is its hands-on approach—combining theoretical knowledge with practical labs that simulate real attack scenarios, from exploiting web servers to hacking cloud platforms like AWS and Azure.
What You Will Learn
This course is designed to give you the skills needed to identify, analyze, and remediate security vulnerabilities in a variety of environments. You will learn how to think like a hacker, using that insight to strengthen defenses. Here’s a snapshot of what you will master:
- Perform advanced footprinting and reconnaissance to gather intelligence on target systems effectively.
- Utilize scanning tools like Nmap and AI-enhanced scanners to identify open ports, services, and vulnerabilities.
- Conduct vulnerability assessments and exploit weaknesses using tools such as Metasploit and Hashcat.
- Execute system hacking techniques, including password cracking and privilege escalation.
- Implement social engineering tactics ethically to test organizational security awareness.
- Apply sniffing, spoofing, and man-in-the-middle attacks to evaluate network security.
- Identify and exploit common web application vulnerabilities, including OWASP Top 10 issues.
- Develop strategies for hacking wireless networks, mobile devices, and IoT devices.
- Assess cloud security risks and understand attack vectors in platforms like AWS and Azure.
- Understand cryptography principles and perform cryptanalysis to evaluate encryption strength.
- Leverage AI-powered cybersecurity tools to detect and respond to emerging threats.
Who This Course Is For
This training is tailored for IT and cybersecurity professionals who want to deepen their offensive security skills. Whether you’re just starting in cybersecurity or are an experienced security engineer, this course provides practical, hands-on knowledge. Ideal participants include cybersecurity analysts, penetration testers, security engineers, network administrators, and law enforcement personnel involved in cyber investigations. A basic understanding of networking and security concepts is recommended, but no prior hacking experience is required.
Why These Skills Matter
Acquiring skills in ethical hacking and cybersecurity fortifies your career against the rising tide of cyber threats. While this course does not lead directly to a certification, mastering these techniques makes you a vital asset within any security team. You will be able to identify vulnerabilities proactively, defend critical systems, and respond effectively to incidents. This practical expertise is in high demand across industries, opening pathways to roles such as security analyst, penetration tester, or red team operator. As cyber attacks grow more sophisticated, professionals with offensive security skills will be essential to organizational resilience and compliance.
Module 1: Information Security and Ethical Hacking Overview
- 1.0 Introduction to CEH v13
- 1.1 Elements of Security
- 1.2 Cyber Kill Chain
- 1.3 MITRE ATT&CK Framework
- 1.3.1 ACTIVITY – Examining MITRE ATT&CK
- 1.4 Hacking
- 1.5 Ethical Hacking
- 1.6 Information Assurance
- 1.7 Risk Management
- 1.8 Incident Management
- 1.9 Information Security Laws and Standards
- 1.10 Using AI in Ethical Hacking
- 1.11 Information Security and Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
- 2.1 Footprinting Concepts
- 2.2 OSINT Tools
- 2.2.1 ACTIVITY – Finding Internet-Connected Devices with Shodan
- 2.2.2 ACTIVITY – Performing OSINT with theHarvester
- 2.3 Advanced Google Search
- 2.3.1 ACTIVITY – Google Hacking
- 2.4 Whois Footprinting
- 2.4.1 ACTIVITY – Footprinting with WHOIS
- 2.5 DNS Footprinting
- 2.5.1 ACTIVITY – Enumerating DNS
- 2.6 Website Footprinting
- 2.7 Email Footprinting
- 2.8 Network Footprinting
- 2.8.1 ACTIVITY – Tracing a Network Path with Traceroute
- 2.9 Social Network Footprinting
- 2.10 Enhanced OSINT
- 2.11 Footprinting-and-Reconnaissance-Countermeasures
- 2.12 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
- 3.1 Scanning Concepts
- 3.2 Discovery Scans
- 3.3 Port Scans
- 3.4 Other Scan Types
- 3.5 Scanning Tools
- 3.6 NMAP
- 3.6.1 ACTIVITY – Port Scanning and Fingerprinting with NMAP
- 3.7 Firewall and IDS Evasion
- 3.8 Proxies
- 3.9 AI Enhanced SCANNING Tools
- 3.10 Scanning counter-measures
- 3.11 Scanning Networks Review
Module 4: Enumeration
- 4.1 Enumeration Overview
- 4.2 SMB_NetBIOS_Enumeration
- 4.3 File Transfer Enumeration
- 4.4 WMI Enumeration
- 4.5 SNMP Enumeration
- 4.6 LDAP Enumeration
- 4.7 DNS Enumeration
- 4.8 SMTP Enumeration
- 4.8.1 ACTIVITY – SMTP Enumeration
- 4.9 Remote Connection Enumeration
- 4.10 Website Enumeration
- 4.10.1 ACTIVITY – Enumerating Website Directories
- 4.11 Local User and Active Directory Enumeration
- 4.12 Other Enumeration Types
- 4.13 Enumeration Using AI
- 4.14 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
- 5.1 Vulnerability Scanning
- 5.1.1 ACTIVITY – Vulnerability Scanning with OpenVAS
- 5.2 Vulnerability Assessment
- 5.3 AI Assisted Vulnerability Assessment
- 5.4 Vulnerability Analysis Review
Module 6: System Hacking
- 6.1 System Hacking Concepts
- 6.2 Common Operating System Exploits
- 6.3 Buffer Overflows
- 6.4 System Hacking Tools and Frameworks
- 6.5 Metasploit
- 6.5.1 ACTIVITY – Hacking with Metasploit
- 6.6 Meterpreter
- 6.6.1 ACTIVITY – Having Fun with Meterpreter
- 6.7 Keylogging_and_Spyware-
- 6.8 Netcat
- 6.8.1 ACTIVITY – Using Netcat
- 6.9 Windows Exploitation
- 6.10 Windows Post- Exploitation
- 6.10.1 ACTIVITY – Windows Post Exploitation with Eternal Blue
- 6.10.2 ACTIVITY – Escalating Privilege with Token Passing
- 6.11 Linux Exploitation
- 6.11.1 ACTIVITY – Pwn a Linux Target from Start to Finish
- 6.12 Linux Post-Exploitation
- 6.13 Password Attacks
- 6.13.1 ACTIVITY – Pass-the-Hash
- 6.13.2 ACTIVITY – Password Spraying with Hydra
- 6.14 Linux Password Cracking
- 6.14.1 ACTIVITY – Password Cracking with Hashcat
- 6.14.2 ACTIVITY – Brute Forcing with Medusa
- 6.15 Additional Password Attacks
- 6.16 Attacking Network Services
- 6.16.1 ACTIVITY – Cracking Linux Passwords with John-the-Ripper
- 6.17 Other Methods for Obtaining Passwords
- 6.18 Network Service Attacks
- 6.19 Lateral Movement
- 6.19.1 ACTIVITY – Preparing to Pivot
- 6.19.2 ACTIVITY – Lateral Movement through Pivoting
- 6.20 Persistence
- 6.20.1 ACTIVITY – Creating a Persistent Netcat Back Door
- 6.20.2 ACTIVITY – APT Persistence
- 6.21 Hiding Data
- 6.21.1 ACTIVITY – Hiding Data with Steganography
- 6.22 Covering Tracks
- 6.22.1 ACTIVITY – Cover Tracks with Log Tampering
- 6.23 Side-Channel-Attacks
- 6.24 AI-Powered Vulnerability Exploitation Tools
- 6.25 System Hacking Countermeasures
- 6.26 System Hacking Review
Module 7: Malware Threats
- 7.1 Malware Overview
- 7.2 Viruses
- 7.3 Trojans
- 7.4 Rootkits
- 7.5 Other Malware
- 7.6 Advanced Malware Threats
- 7.7 Malware Makers
- 7.7.1 ACTIVITY – Creating a Malware Dropper and Handler
- 7.8 Malware Deployment
- 7.9 Malware Detection
- 7.10 Malware Analysis
- 7.10.1 ACTIVITY – Analyzing the SolarWinds Orion Hack
- 7.11 AI and Malware
- 7.12 Malware Countermeasures
- 7.13 Malware Threats Review
Module 8: Sniffing and Spoofing
- 8.1 Network Sniffing
- 8.2 Sniffing Tools
- 8.2.1 ACTIVITY – Intercepting Data with Wireshark
- 8.2.2 ACTIVITY – Capturing Files off the Network
- 8.3 MAC and ARP Attacks
- 8.3.1 ACTIVITY – Performing an MITM Attack with Ettercap
- 8.4 Name Resolution Attacks
- 8.4.1 ACTIVITY – Spoofing an Authentication Service with Responder
- 8.5 Other Layer 2 Attacks
- 8.6 Sniffing and Spoofing Countermeasures
- 8.7 Sniffing and Spoofing Review
Module 9: Social Engineering
- 9.1 Social Engineering Concepts
- 9.2 Social Engineering Techniques
- 9.3 Social Engineering Tools
- 9.3.1 ACTIVITY – Phishing for Credentials
- 9.3.2 ACTIVITY – OMG Cable Baiting
- 9.4 Social Media, Identity Theft, Insider Threats
- 9.5 Social Engineering and AI
- 9.6 Social Engineering Countermeasures
- 9.7 Social Engineering Review
Module 10: Denial-of-Service
- 10.1 DoS-DDoS Concepts
- 10.2 Volumetric Attacks
- 10.3 Fragmentation Attacks
- 10.4 State Exhaustion Attacks
- 10.5 Application Layer Attacks
- 10.5.1 ACTIVITY – Conducting a Slowloris DDoS Attack
- 10.6 Other Attacks
- 10.7 DoS Tools
- 10.7.1 ACTIVITY – Performing a HOIC DDoS Attack
- 10.8 DoS Countermeasures
- 10.9 DoS Review
Module 11: Session Hijacking
- 11.1 Session Hijacking
- 11.2 Compromising a Session Token
- 11.3 XSS
- 11.3.1 ACTIVITY – Web Session Hijacking with XSS
- 11.4 CSRF
- 11.5 Other Web Hijacking Attacks
- 11.6 Network-Level Session Hijacking
- 11.7 Session Hijacking Tools
- 11.8 Session Hijacking Countermeasures
- 11.9 Session Hijacking Review
Module12: Attack Detection and Prevention
- 12.1 Types of IDS
- 12.2 Snort
- 12.3 Logging and Monitoring
- 12.4 IDS Considerations
- 12.5 IDS Evasion
- 12.6 Firewalls
- 12.7 Packet Filtering Rules
- 12.8 Firewall Deployments
- 12.9 Split DNS
- 12.10 Firewall Product Types
- 12.11 Firewall Evasion
- 12.11.1 ACTIVITY – Busting the DOM for WAF Evasion
- 12.12 NAC and Endpoint Security
- 12.13 NAC and EDR Evasion
- 12.14 Honeypots
- 12.15 Evasion Countermeasures
- 12.16 Attack Detection and Prevention Review
Module 13: Hacking Web Servers
- 13.1 Web Server Operations
- 13.2 Hacking Web Servers
- 13.3 Common Web server Attacks
- 13.4 Webserver Attack Tools
- 13.5 AI and Webserver Attacks
- 13.6 Hacking Web Servers Countermeasures
- 13.7 Hacking Web Servers Review
Module 14: Hacking Web Applications
- 14.1 Web Application Concepts
- 14.2 Attacking Web Apps
- 14.3 A01 Broken Access Control
- 14.4 A02 Cryptographic Failures
- 14.5 A03 Injection
- 14.5.1 ACTIVITY – Command Injection
- 14.6 A04 Insecure Design
- 14.7 A05 Security Misconfiguration
- 14.8 A06 Vulnerable and Outdated Components
- 14.9 A07 Identification and Authentication Failures
- 14.10 A08 Software and Data integrity Failures
- 14.11 A09 Security Logging and Monitoring Failures
- 14.12 A10 Server-Side Request Forgery
- 14.13 XSS Attacks
- 14.14 CSRF
- 14.15 Parameter Tampering
- 14.15.1 ACTIVITY – Parameter Tampering with Burp Suite
- 14.16 Clickjacking
- 14.16.1 ACTIVITY – Clickjacking with XSS and iFrame Injection
- 14.17 SQL Injection
- 14.17.1 ACTIVITY – Using SQL Injection to Steal Sensitive Data
- 14.18 Insecure Deserialization Attacks
- 14.19 IDOR
- 14.19.1 ACTIVITY – IDOR Abuse with Burp Suite
- 14.20 Directory Traversal
- 14.20.1 ACTIVITY – Directory Traversal
- 14.21 Session Management Attacks
- 14.22 Response Splitting
- 14.23 Overflow Attacks
- 14.24 XXE Attacks
- 14.25 Web App DoS
- 14.26 Soap Attacks
- 14.27 AJAX Attacks
- 14.28 Web API Hacking
- 14.29 Webhooks and Web Shells
- 14.30 Web App Hacking Tools
- 14.31 AI and Web Application Attacks
- 14.32 Hacking Web Applications Countermeasures
- 14.33 Hacking Web Applications Review
Module 15: SQL Injection
- 15.1 SQL Injection Overview
- 15.2 Basic SQL Injection
- 15.3 Finding Vulnerable Websites
- 15.4 Error-based SQL Injection
- 15.5 Union SQL Injection
- 15.5.1 ACTIVITY – SQLi on a Live Website – Part 1
- 15.5.2 ACTIVITY – SQLi on a Live Website – Part 2
- 15.6 Blind SQL Injection
- 15.7 SQL Injection Tools
- 15.8 Evading Detection
- 15.9 Analyzing SQL Injection
- 15.10 SQL Injection Countermeasures
- 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
- 16.1 Wireless Concepts
- 16.2 Wireless Security Standards
- 16.3 WI-FI Discovery Tools
- 16.4 Common Wi-Fi Attacks
- 16.5 Wi-Fi Password Cracking
- 16.6 WEP Cracking
- 16.7 WPA,WPA2,WPA3 Cracking
- 16.7.1 ACTIVITY – WPA2 KRACK Attack
- 16.8 WPS Cracking
- 16.9 Bluetooth Hacking
- 16.10 Other Wireless Hacking
- 16.11 Wireless Security Tools
- 16.12 Wireless Hacking Countermeasures
- 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
- 17.1 Mobile Platform Overview
- 17.2 Mobile Device Attacks
- 17.3 Android Overview
- 17.4 Rooting Android
- 17.5 Android Exploits
- 17.5.1 ACTIVITY – Pwn a Mobile Device
- 17.6 Android-based Hacking Tools
- 17.7 Reverse Engineering an Android App
- 17.8 Securing Android
- 17.9 iOS Overview
- 17.10 Jailbreaking iOS
- 17.11 IOS Exploits
- 17.12 iOS-based Hacking Tools
- 17.13 Reverse Engineering an iOS App
- 17.14 Securing iOS
- 17.15 Mobile Device Management
- 17.16 Hacking Mobile Platforms Countermeasures
- 17.17 Hacking Mobile Platforms Review
Module 18: IoT Hacking & OT Hacking
- 18.1 IoT Overview
- 18.2 IoT Infrastructure
- 18.3 IoT Vulnerabilities and Threats
- 18.4 IoT Hacking Methodology and Tools
- 18.4.1 ACTIVITY – Card Cloning with Flipper Zero
- 18.5 IoT Hacking Countermeasures
- 18.6 OT Concepts
- 18.7 IT-OT Convergence
- 18.8 OT Components
- 18.9 OT Vulnerabilities
- 18.10 OT Attack Methodology and Tools
- 18.11 OT Hacking Countermeasures
- 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
- 19.1 Cloud Computing Concepts
- 19.2 Cloud Types
- 19.3 Cloud Benefits and Considerations
- 19.4 Cloud Risks and Vulnerabilities
- 19.5 AWS Hacking
- 19.5.1 ACTIVITY – AWS S3 Bucket Hacking
- 19.6 Azure Cloud Hacking
- 19.7 Google Cloud Hacking
- 19.8 Container Hacking
- 19.9 Cloud Threat Countermeasures
- 19.10 Cloud Computing Review
Module 20: Cryptography
- 20.1 Cryptography Concepts
- 20.2 Symmetric Encryption
- 20.2.1 ACTIVITY – Symmetric Encryption
- 20.3 Asymmetric Encryption
- 20.3.1 ACTIVITY – Asymmetric Encryption
- 20.4 Public Key Exchange
- 20.5 PKI
- 20.5.1 ACTIVITY – Generating and Using an Asymmetric Key Pair
- 20.6 Digital Signatures
- 20.7 Hashing
- 20.7.1 ACTIVITY – Calculating Hashes
- 20.8 Common Encryption Use Cases
- 20.9 Cryptography Tools
- 20.10 Cryptography Attacks
- 20.11 Cryptography Review
- 20.12 Course Conclusion
Module 21: Challenge Lab
- 21.1-ACTIVITY-Challenge-Lab-Introduction
- 21.2-ACTIVITY-Flag 1 – Port Authority, Please!
- 21.3-ACTIVITY-Flag 2 – Moo-ve Fast and Break Things
- 21.4-ACTIVITY-Flag 3 – Pixels, Packets & Patient X
- 21.5-ACTIVITY-Flag 4 – Hexes and Hashes
- 21.6-ACTIVITY-Flag 5 – APT & the PowerShell Symphony
- 21.7-ACTIVITY-Flag 6 – Script Kiddie's Revenge
- 21.8-ACTIVITY-Flag 7 – Oh Mannie, You Shouldn't Have!
- 21.9-ACTIVITY-Report
This course is included in all of our team and individual training plans. Choose the option that works best for you.
Enroll My Team.
Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.
Choose a Plan.
Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.
Buy This Course on Udemy.
Want just this course at the lowest price? Purchase it individually through our affiliate partner, Vision Training Systems, on Udemy. No subscription required.
Frequently Asked Questions.
What is covered in the CEH v13 exam and how does this course prepare me for it?
The Certified Ethical Hacker (CEH) v13 exam is designed to assess a candidate’s knowledge of penetration testing and ethical hacking techniques across a broad range of cybersecurity domains. The exam covers topics such as reconnaissance, scanning and enumeration, vulnerability analysis, exploitation, post-exploitation, web application security, wireless networks, cloud security, IoT devices, and cryptography. It also evaluates understanding of hacking tools and methodologies aligned with frameworks like MITRE ATT&CK and the Cyber Kill Chain.
This course aligns closely with the CEH v13 exam scope by providing comprehensive instruction across all key domains. It offers hands-on labs and real-world scenarios to reinforce theoretical concepts, ensuring students can practically apply their knowledge. The curriculum includes modules on advanced reconnaissance, web app exploitation, cloud security assessments, and emerging threats like AI-driven attacks. By simulating attack scenarios using tools like Nmap, Metasploit, and Hashcat, students develop the skills necessary to pass the exam and succeed in offensive security roles.
What are the key topics and skills I will learn in the CEH v13 course?
This course is designed to equip you with a wide array of offensive security skills aligned with CEH v13 objectives. You will learn to conduct advanced reconnaissance and footprinting to gather intelligence on target systems. The curriculum covers vulnerability assessment methods, including scanning with tools like Nmap and AI-enhanced scanners, and exploiting weaknesses using Metasploit and Hashcat.
Additionally, you’ll master techniques such as system hacking, password cracking, privilege escalation, social engineering, and network sniffing. The course also emphasizes web application security, teaching you to identify vulnerabilities like SQL injection and cross-site scripting based on OWASP Top 10. Further modules focus on wireless security, mobile device and IoT hacking, cloud platform risks, cryptography, and AI-powered security tools. This well-rounded skill set prepares you to identify and mitigate vulnerabilities proactively in various environments.
How can this CEH v13 training advance my cybersecurity career?
Acquiring the CEH v13 certification or training significantly enhances your career prospects by demonstrating your expertise in offensive security and vulnerability assessment. Organizations increasingly seek professionals who can proactively identify security weaknesses before malicious actors do. With skills gained from this course, you can pursue roles such as penetration tester, security analyst, red team operator, or security consultant.
Moreover, the practical, hands-on approach of this training prepares you for real-world scenarios, making you a valuable asset in any cybersecurity team. Mastering techniques like web application hacking, cloud security assessments, and network exploitation enables you to support organizational defenses and compliance efforts effectively. As cyber threats continue to evolve, professionals with offensive security skills will be at the forefront of cybersecurity innovation and resilience.
What are the best strategies to prepare for the CEH v13 exam using this course?
Effective preparation for the CEH v13 exam involves a combination of understanding theoretical concepts and practicing hands-on skills. Start by thoroughly reviewing all 21 modules, focusing on areas where you feel less confident. Use the practical labs provided in the course to simulate real attack scenarios, such as exploiting web vulnerabilities or assessing cloud security risks.
Additionally, leverage supplementary resources like official CEH practice exams, study guides, and online forums to reinforce your knowledge. Developing a structured study schedule that covers all exam domains ensures comprehensive preparation. Regularly participate in hands-on exercises, review case studies, and stay updated on emerging threats and tools. This approach will build your confidence and equip you with the skills required to pass the CEH v13 exam confidently.
Is prior hacking experience required to enroll in the CEH v13 course?
No prior hacking experience is required to enroll in the CEH v13 course. The training is designed to cater to both beginners and experienced cybersecurity professionals. While a basic understanding of networking, operating systems, and security concepts is recommended, the course starts with foundational topics before progressing to advanced techniques.
The curriculum emphasizes practical, hands-on labs that help students learn by doing, regardless of prior experience. Students will develop their offensive security skills step-by-step, guided by expert instructors through real-world scenarios. This makes the course accessible and beneficial for learners at various levels of cybersecurity expertise, ultimately preparing them for the CEH v13 exam and practical roles in cybersecurity.