EDMIRE TRAININGS
Loading...
0%
Learn any skill, Anytime, Anywhere

10% OFF on all Courses – Enroll Now! - قريباً مع إدماير ترينينغز – مفاجآت وتدريبات جديدة بانتظاركم (Coming soon with Edmire Trainings – surprises and new trainings await you)

Apply Now

CEH (Certified Ethical Hacker) v13

The CEH (Certified Ethical Hacker) v13 program is the world’s most recognized and comprehensive certification in ethical hacking, carefully designed to help cybersecurity professionals master both the fundamentals and advanced concepts of ethical hacking. Unlike traditional security courses, CEH v13 provides a practical, hands-on learning experience with real-world attack scenarios, enabling learners to think like hackers and strengthen their organization’s defenses.

The program includes

Key Features:
  • 500+ hands-on labs in a virtual environment
  • Covers 5 phases of ethical hacking
  • Latest vulnerabilities and exploits
  • Preparation for CEH 312-50 exam
  • EC-Council's iLabs access for 6 months
  • Official courseware and exam voucher included

CEH (Certified Ethical Hacker) v13

  • Introduction to Edmire Speed Typing (ETS) – Overview of the course objectives, structure, and learning outcomes.
  • Typing Fundamentals – Understanding finger placement, posture, and ergonomics for efficient typing.
  • Speed Building Techniques – Learn proven methods to improve typing speed while maintaining accuracy.
  • Accuracy Enhancement – Exercises and drills designed to minimize errors and improve focus.
  • Real-Time Challenges – Participate in live speed typing tests and leaderboards to track your progress.
  • Performance Analytics – Gain insights from detailed analytics and personalized performance reports.
  • Typing for Professionals – Improve productivity in documentation, coding, and communication tasks.
  • Final Assessment & Certification – Demonstrate your skills through a comprehensive final typing evaluation to earn the ETS certificate.
right side
125
Exam Questions
4
Hours Duration
70%
Passing Score
20
Modules

CEH v13 Curriculum

The CEH v13 curriculum covers all aspects of ethical hacking across modern computing environments including cloud, mobile, and IoT systems.

PHASE 1: VULNERABILITY ASSESSMENT

Module 1: Introduction to Ethical Hacking

  • Information security overview
  • Hacking concepts and types
  • Information security controls
  • Penetration testing concepts
  • Information security laws and standards
  • Footprinting concepts
  • Search engine hacking
  • Website footprinting
  • Email footprinting
  • Competitive intelligence
  • WHOIS and DNS footprinting
  • Network and Email Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tasks using Advanced Tools and AI
  • Footprinting Countermeasures
  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Source Port Manipulation
  • Network Scanning Countermeasures
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Vulnerability Assessment Concepts
  • Vulnerability Scoring Systems and Databases
  • Vulnerability-Management Life Cycle
  • Vulnerability Research
  • Vulnerability Scanning and Analysis
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
PHASE 2: GAINING ACCESS
  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Viruses and Worms
  • Fileless Malware Concepts
  • AI-based Malware Concepts
  • Malware Countermeasures
  • Anti-Malware Software
  • Sniffing Concepts
  • Sniffing Technique
  • Sniffing Tools
  • Sniffing Countermeasures
  • Social Engineering Concepts
  • Human-based Social Engineering Techniques
  • Computer-based Social Engineering Techniques
  • Mobile-based Social Engineering Techniques
  • Social Engineering Countermeasures
  • DoS/DDoS Concepts
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Countermeasures
PHASE 3: Perimeter and Web App Exploitation
  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • Intrusion Detection/Prevention System (IDS/IPS) Concepts
  • Firewall Concepts
  • IDS, IPS, and Firewall Solutions
  • Evading IDS/Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Honeypot Concepts
  • IDS/Firewall Evasion Countermeasures
  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Patch Management
  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API and Webhooks
  • Web Application Security
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • Evasion Techniques
  • SQL Injection Countermeasures
PHASE 4: Mobile, IOT, OT Exploitation
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Attack Countermeasures
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines
  • Mobile Security Tools
  • IoT Hacking
  • IoT Concepts and Attacks
  • IoT Hacking Methodology
  • OT Hacking
  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Hacking
  • Cloud Hacking Methodology
  • AWS Hacking
  • Microsoft Azure Hacking
  • Google Cloud Hacking
  • Container Hacking
  • Cloud Security
  • Cryptography Concepts and Encryption Algorithms
  • Applications of Cryptography
  • Cryptanalysis
  • Cryptography Attack Countermeasures

Who Should Attend

The CEH certification is ideal for IT professionals involved in information security and system administration:

Security Professionals

Security officers, auditors, and analysts looking to validate their skills

Network Administrators

Network professionals responsible for securing infrastructure

Prerequisites:
  • Basic understanding of computer networks
  • Familiarity with Windows/Linux operating systems
  • Basic knowledge of security concepts
  • Curiosity and interest in ethical hacking and cybersecurity
  • Willingness to learn penetration testing tools and techniques

Certification Details

CEH Badge
Certified Ethical Hacker (CEH)

Issued by EC-Council | Globally Recognized Certification

Exam Information:
  • Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)
  • Number of Questions: 125
  • Duration: 4 hours
  • Passing Score: 70%
  • Question Format: Multiple choice
  • Testing Center: Pearson VUE or ECC Exam Portal

Upcoming Batches

Earliest Batches will be start soon! Grab it before it's too late!

Start Date End Date Days Timings Mode Status Action

Explore All Upcoming Training Sessions

Visit Now!

Course Policies

Policy 1: Attendance Policy

Students must attend at least 80% of the scheduled classes to be eligible for the certification exam.

  • More than 3 absences may require make-up sessions
  • Late arrivals beyond 15 minutes will be marked absent
  • Medical emergencies require proper documentation
  • 100% refund if cancellation is made 15+ days before course start
  • 50% refund if cancellation is made 7-14 days before course start
  • No refund for cancellations within 7 days of course start
  • Exam vouchers once issued are non-refundable
  • Students must use lab equipment and virtual environments responsibly
  • Sharing login credentials is strictly prohibited
  • Any damage to lab equipment due to negligence will be charged to the student
  • Students must follow all safety and security guidelines during lab exercises
  • Students must not engage in any unethical hacking activities inside or outside the course
  • All assignments and lab exercises must be completed individually unless group work is authorized
  • Plagiarism, cheating, or misuse of resources will result in disciplinary action
  • Respect towards instructors, peers, and lab resources is mandatory
  • Students are responsible for completing all exercises and exams honestly
  • Unauthorized collaboration or sharing of answers is strictly prohibited
  • Any violations may result in removal from the course or reporting to the certification body

Frequently Asked Questions

Q: What is the difference between CEH v12 and CEH v13?

CEH v13 is the most updated version of the Certified Ethical Hacker program, introducing modules on modern technologies like cloud security, AI-driven threats, IoT vulnerabilities, mobile hacking, and advanced attack methodologies. CEH v12, while comprehensive, focused more on traditional hacking techniques, network scanning, and vulnerabilities that existed prior to the rise of these new technologies. The v13 update ensures that candidates are prepared for current and emerging cybersecurity challenges, making them more competitive in the job market.

CEH (Certified Ethical Hacker) was introduced by EC-Council in 2003 to address the growing need for trained professionals in ethical hacking and cybersecurity. The program was designed to equip IT professionals with skills to identify, analyze, and prevent cyber attacks by thinking like a hacker, but legally and ethically. Over the years, CEH has evolved with regular updates to include new threats, technologies, and real-world attack scenarios, making it one of the most recognized and respected certifications in the cybersecurity industry worldwide.

CEH opens up a wide range of career opportunities in cybersecurity. Certified professionals can pursue roles such as Ethical Hacker, Penetration Tester, Security Analyst, Network Security Engineer, Cybersecurity Consultant, and Security Auditor. Organizations across industries like finance, healthcare, IT services, government, defense, and telecom seek CEH-certified talent to proactively identify vulnerabilities and secure their networks. The certification demonstrates both knowledge and practical skills, giving candidates a competitive edge in the job market.

Yes, beginners can enroll in CEH training. While EC-Council recommends 2 years of IT or security experience to directly appear for the exam without training, anyone interested in learning ethical hacking can join the official CEH course. The training provides structured learning from basics to advanced techniques, hands-on labs, and real-world scenarios. This makes it ideal for both newcomers and experienced IT professionals looking to enhance their cybersecurity skills.

The CEH Practical exam is a 6-hour hands-on test where candidates demonstrate their ethical hacking skills in a virtual lab environment. Unlike the theoretical multiple-choice CEH exam, the practical exam tests real-world abilities to identify vulnerabilities, exploit systems safely, and implement countermeasures. This exam validates both knowledge and practical expertise, giving employers confidence in a candidate’s ability to handle live cybersecurity challenges.

CEH certification is valid for 1 year from the date of passing. To maintain the certification, professionals must earn EC-Council Continuing Education (ECE) credits by attending relevant training, webinars, or advanced courses. This ensures that CEH-certified individuals stay updated with emerging cybersecurity threats and technologies, maintaining their relevance in a constantly evolving field.

CEH provides a strong foundation for a career in ethical hacking, covering theory, tools, and methodologies. However, to excel, it is recommended to combine CEH with practical experience, hands-on labs, and potentially the CEH Practical exam. This combination demonstrates both theoretical knowledge and real-world skill, which is highly valued by employers. Many successful ethical hackers supplement CEH with other specialized certifications like OSCP or penetration testing training.

Yes, CEH v13 includes the latest attack techniques, such as AI-powered attacks, cloud-specific vulnerabilities, IoT and mobile security threats, ransomware strategies, and advanced penetration testing methods. The curriculum is updated regularly to reflect current trends, ensuring candidates are prepared to defend against both traditional and emerging cyber threats in real-world scenarios.

CEH-certified professionals are in demand across multiple industries including IT services, finance, banking, healthcare, government agencies, defense, telecom, and cybersecurity consulting firms. Any organization that requires protection against cyber attacks values CEH certification, making it a versatile credential that opens doors to diverse roles in cybersecurity, risk assessment, and security management.

Yes, CEH certification is globally recognized and can significantly improve your earning potential. Certified professionals often receive higher salaries compared to non-certified peers, as the credential demonstrates validated knowledge of cybersecurity concepts, practical skills, and the ability to proactively secure networks. CEH also enhances career progression opportunities into senior cybersecurity roles and specialized domains such as penetration testing, threat analysis, and ethical hacking consultancy.

Your Cybersecurity Career Path

Navigate your professional journey in information security from beginner to executive level

Experience Levels

Foundational Level

No prior IT experience required

  • Basic computer literacy
  • Fundamental security concepts
  • Introductory certifications

Entry Level

1-2 years IT experience

  • Network fundamentals
  • Security operations
  • Compliance basics

Core Level

2-5 years security experience

  • Advanced networking
  • Penetration testing
  • Security architecture

Specialist Level

3-7 years focused experience

  • Threat intelligence
  • Digital forensics
  • Cloud security

Executive Level

5+ years leadership experience

  • Risk management
  • Security governance
  • Team leadership

Cybersecurity Career Tracks

Select your area of interest to explore certification paths

Technical Security Roles

NIDE

Network Security Engineer

Design and implement secure network infrastructure

2-4 years 3+ certs
View Certification Path
CIPENT

Penetration Tester

Ethical hacking and vulnerability assessment

3-5 years 4+ certs
View Certification Path
CHIFI

Digital Forensics Analyst

Investigate security incidents and cyber crimes

4-6 years 5+ certs
View Certification Path

Security Management Roles

CICISO

Chief Information Security Officer

Lead organizational security strategy

10+ years 8+ certs
View Certification Path
CISA

Security Manager

Oversee security operations and teams

5-8 years 4+ certs
View Certification Path

Compliance & Risk Roles

CRISC

Risk Manager

Identify and mitigate security risks

4-7 years 3+ certs
View Certification Path
CIPM

Privacy Manager

Ensure compliance with data protection laws

3-5 years 2+ certs
View Certification Path

Explore Cybersecurity Roles

Security Architect

NIDE

Network Security

Learn more

CICT

Technician

Learn more

CHND

Network Security

Learn more

CIPENT

Penetration Testing

Learn more

CITIA

Threat Intelligence

Learn more

CICISO

Chief Information Security Officer

Learn more

Security Consultant

EINE

Ethical Hacking

Learn more

CIEN Master

Client - CEN Practical

Learn more

CISA

SOC Analyst

Learn more

EICIH

Incident Handling

Learn more

Assoc. CICISO

Assoc. Chief Information Security Officer (3 years)

Learn more

Application Security Engineer

DIFE

Digital Forensics

Learn more

ICSISCADA

Industrial Control Systems

Learn more

CHIFI

Digital Forensics

Learn more