Skip to main content

Certified Ethical Hacker v13

Certified Ethical Hacker (CEH) is a globally recognised certificate developed by EC-Council, aimed at those wanting to develop or prove their knowledge of a wide range of cyber security topics.


The current version (v13) includes over 550 attack techniques and builds on earlier iterations by incorporating material on AI.


The course balances structured online or classroom learning (with our lead instructor Cary Hendricks) with practical experience via more than 200 hands-on labs.

Who Is It For?

Certified Ethical Hacker is aimed at those who already have some cyber security knowledge and experience and would like to further develop those skills, or those with a firm grasp of many cyber security topics who would like to prove those skills with certification.


It is useful for both red and blue team professionals, to support them in developing their practical skills or gaining a deeper understanding of the types of attacks their clients may experience.


If you're unsure whether Certified Ethical Hacker is the right course for you, please get in touch—we'd be happy to discuss the various options.

Learn

Structured sessions with our lead instructor, covering 20 modules and 550 attack techniques, and access to over 200 labs

Certify

Multiple choice exam, with optional practical exam for higher-level certification

Engage

Optional: Carry out a mock hacking engagement against an emulated organisation

Compete

Optional: Take part in global CTF challenges to keep practising and developing your skills

Course Contents

Introduction to Ethical Hacking

The fundamentals: the basics of hacking, standard procedures, and relevant laws

Footprinting and Reconnaissance

How to use techniques and tools to gather general information about a target network

Scanning Networks

Different tools, techniques, and countermeasures for network scanning

Enumeration

How to gather specific information about a target network and identify potential attack vectors

Vulnerability Analysis

How to identify vulnerable points in a target network and systems

System Hacking

Ways to exploit vulnerabilities in a target system

Malware Threats

Types of malware, analysis procedures, and countermeasures

Sniffing

Packet-sniffing techniques, uses, and countermeasures

Social Engineering

How to perform and identify social engineering attacks, and possible countermeasures

Denial-of-Service

DoS and DDoS techniques, tools, and countermeasures

Session Hijacking

How to exploit session management and authentication weaknesses

Evading IDS, Firewalls, and Honeypots

How to detect intrusions, and how to evade intrusion detection tools

Hacking Web Servers

How to attack web servers, including techniques, tools, and countermeasures

Hacking Web Applications

How to attack web applications, including the OWASP Top 10 security risks

SQL Injection

How to perform SQL injection attacks, how to detect vulnerabilities, and countermeasures

Hacking Wireless Networks

Ways to attack, encrypt, and secure wireless networks

Hacking Mobile Platforms

Ways to attack mobile platforms, manage mobile devices, and guidelines for mobile security

IoT and OT Hacking

Types of IoT and OT attacks, tools, and countermeasures

Cloud Computing

Cloud computing concepts, attacking the cloud, and techniques and tools

Cryptography

Encryption, cryptography attacks, and cryptanalysis tools

Hands-On Labs

Access to more than 200 labs, allowing you to practise your skills in a controlled and secure environment

Scanning Networks

Labs include host, port, service, and OS discovery, scanning beyond IDS and firewall, and scanning using AI

System Hacking

Labs include privilege escalation, hiding data with steganography, clearing logs, and buffer overflow attacks

Cryptography

Labs include creating self-signed certificates, cryptanalysis, disk encryption, and cryptography using AI

...and dozens more!

Labs throughout the 20 modules, covering social engineering, sniffing, SQL injection, mobile platforms, IoT and OT hacking, and much more

Assessment

Assessment is via an online multiple choice exam, with 125 questions and lasting 4 hours.


An optional practical exam can also be taken, to gain the higher certification level CEH Master. It lasts 6 hours and includes 20 challenges, accessed through the iLabs Cyber Range.