Certified Ethical Hacker v13

Uncategorized
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The Certified Ethical Hacker (CEH) course by EC-Council is designed to provide students with the knowledge and skills necessary to understand and detect weaknesses in systems and networks through ethical hacking techniques. The course covers a wide range of cybersecurity topics, emphasizing the tools and methodologies hackers use to breach security defenses.

Key Features:

  • Comprehensive Overview: The CEH course provides an in-depth understanding of the latest hacking tools, techniques, and methodologies from an ethical hacker’s perspective.
  • Hands-On Labs: The course includes practical lab sessions, allowing students to simulate real-world hacking techniques in a controlled environment.
  • Hacking Techniques: Focus on areas such as footprinting, scanning, enumeration, system hacking, malware threats, social engineering, and web application hacking.
  • Security Controls: Students learn to implement security measures to safeguard systems from potential attacks.
  • Industry Standard: The course aligns with the latest standards set by global organizations and is updated regularly to include the most recent threats and vulnerabilities.

Topics Covered:

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Hacking Web Applications
  13. Hacking Wireless Networks
  14. Hacking Mobile Platforms
  15. Evading IDS, Firewalls, and Honeypots
  16. Cloud Computing
  17. Cryptography

Target Audience:

  • Security professionals
  • Network administrators
  • Penetration testers
  • Auditors
  • Security officers

The CEH certification validates the ability to think and act like a hacker, making it a vital credential for those seeking roles in penetration testing, ethical hacking, and security analysis.

Show More

What Will You Learn?

  • This course provides in-depth training in ethical hacking methodologies aligned with real-world offensive and defensive operations. CEH v13 is designed to help students understand how hackers think, act, and exploit vulnerabilities—so they can protect systems more effectively. From reconnaissance to exploitation and post-exploitation tactics, learners will gain hands-on experience using industry-standard tools and techniques in fully interactive labs.
  • 🧠 What Will I Learn?
  • Understand the hacker mindset and the five phases of ethical hacking
  • Master footprinting and reconnaissance using OSINT and advanced tools
  • Perform network scanning, enumeration, and vulnerability mapping
  • Exploit system and web application vulnerabilities
  • Use malware analysis and sniffing techniques for deeper insight
  • Conduct privilege escalation and post-exploitation tasks
  • Learn social engineering tactics used in real attacks
  • Evade firewalls, IDS/IPS, and cover digital tracks
  • Apply cloud and IoT hacking techniques in modern infrastructure
  • Prepare for CEH certification and launch a career in ethical hacking

Course Content

Module 1 – Introduction to Ethical Hacking
✅ Module Description: This foundational module introduces students to the world of ethical hacking from a professional cybersecurity perspective. Learners will explore the core concepts, terminology, and methodologies that define ethical hacking in modern cybersecurity operations. The module sets the stage for understanding how hackers think and operate, the legal and professional frameworks surrounding penetration testing, and the tools and phases used in ethical hacking engagements. By the end of this module, students will gain clarity on the role of an ethical hacker in protecting digital infrastructure and will be ready to deep dive into the technical phases of reconnaissance, scanning, enumeration, exploitation, and post-exploitation in later modules. 🎯 Learning Objectives: Understand what ethical hacking is and why it’s vital in today’s threat landscape Identify the differences between black hat, white hat, and gray hat hackers Learn the five phases of ethical hacking (Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks) Explore the legal implications, standards, and policies guiding ethical hacking Recognize the importance of hacker mindset in proactive defense strategies 🛠️ Professional Relevance: Students will start building the mindset and foundation needed to become penetration testers, red team members, or offensive security professionals. The module aligns with real-world job functions and prepares learners to responsibly apply hacking techniques for defensive purposes.

  • 1.1 Information Security Concepts
  • 1.2 Hacking Concepts
  • 1.3 Ethical Hacking Concepts
  • 1.4 Hacking Methodologies and Frameworks
  • 1.5 Information Security Control
  • 1.6 Information Security Laws and Standards

Module 2 – Footprinting and Reconnaissance
✅ Module Description: In this module, students dive into the first phase of ethical hacking: Footprinting and Reconnaissance. This critical step lays the groundwork for any successful penetration test or real-world attack by collecting detailed information about the target. Students will learn how attackers gather publicly accessible data (passive reconnaissance) and directly interact with systems to extract more insights (active reconnaissance). They'll explore tools and techniques used to map networks, identify entry points, and understand the attack surface — all while staying within legal and ethical boundaries. This module trains students to think like adversaries in order to better defend digital environments. 🎯 Learning Objectives: Define footprinting and explain its purpose in the ethical hacking lifecycle Differentiate between passive and active reconnaissance Use OSINT (Open-Source Intelligence) techniques to gather information from public sources Explore DNS footprinting, WHOIS lookups, website enumeration, and email harvesting Understand social engineering and physical reconnaissance tactics Document footprinting results for professional red team reporting 🧠 Tools & Techniques Covered: Maltego, Recon-ng, theHarvester, Shodan, Google Dorking WHOIS databases, DNS interrogation tools, public record mining LinkedIn and social media analysis for attacker profiling Web server information extraction and metadata discovery 🛡️ Professional Relevance: Footprinting is the foundation of offensive and defensive cybersecurity strategy. By mastering reconnaissance, students develop the ability to predict attacker movements, build effective countermeasures, and design resilient infrastructure. Whether on a red team or blue team, this module is essential for understanding how information can be weaponized.

Module 3 – Scanning Networks
✅ Module Description: This module introduces students to the Scanning phase of ethical hacking, where information gathered during reconnaissance is actively validated. Scanning allows attackers—and ethical hackers—to detect live hosts, open ports, running services, and potential vulnerabilities in the target environment. Students will learn how to use industry-standard tools to perform network discovery, port scanning, OS fingerprinting, and vulnerability mapping. The module emphasizes how each scan type plays a role in simulating real-world attacks and in strengthening cybersecurity posture through proper defense mechanisms. 🎯 Learning Objectives: Understand the purpose of network scanning in the hacking lifecycle Differentiate between types of scanning: ping sweeps, port scanning, service enumeration Perform TCP, UDP, and stealth scans using tools like Nmap Identify live hosts, open ports, and running services on a network Learn techniques like banner grabbing, OS detection, and vulnerability scanning Analyze scan results and correlate findings with potential attack vectors 🧠 Tools & Techniques Covered: Nmap, Zenmap, Netcat, Hping3, Masscan, Nessus (intro only) SYN, FIN, NULL, Xmas, and ACK scan techniques OS fingerprinting (active vs passive) Service version detection and banner grabbing Firewall and IDS evasion basics (without exploitation) 🛡️ Professional Relevance: Network scanning bridges the gap between information gathering and exploitation. For red team professionals, it provides attack surface visibility. For blue teams, understanding scanning methods helps in detecting reconnaissance attempts and setting up network-based defenses (e.g., firewalls, IDS/IPS). This module prepares students to move from theoretical learning to practical engagement with real-world networks.

Module 4 – Enumeration
✅ Module Description: Enumeration is the final phase of pre-attack intelligence gathering, where ethical hackers actively extract detailed information from discovered systems. This module teaches students how attackers probe network services to retrieve usernames, system names, shares, policies, and more—all essential for crafting targeted exploits. Students will explore how enumeration differs from general scanning, focusing on interaction with live systems to uncover actionable data. By understanding the techniques used during enumeration, learners will be able to recognize potential weaknesses in exposed services and strengthen defenses accordingly. 🎯 Learning Objectives: Define enumeration and distinguish it from reconnaissance and scanning Understand common enumeration protocols: NetBIOS, SNMP, LDAP, SMTP, NFS, SMB, and RPC Enumerate users, groups, network resources, shares, and system banners Perform enumeration on Windows and Linux systems Analyze enumeration results for vulnerability exposure and attack planning 🧠 Tools & Techniques Covered: Nmap scripts, enum4linux, SNMPWalk, LDAP enumeration tools, rpcclient SMTP and DNS enumeration via nslookup, dig, and manual interaction SMB enumeration and share discovery Brute-force username guessing and login attempts Active Directory enumeration basics 🛡️ Professional Relevance: Enumeration reveals the inner workings of a system or domain—knowledge often used to escalate privileges or move laterally. For red teamers, this phase sets the stage for exploitation. For blue teamers, it emphasizes the need to secure exposed services, apply least privilege principles, and monitor for suspicious querying behavior. Mastering enumeration gives students insight into attacker logic and sharpens their ability to defend complex systems from within.

Student Ratings & Reviews

No Review Yet
No Review Yet