Certified Ethical Hacker (CEH) v13 – ITU Online IT Training
Ready to start learning? Individual Plans →Team Plans →
[ Course ]

Certified Ethical Hacker (CEH) v13

Learn essential ethical hacking skills to identify vulnerabilities, strengthen security measures, and protect organizations from cyber threats effectively


68 Hrs 56 Min320 Videos100 QuestionsCertificate of CompletionClosed Captions

Certified Ethical Hacker (CEH) v13



You are dealing with the kind of problem that keeps security teams busy after hours: a server is exposed, a password policy is weak, a web app is leaking information, or someone in the organization clicks the wrong link and suddenly you need answers. That is exactly where the best certified ethical hacker course earns its keep. This training is built around EC-Council® Certified Ethical Hacker (C|EH™) v13, and I designed it to help you stop guessing and start testing systems the way an attacker would. If you want the best certified ethical hacker training for real-world offensive security skills, this course gives you the structure, the mindset, and the technical depth to make that happen.

I am not interested in teaching you tricks that only work in a lab with perfect conditions. I want you to understand how reconnaissance leads to exploitation, how attackers chain weaknesses together, and how defenders can break that chain. That is why this course covers modern attack surfaces like cloud, IoT, mobile, web applications, and AI-assisted tooling, while still grounding everything in the fundamentals that matter: enumeration, privilege escalation, lateral movement, and defensive countermeasures. If you have been comparing options and wondering which is the best hacking course, this one is built to be more than “interesting.” It is meant to be useful on the job and serious enough to support certification-level preparation.

Best Certified Ethical Hacker Course: What You Are Actually Learning

Let me be blunt: a good ethical hacking course does not just show you how to run tools. It teaches you how to think through an engagement from start to finish. In this course, you begin with the attacker’s first move—footprinting and reconnaissance—and work forward through scanning, enumeration, exploitation, post-exploitation, and reporting. That progression matters because real security testing is not random tool use. It is a disciplined process. You need to know what to look for, how to validate it, and how to explain the risk in language the business can act on.

The CEH v13 curriculum is broad for a reason. You will work through core topics such as network scanning, system hacking, vulnerability assessment, malware concepts, sniffing, spoofing, web application attacks, wireless attacks, cloud security, cryptography, mobile security, IoT, and AI-driven defensive and offensive techniques. That breadth is one of the reasons people search for the best certified ethical hacker course; they want a single training path that reflects the real attack surface, not a narrow toy example. You will also see how frameworks like MITRE ATT&CK and the Cyber Kill Chain help you organize what you find so your work becomes repeatable instead of improvised.

This is also where the course becomes practical. You are not just memorizing definitions. You are learning how to use tools such as Nmap, Metasploit, password auditing utilities, and web testing methods to validate exposure. When I teach this material, I care less about whether you can name a vulnerability and more about whether you can explain why it exists, how an attacker would chain it, and what control would actually stop it. That is the difference between a casual learner and someone who can contribute in a real security operation.

How This Course Builds the Hacker Mindset Without Losing the Defender’s Perspective

Ethical hacking only works when you understand both sides of the equation. If you learn offensive techniques without learning how defenders think, you will end up with fragmented knowledge. If you only learn defense, you may miss how quickly small weaknesses become major incidents. This course is structured to give you both perspectives. You will learn the methods attackers use to discover targets, exploit services, evade weak controls, and hide activity. Then you will examine what defenders should be doing at each stage to detect, slow, or block that activity.

That approach matters in day-to-day security work. For example, an exposed service is not just a port number. It is an entry point that may lead to weak credentials, outdated software, misconfigured access control, or lateral movement. A phishing email is not just a “social engineering issue.” It can be the first step in credential theft, endpoint compromise, and privilege abuse. In other words, the technical skill is valuable, but the real value comes from understanding how attacks unfold across people, processes, and systems.

  • You learn to identify attack paths, not just isolated weaknesses.
  • You practice using reconnaissance data to prioritize risk.
  • You connect technical findings to real business impact.
  • You see how detection and prevention controls interrupt attacker workflow.
  • You build the judgment needed to communicate findings clearly to stakeholders.

That is why this training is often a good fit for someone searching for the best hacking course or even the best ceh course on udemy and realizing they need something deeper than a quick walkthrough. The point is not to “know hacking” in the abstract. The point is to be dangerous to attackers and useful to your organization.

Modules, Tools, and Attack Scenarios You Will Work Through

This course follows the CEH v13 structure closely, and each module builds on the one before it. You start with information gathering because every later decision depends on what you learn early. From there, you move into scanning and enumeration, where you identify live hosts, exposed services, banners, and misconfigurations. That is where tools like Nmap become essential. I want you to understand not just how to launch a scan, but what the results mean and how to interpret them in context.

As the course progresses, you will study vulnerability analysis and exploitation using common frameworks and methods, including Metasploit-based workflows and password-cracking concepts such as hash attacks and credential recovery. Then you will move into system hacking, where privilege escalation and post-compromise behavior show you how attackers expand access once they have a foothold. Web application hacking is a major part of the course because web apps remain one of the easiest places to find serious mistakes. You will work through issues that align with the OWASP Top 10, including injection flaws, authentication weaknesses, insecure access control, and session problems.

Later modules take you into wireless, mobile, IoT, cloud, and cryptography. That is not filler. Those are live environments organizations actually depend on. You will look at how cloud misconfigurations affect exposure, why IoT devices are frequently overlooked, and how encrypted data can still be at risk when implementation is poor. You will also study AI-driven security tools and how automation is changing both attack and defense. If you are looking for something that feels current rather than stale, this is one of the reasons people compare it to the best azure fundamentals course or a modern cloud-security path, even though this training is much broader and more offensive in nature.

My rule for ethical hacking training is simple: if the learner cannot explain the weakness, demonstrate the risk, and recommend the fix, the lesson is incomplete.

Where the Course Fits in Today’s Security Jobs

This course supports a wide range of roles because ethical hacking is not a niche skill anymore. Security analysts use offensive techniques to validate alerts and understand adversary behavior. Penetration testers use them every day to assess client environments. Security engineers need them to design controls that actually work. Network administrators benefit because they finally see how small configuration mistakes become exploitable. Even incident responders and digital investigators get value here because knowing the attacker workflow improves triage and root-cause analysis.

Typical job titles that align well with this training include cybersecurity analyst, penetration tester, security consultant, vulnerability analyst, red team member, security operations specialist, and network security engineer. In practical terms, this course can help you contribute more credibly in interviews, internal security reviews, tabletop exercises, and red-team simulations. If your organization is asking for proof that you can assess risk instead of just talk about it, this kind of training helps you produce that proof.

Salary varies by region, experience, and employer, but ethical hacking and penetration testing roles commonly sit in a strong compensation band because the work requires both technical skill and judgment. In the U.S., you will often see entry-to-mid cybersecurity roles in the roughly $75,000 to $115,000 range, with experienced pentesters and senior security professionals moving well beyond that depending on specialization and location. The point is not the number by itself. The point is that the skill set directly supports the kind of work employers pay for: reducing risk, finding exposures before criminals do, and documenting remediation clearly.

How This Training Helps You Prepare for CEH v13

If your goal is certification, this course gives you a serious foundation for EC-Council® Certified Ethical Hacker (C|EH™) v13 preparation. I want you to approach exam prep the right way: not by memorizing definitions in isolation, but by understanding why each domain exists and how the concepts connect. Exam questions in this area often test whether you can distinguish one attack type from another, recognize the correct sequence of a process, or choose the most appropriate defensive response.

The domains behind CEH v13 map well to the structure of the course. You are expected to know reconnaissance methods, scanning techniques, enumeration logic, system and network attacks, web application issues, wireless methods, cloud risks, malware concepts, cryptography, and security controls. Just as important, you need to understand how attack frameworks like MITRE ATT&CK and the Cyber Kill Chain help you describe adversary behavior. Those frameworks make the material easier to organize, and they also make your reporting stronger in real-world work.

Here is the exam-prep mindset I recommend:

  1. Learn the concept first, then learn the tool that demonstrates it.
  2. Connect each offensive tactic to the defensive control that should stop it.
  3. Practice recognizing terminology exactly as it appears in security exams and in job interviews.
  4. Use repetition to build confidence with process-driven topics like enumeration, privilege escalation, and incident response alignment.

This is why the course works well for people who want the best certified ethical hacker training rather than the fastest possible overview. Certification prep is not about rushing. It is about building a reliable mental model you can use under pressure.

Why the AI, Cloud, and Web Security Coverage Matters

I included AI, cloud, and web application security because those are not “extra” topics anymore—they are where a lot of the risk lives. AI-assisted security tools are changing how analysts prioritize alerts, correlate findings, and scale testing. At the same time, attackers are also using automation to increase speed and reduce manual effort. If you ignore AI entirely, you will miss a major shift in how security work is being done. That is one reason some learners search for an ai hacking course; they know the field is changing and want training that reflects it.

Cloud security deserves the same treatment. Organizations run production workloads in AWS and Azure, and a misstep in identity, access control, storage permissions, or exposed management services can create serious risk. This course helps you understand common cloud attack paths so you can evaluate exposure intelligently, even if your primary job is not cloud administration. Likewise, web applications remain a favorite target because they are public-facing, business-critical, and often built quickly. A security professional who understands how web flaws arise can find and fix issues far earlier in the development cycle.

If you are comparing this to a more narrow course on course hosting solutions or vendor-specific fundamentals, keep one thing in mind: breadth matters when your job touches multiple attack surfaces. You need to know how a cloud misconfiguration, a weak login flow, and a phishing email can all become part of the same incident. This course is built for that reality.

Who Should Take This Course and What You Should Know First

This training is a strong fit if you already have some comfort with networking, security concepts, and basic system administration. You do not need to be an expert before starting, but you should be willing to work through technical material carefully. If you have ever configured a firewall rule, read a packet capture, used command-line tools, or troubleshot a service, you have a useful starting point. If those terms still feel completely foreign, you may want to build a little foundational knowledge first so the offensive concepts land properly.

Good candidates for this course include:

  • Cybersecurity analysts who want to understand attacker behavior more deeply
  • IT professionals moving into penetration testing or offensive security
  • System and network administrators responsible for hardening environments
  • Security engineers who need stronger validation and assessment skills
  • Incident responders who want better context during investigations
  • Students preparing for EC-Council® certification paths

If you are completely new to IT, you may still be able to follow along, but you will get more value if you already understand TCP/IP basics, common operating systems, and simple security terminology. In other words, this is not a “learn what a browser is” course. It is a serious technical course for people who want to move into offensive security with purpose.

What You Gain When You Finish

When you finish this course, you should not just know what ethical hacking is. You should be able to walk into a vulnerable environment, identify the likely attack surface, explain what matters most, and describe what needs to be fixed. That skill set changes how you work. You become more valuable in a security team because you can contribute to assessments, support remediation, and communicate risk in practical terms. You also become harder to fool, because you understand the mechanics behind the attack.

More specifically, you will gain the ability to:

  • Plan and structure an ethical hacking assessment
  • Use reconnaissance and scanning methods to map targets
  • Identify likely vulnerabilities across network, web, cloud, and wireless environments
  • Apply exploit concepts safely and understand post-exploitation impact
  • Recognize social engineering and credential attack patterns
  • Relate your findings to frameworks and defensive priorities
  • Prepare more confidently for CEH v13 certification goals

If you are shopping for the best hacking course, my advice is to choose the one that teaches you to reason, not just repeat commands. That is what this training is built to do. It is hands-on, grounded in current attack patterns, and focused on the kind of judgment employers actually want. Whether your immediate goal is certification, a new job, or simply becoming much better at protecting systems, this course gives you a solid path forward.

EC-Council® and C|EH™ are trademarks of EC-Council. This content is for educational purposes.

Module 1: Information Security and Ethical Hacking Overview
  • 1.0 Introduction to CEH v13
  • 1.1 Elements of Security
  • 1.2 Cyber Kill Chain
  • 1.3 MITRE ATT&CK Framework
  • 1.3.1 ACTIVITY – Examining MITRE ATT&CK
  • 1.4 Hacking
  • 1.5 Ethical Hacking
  • 1.6 Information Assurance
  • 1.7 Risk Management
  • 1.8 Incident Management
  • 1.9 Information Security Laws and Standards
  • 1.10 Using AI in Ethical Hacking
  • 1.11 Information Security and Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
  • 2.1 Footprinting Concepts
  • 2.2 OSINT Tools
  • 2.2.1 ACTIVITY – Finding Internet-Connected Devices with Shodan
  • 2.2.2 ACTIVITY – Performing OSINT with theHarvester
  • 2.3 Advanced Google Search
  • 2.3.1 ACTIVITY – Google Hacking
  • 2.4 Whois Footprinting
  • 2.4.1 ACTIVITY – Footprinting with WHOIS
  • 2.5 DNS Footprinting
  • 2.5.1 ACTIVITY – Enumerating DNS
  • 2.6 Website Footprinting
  • 2.7 Email Footprinting
  • 2.8 Network Footprinting
  • 2.8.1 ACTIVITY – Tracing a Network Path with Traceroute
  • 2.9 Social Network Footprinting
  • 2.10 Enhanced OSINT
  • 2.11 Footprinting-and-Reconnaissance-Countermeasures
  • 2.12 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
  • 3.1 Scanning Concepts
  • 3.2 Discovery Scans
  • 3.3 Port Scans
  • 3.4 Other Scan Types
  • 3.5 Scanning Tools
  • 3.6 NMAP
  • 3.6.1 ACTIVITY – Port Scanning and Fingerprinting with NMAP
  • 3.7 Firewall and IDS Evasion
  • 3.8 Proxies
  • 3.9 AI Enhanced SCANNING Tools
  • 3.10 Scanning counter-measures
  • 3.11 Scanning Networks Review
Module 4: Enumeration
  • 4.1 Enumeration Overview
  • 4.2 SMB_NetBIOS_Enumeration
  • 4.3 File Transfer Enumeration
  • 4.4 WMI Enumeration
  • 4.5 SNMP Enumeration
  • 4.6 LDAP Enumeration
  • 4.7 DNS Enumeration
  • 4.8 SMTP Enumeration
  • 4.8.1 ACTIVITY – SMTP Enumeration
  • 4.9 Remote Connection Enumeration
  • 4.10 Website Enumeration
  • 4.10.1 ACTIVITY – Enumerating Website Directories
  • 4.11 Local User and Active Directory Enumeration
  • 4.12 Other Enumeration Types
  • 4.13 Enumeration Using AI
  • 4.14 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
  • 5.1 Vulnerability Scanning
  • 5.1.1 ACTIVITY – Vulnerability Scanning with OpenVAS
  • 5.2 Vulnerability Assessment
  • 5.3 AI Assisted Vulnerability Assessment
  • 5.4 Vulnerability Analysis Review
Module 6: System Hacking
  • 6.1 System Hacking Concepts
  • 6.2 Common Operating System Exploits
  • 6.3 Buffer Overflows
  • 6.4 System Hacking Tools and Frameworks
  • 6.5 Metasploit
  • 6.5.1 ACTIVITY – Hacking with Metasploit
  • 6.6 Meterpreter
  • 6.6.1 ACTIVITY – Having Fun with Meterpreter
  • 6.7 Keylogging_and_Spyware-
  • 6.8 Netcat
  • 6.8.1 ACTIVITY – Using Netcat
  • 6.9 Windows Exploitation
  • 6.10 Windows Post- Exploitation
  • 6.10.1 ACTIVITY – Windows Post Exploitation with Eternal Blue
  • 6.10.2 ACTIVITY – Escalating Privilege with Token Passing
  • 6.11 Linux Exploitation
  • 6.11.1 ACTIVITY – Pwn a Linux Target from Start to Finish
  • 6.12 Linux Post-Exploitation
  • 6.13 Password Attacks
  • 6.13.1 ACTIVITY – Pass-the-Hash
  • 6.13.2 ACTIVITY – Password Spraying with Hydra
  • 6.14 Linux Password Cracking
  • 6.14.1 ACTIVITY – Password Cracking with Hashcat
  • 6.14.2 ACTIVITY – Brute Forcing with Medusa
  • 6.15 Additional Password Attacks
  • 6.16 Attacking Network Services
  • 6.16.1 ACTIVITY – Cracking Linux Passwords with John-the-Ripper
  • 6.17 Other Methods for Obtaining Passwords
  • 6.18 Network Service Attacks
  • 6.19 Lateral Movement
  • 6.19.1 ACTIVITY – Preparing to Pivot
  • 6.19.2 ACTIVITY – Lateral Movement through Pivoting
  • 6.20 Persistence
  • 6.20.1 ACTIVITY – Creating a Persistent Netcat Back Door
  • 6.20.2 ACTIVITY – APT Persistence
  • 6.21 Hiding Data
  • 6.21.1 ACTIVITY – Hiding Data with Steganography
  • 6.22 Covering Tracks
  • 6.22.1 ACTIVITY – Cover Tracks with Log Tampering
  • 6.23 Side-Channel-Attacks
  • 6.24 AI-Powered Vulnerability Exploitation Tools
  • 6.25 System Hacking Countermeasures
  • 6.26 System Hacking Review
Module 7: Malware Threats
  • 7.1 Malware Overview
  • 7.2 Viruses
  • 7.3 Trojans
  • 7.4 Rootkits
  • 7.5 Other Malware
  • 7.6 Advanced Malware Threats
  • 7.7 Malware Makers
  • 7.7.1 ACTIVITY – Creating a Malware Dropper and Handler
  • 7.8 Malware Deployment
  • 7.9 Malware Detection
  • 7.10 Malware Analysis
  • 7.10.1 ACTIVITY – Analyzing the SolarWinds Orion Hack
  • 7.11 AI and Malware
  • 7.12 Malware Countermeasures
  • 7.13 Malware Threats Review
Module 8: Sniffing and Spoofing
  • 8.1 Network Sniffing
  • 8.2 Sniffing Tools
  • 8.2.1 ACTIVITY – Intercepting Data with Wireshark
  • 8.2.2 ACTIVITY – Capturing Files off the Network
  • 8.3 MAC and ARP Attacks
  • 8.3.1 ACTIVITY – Performing an MITM Attack with Ettercap
  • 8.4 Name Resolution Attacks
  • 8.4.1 ACTIVITY – Spoofing an Authentication Service with Responder
  • 8.5 Other Layer 2 Attacks
  • 8.6 Sniffing and Spoofing Countermeasures
  • 8.7 Sniffing and Spoofing Review
Module 9: Social Engineering
  • 9.1 Social Engineering Concepts
  • 9.2 Social Engineering Techniques
  • 9.3 Social Engineering Tools
  • 9.3.1 ACTIVITY – Phishing for Credentials
  • 9.3.2 ACTIVITY – OMG Cable Baiting
  • 9.4 Social Media, Identity Theft, Insider Threats
  • 9.5 Social Engineering and AI
  • 9.6 Social Engineering Countermeasures
  • 9.7 Social Engineering Review
Module 10: Denial-of-Service
  • 10.1 DoS-DDoS Concepts
  • 10.2 Volumetric Attacks
  • 10.3 Fragmentation Attacks
  • 10.4 State Exhaustion Attacks
  • 10.5 Application Layer Attacks
  • 10.5.1 ACTIVITY – Conducting a Slowloris DDoS Attack
  • 10.6 Other Attacks
  • 10.7 DoS Tools
  • 10.7.1 ACTIVITY – Performing a HOIC DDoS Attack
  • 10.8 DoS Countermeasures
  • 10.9 DoS Review
Module 11: Session Hijacking
  • 11.1 Session Hijacking
  • 11.2 Compromising a Session Token
  • 11.3 XSS
  • 11.3.1 ACTIVITY – Web Session Hijacking with XSS
  • 11.4 CSRF
  • 11.5 Other Web Hijacking Attacks
  • 11.6 Network-Level Session Hijacking
  • 11.7 Session Hijacking Tools
  • 11.8 Session Hijacking Countermeasures
  • 11.9 Session Hijacking Review
Module12: Attack Detection and Prevention
  • 12.1 Types of IDS
  • 12.2 Snort
  • 12.3 Logging and Monitoring
  • 12.4 IDS Considerations
  • 12.5 IDS Evasion
  • 12.6 Firewalls
  • 12.7 Packet Filtering Rules
  • 12.8 Firewall Deployments
  • 12.9 Split DNS
  • 12.10 Firewall Product Types
  • 12.11 Firewall Evasion
  • 12.11.1 ACTIVITY – Busting the DOM for WAF Evasion
  • 12.12 NAC and Endpoint Security
  • 12.13 NAC and EDR Evasion
  • 12.14 Honeypots
  • 12.15 Evasion Countermeasures
  • 12.16 Attack Detection and Prevention Review
Module 13: Hacking Web Servers
  • 13.1 Web Server Operations
  • 13.2 Hacking Web Servers
  • 13.3 Common Web server Attacks
  • 13.4 Webserver Attack Tools
  • 13.5 AI and Webserver Attacks
  • 13.6 Hacking Web Servers Countermeasures
  • 13.7 Hacking Web Servers Review
Module 14: Hacking Web Applications
  • 14.1 Web Application Concepts
  • 14.2 Attacking Web Apps
  • 14.3 A01 Broken Access Control
  • 14.4 A02 Cryptographic Failures
  • 14.5 A03 Injection
  • 14.5.1 ACTIVITY – Command Injection
  • 14.6 A04 Insecure Design
  • 14.7 A05 Security Misconfiguration
  • 14.8 A06 Vulnerable and Outdated Components
  • 14.9 A07 Identification and Authentication Failures
  • 14.10 A08 Software and Data integrity Failures
  • 14.11 A09 Security Logging and Monitoring Failures
  • 14.12 A10 Server-Side Request Forgery
  • 14.13 XSS Attacks
  • 14.14 CSRF
  • 14.15 Parameter Tampering
  • 14.15.1 ACTIVITY – Parameter Tampering with Burp Suite
  • 14.16 Clickjacking
  • 14.16.1 ACTIVITY – Clickjacking with XSS and iFrame Injection
  • 14.17 SQL Injection
  • 14.17.1 ACTIVITY – Using SQL Injection to Steal Sensitive Data
  • 14.18 Insecure Deserialization Attacks
  • 14.19 IDOR
  • 14.19.1 ACTIVITY – IDOR Abuse with Burp Suite
  • 14.20 Directory Traversal
  • 14.20.1 ACTIVITY – Directory Traversal
  • 14.21 Session Management Attacks
  • 14.22 Response Splitting
  • 14.23 Overflow Attacks
  • 14.24 XXE Attacks
  • 14.25 Web App DoS
  • 14.26 Soap Attacks
  • 14.27 AJAX Attacks
  • 14.28 Web API Hacking
  • 14.29 Webhooks and Web Shells
  • 14.30 Web App Hacking Tools
  • 14.31 AI and Web Application Attacks
  • 14.32 Hacking Web Applications Countermeasures
  • 14.33 Hacking Web Applications Review
Module 15: SQL Injection
  • 15.1 SQL Injection Overview
  • 15.2 Basic SQL Injection
  • 15.3 Finding Vulnerable Websites
  • 15.4 Error-based SQL Injection
  • 15.5 Union SQL Injection
  • 15.5.1 ACTIVITY – SQLi on a Live Website – Part 1
  • 15.5.2 ACTIVITY – SQLi on a Live Website – Part 2
  • 15.6 Blind SQL Injection
  • 15.7 SQL Injection Tools
  • 15.8 Evading Detection
  • 15.9 Analyzing SQL Injection
  • 15.10 SQL Injection Countermeasures
  • 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
  • 16.1 Wireless Concepts
  • 16.2 Wireless Security Standards
  • 16.3 WI-FI Discovery Tools
  • 16.4 Common Wi-Fi Attacks
  • 16.5 Wi-Fi Password Cracking
  • 16.6 WEP Cracking
  • 16.7 WPA,WPA2,WPA3 Cracking
  • 16.7.1 ACTIVITY – WPA2 KRACK Attack
  • 16.8 WPS Cracking
  • 16.9 Bluetooth Hacking
  • 16.10 Other Wireless Hacking
  • 16.11 Wireless Security Tools
  • 16.12 Wireless Hacking Countermeasures
  • 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
  • 17.1 Mobile Platform Overview
  • 17.2 Mobile Device Attacks
  • 17.3 Android Overview
  • 17.4 Rooting Android
  • 17.5 Android Exploits
  • 17.5.1 ACTIVITY – Pwn a Mobile Device
  • 17.6 Android-based Hacking Tools
  • 17.7 Reverse Engineering an Android App
  • 17.8 Securing Android
  • 17.9 iOS Overview
  • 17.10 Jailbreaking iOS
  • 17.11 IOS Exploits
  • 17.12 iOS-based Hacking Tools
  • 17.13 Reverse Engineering an iOS App
  • 17.14 Securing iOS
  • 17.15 Mobile Device Management
  • 17.16 Hacking Mobile Platforms Countermeasures
  • 17.17 Hacking Mobile Platforms Review
Module 18: IoT Hacking & OT Hacking
  • 18.1 IoT Overview
  • 18.2 IoT Infrastructure
  • 18.3 IoT Vulnerabilities and Threats
  • 18.4 IoT Hacking Methodology and Tools
  • 18.4.1 ACTIVITY – Card Cloning with Flipper Zero
  • 18.5 IoT Hacking Countermeasures
  • 18.6 OT Concepts
  • 18.7 IT-OT Convergence
  • 18.8 OT Components
  • 18.9 OT Vulnerabilities
  • 18.10 OT Attack Methodology and Tools
  • 18.11 OT Hacking Countermeasures
  • 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
  • 19.1 Cloud Computing Concepts
  • 19.2 Cloud Types
  • 19.3 Cloud Benefits and Considerations
  • 19.4 Cloud Risks and Vulnerabilities
  • 19.5 AWS Hacking
  • 19.5.1 ACTIVITY – AWS S3 Bucket Hacking
  • 19.6 Azure Cloud Hacking
  • 19.7 Google Cloud Hacking
  • 19.8 Container Hacking
  • 19.9 Cloud Threat Countermeasures
  • 19.10 Cloud Computing Review
Module 20: Cryptography
  • 20.1 Cryptography Concepts
  • 20.2 Symmetric Encryption
  • 20.2.1 ACTIVITY – Symmetric Encryption
  • 20.3 Asymmetric Encryption
  • 20.3.1 ACTIVITY – Asymmetric Encryption
  • 20.4 Public Key Exchange
  • 20.5 PKI
  • 20.5.1 ACTIVITY – Generating and Using an Asymmetric Key Pair
  • 20.6 Digital Signatures
  • 20.7 Hashing
  • 20.7.1 ACTIVITY – Calculating Hashes
  • 20.8 Common Encryption Use Cases
  • 20.9 Cryptography Tools
  • 20.10 Cryptography Attacks
  • 20.11 Cryptography Review
  • 20.12 Course Conclusion
Module 21: Challenge Lab
  • 21.1-ACTIVITY-Challenge-Lab-Introduction
  • 21.2-ACTIVITY-Flag 1 – Port Authority, Please!
  • 21.3-ACTIVITY-Flag 2 – Moo-ve Fast and Break Things
  • 21.4-ACTIVITY-Flag 3 – Pixels, Packets & Patient X
  • 21.5-ACTIVITY-Flag 4 – Hexes and Hashes
  • 21.6-ACTIVITY-Flag 5 – APT & the PowerShell Symphony
  • 21.7-ACTIVITY-Flag 6 – Script Kiddie's Revenge
  • 21.8-ACTIVITY-Flag 7 – Oh Mannie, You Shouldn't Have!
  • 21.9-ACTIVITY-Report

This course is included in all of our team and individual training plans. Choose the option that works best for you.

[ Team Training ]

Enroll My Team.

Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.

Get Team Pricing

[ Individual Plans ]

Choose a Plan.

Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.

View Individual Plans

[ Single Course Purchase ]

Buy This Course on Udemy.

Want just this course at the lowest price? Purchase it individually through our affiliate partner, Vision Training Systems, on Udemy. No subscription required.

Buy on Udemy

[ FAQ ]

Frequently Asked Questions.

What is the primary focus of the CEH v13 certification?

The CEH v13 certification is primarily focused on teaching ethical hacking techniques and methodologies to identify and mitigate security vulnerabilities in IT systems. It provides a comprehensive understanding of how malicious hackers operate, so security professionals can think like attackers and strengthen defenses.

This certification covers a wide range of topics, including network security, system penetration testing, web application security, and wireless network vulnerabilities. It aims to equip learners with practical skills to conduct thorough security assessments and improve organizational cybersecurity posture.

What are the prerequisites for enrolling in the CEH v13 course?

Typically, there are no strict prerequisites to enroll in the CEH v13 course; however, a basic understanding of networking, operating systems, and cybersecurity concepts is recommended. This ensures students can follow the technical content effectively.

For those seeking official certification exam eligibility, some training providers may require proof of prior experience or certifications in related areas. Additionally, having foundational knowledge of Linux, scripting, and network protocols can significantly enhance learning outcomes and practical application of skills learned.

How does the CEH v13 course help in real-world cybersecurity scenarios?

The CEH v13 course emphasizes hands-on labs and practical exercises that simulate real-world security threats. This approach enables students to identify vulnerabilities, exploit weaknesses ethically, and understand attack vectors used by malicious hackers.

By learning how to perform penetration testing and vulnerability assessments, students can proactively defend their organizations against cyber attacks. The course also covers reporting and communication skills essential for conveying security risks and remediation strategies to stakeholders.

What misconceptions exist about the CEH v13 certification?

One common misconception is that the CEH v13 certification makes you a hacker or cybercriminal. In reality, it is an ethical hacking certification designed to promote cybersecurity and defend against malicious attacks.

Another misconception is that CEH alone qualifies you for all cybersecurity roles. While it provides a strong foundation, advanced roles often require additional specialized certifications, experience, and continuous learning. The CEH v13 is a valuable stepping stone in a cybersecurity career, but practical experience is equally important.

How is the CEH v13 exam structured, and what should I expect?

The CEH v13 exam typically consists of multiple-choice questions that assess your understanding of ethical hacking concepts, tools, and techniques. The exam duration is usually around four hours, with a passing score determined by EC-Council standards.

Preparation involves studying the exam objectives, practicing with simulated tests, and gaining hands-on experience through labs. The exam covers areas such as footprinting, reconnaissance, scanning networks, enumeration, exploitation, and post-exploitation techniques. Being familiar with common hacking tools and their ethical use is also essential for success.

Ready to start learning? Individual Plans →Team Plans →