Certified Ethical Hacker (CEH) v13

EC-Council’s CEH v13: The Leading Ethical Hacking Course with AI Integration

Certified Ethical Hacker v13

Gain a competitive edge with CEH

From the creators of Certified Ethical Hacker (CEH) comes the new and evolved version 13 with added AI capabilities. Structured across 20 learning modules covering over 550 attack techniques, CEH provides you with the core knowledge you need to thrive as a cybersecurity professional.

  • Benefit from flexible learning options
  • Earn a globally recognized certificate
  • Get practical learning with 221 hands-on labs

Course Inquiry

What's new in Version 13

AI-powered

The world's first ethical hacking certification to harness the power of AI.

Hands-on experience

Hone your skills in real-world scenarios through hands-on labs, where you practice attack vectors and master advanced hacking tools.

40% more efficiency

Learn AI-driven techniques to boost efficiency in cyber defense by 40% while streamlining your workflow.

Power-packed, updated curriculum

Master the latest advanced attack techniques, trends, and countermeasures.

2x productivity gains

Advanced threat detection, enhanced decision-making, adaptive learning, enhanced reporting, and automation of repetitive tasks.

Real-world skills, proven mastery

Participate in monthly global hacking competitions, compete with your peers, and make it to the leaderboard.

  • Mid-Level Information Security Auditor
  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Information Security Analyst 1
  • Infosec Security Administrator
  • Cybersecurity Analyst level 1, level 2, & level 3
  • Network Security Engineer
  • SOC Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
  • Senior SOC Analyst
  • Solution Architect
  • Cybersecurity Consultant
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • All-Source Analyst
  • Cyber Defense Incident Responder
  • Research & Development Specialist
  • Senior Cloud Security Analyst
  • Third Party Risk Management:
  • Threat Hunting Analyst
  • Penetration Tester
  • Cyber Delivery Manager
  • Application Security Risk
  • Threat Modelling Specialist
  • Web Application Penetration Testing
  • SAP Vulnerability Management - Solution Delivery Advisor
  • Ethical Hacker
  • SIEM Threat Responder
  • Product Security Engineer / Manager
  • Endpoint Security Engineer
  • Cybersecurity Instructor
  • Red Team Specialist
  • Data Protection & Privacy Officer
  • SOAR Engineer
  • AI Security Engineer
  • Sr. IAM Engineer
  • PCI Security Advisor
  • Exploitation Analyst (EA)
  • Zero Trust Solutions Engineer / Analyst
  • Cryptographic Engineer
  • AI/ML Security Engineer
  • Machine Learning Security Specialist
  • AI Penetration Tester
  • AI/ML Security Consultant

Course kits

While all CEH course kits have complete access to eCourseware and include an exam voucher, a few additional features and learning materials can be added to build deeper expertise and gain practical experience. This means that there is a CEH package to suit everyone’s learning requirements.

Most Popular
Learn, Certify, Engage & Compete
  • eCourseware
  • Exam Voucher
  • 10 Ethical Hacking Video Library
  • 6 Months of Official Labs
  • CEH Engage
  • Annual CEH Challenge Pass (12 CTF’s)
  • CEH Practical Exam
  • 1 Exam Retake*
Learn & Certify
  • eCourseware
  • Exam Voucher
  • 10 Ethical Hacking Video Library
  • 6 Months of Official Labs
  • CEH Engage
  • Annual CEH Challenge Pass (12 CTF’s)
  • CEH Practical Exam
  • 1 Exam Retake*

*Exam Retakes: This benefit provides candidates with the respective exam voucher on the ECC EXAM portal but excludes proctor administration fees which will apply for each attempt of the examination. Applicable to CEH Exam only. Please contact your training provider for details.

*Open AI API credits are not included as part of the program. Please refer to the FAQ for detailed information.

Course information

CEH is a globally-recognised certification with flexible-learning options to fit your lifestyle and commitments.

Course Brochure

Certified Ethical Hacker (CEH)

Download

One-of-a-kind learning framework, powered by AI

CEH follows a unique 4-step framework

Learn
Step 1
Learn

Develop your skills in core domains of cybersecurity with 20 modules. You'll experience 221 hands-on labs, 550 attack techniques, and over 4,000 hacking and security tools.

Certify
Step 2
Certify

Take a 4-hour exam with 125 multiple-choice questions, and a 6-hour practical exam with 20 real-life challenges to earn the CEH Master certification in CEH v13.

Engage
Step 3
Engage

Apply everything you’ve learned in a mock ethical hacking engagement. This four-part security engagement gives you a real ethical hacking engagement experience from start to finish against an emulated organization.

Compete
Step 4
Compete

Compete with peers globally with year-long access to 12 CTF challenges of 4 hours each to level up your skills and stay current on the latest trends.

What you’ll learn

EC-Council’s Certified Ethical Hacker (CEH) certification gives you the skills and knowledge needed to drive your career forward in the age of AI.

With CEH you'll learn how to think like a hacker and uncover any hidden vulnerabilities before hackers do.

We’ll equip you to:

  • Find and fix weaknesses:
    Discover how hackers exploit systems and learn how to keep your data safe.
  • Become a security expert:
    Master the top tools and techniques needed to strengthen your organization's security.
  • Protect your reputation:
    Learn to proactively prevent data breaches and safeguard your customers' trust.
  • Master ethical hacking with AI:
    Leverage AI-driven techniques to enhance your ethical hacking skills and stay ahead of cyber threats.

Learning framework

EC-Council’s exclusive 4-step framework provides a structured and comprehensive approach to mastering ethical hacking.

Step 1
Learn

CEH offers a balanced blend of knowledge-based training and hands-on labs using real-world scenarios and is powered by AI.

What’s covered
  • 100% virtualization with full access to pre-configured targets, networks, and attack tools
  • Pre-configured vulnerable websites
  • Vulnerable, unpatched operating systems
  • Fully networked environments
  • Wide range of target platforms to hone your skills
  • 550 attack techniques covered
  • Objective-oriented flags for critical thinking and applied knowledge assessment
  • Cloud-based cyber range
  • Practice every course objective on live machines and vulnerable targets
  • With access to over 4,000 hacking tools and various operating systems, you'll gain practical experience with industry-standard security tools, the latest vulnerabilities, and common operating systems
  • Our web-accessible range allows you to learn and practice from anywhere
Step 2
Certify

Upon completing the training, you can attempt both of our exams to demonstrate your skills and earn the CEH Master certification:

  • Take the knowledge exam
  • Complete the practical exam

The knowledge exam

This 4-hour exam with 125 multiple-choice questions will test your skills in:

  • Information security threats and attack vectors
  • Attack detection
  • Attack prevention
  • Procedures
  • Methodologies and more!
The practical exam

In 6 hours you’ll complete 20 real-world challenges to test your proficiency. You’ll do this by incorporating a live corporate network of VMs and applications with ethical hacking solutions to uncover any vulnerabilities.

Step 3
Engage

CEH helps you develop real-world experience in ethical hacking through hands-on practice in a Cyber Range.

CEH helps you develop real-world experience in ethical hacking through hands-on practice in a Cyber Range.
This 4-phase engagement requires critical thinking and tests the knowledge and skills you've gained through capturing a series of flags in each phase, demonstrating the live application of abilities in a consequence-free environment via EC-Council's Cyber Range.

Step 4
Compete

Get a year-long access to 12 CTF challenges. Each month presents a different theme and challenge with capture-the-flag style competitions focusing on ethical hackers' core skills and abilities.

Gain exposure to new tools, focus on new attack vectors, and try to exploit emerging vulnerabilities while gaining continuing education credits and keeping your skills and certifications current.

Climb the leaderboard

These 4-hour challenges are open all month long, allowing you to compete whenever you're ready. All you need is an internet connection and your hacking expertise – we provide the attack platform, targets, and all the necessary tools and training.

CEH-compete

Course outline

Learn the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Key topics covered: Elements of Information Security, Classification of Attacks, Hacker Classes, Ethical Hacking, AI-Driven Ethical Hacking, ChatGPT-Powered AI Tools for Ethical Hackers, CEH Ethical Hacking Framework, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Information Assurance (IA), Risk Management, Threat Intelligence Lifecycle, Incident Management, PCI DSS, HIPPA, SOX, GDPR, DPA

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.

Learn different network scanning techniques and countermeasures.

Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are included as well.

Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Learn about packet-sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Learn the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Learn about firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.

Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.

Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

Exam details

Certification is awarded when the knowledge exam is passed. In order to achieve CEH Master Level certification, an additional practical exam needs to be taken. This practical exam is optional.

The Knowledge Exam will test your skills in:

  • Information security threats and attack vectors
  • Attack detention
  • Attack prevention
  • Procedures
  • Methodologies

Format
Multiple choice

Duration
4 hours

Questions
125

Delivery
Online via the ECC exam portal

Passing score
60% to 85%

The practical exam is optional but will reward you with a higher level of certification. It will test your practical skills with:

  • Port scanning tools (eg, Nmap, Hping)
  • Vulnerability detection
  • Attacks on a system (eg, DoS, DDoS, session hijacking, web server and web application attacks, SQL injection, and wireless threats)
  • SQL injection methodology and evasion techniques
  • Web application security tools (eg, Acunetix WVS)
  • SQL injection detection tools (eg, IBM Security AppScan)
  • Communication protocols

Duration
6 hours

Questions
20 challenges

Delivery
iLabs Cyber Range

Passing score
60% to 85%

Who is CEH AI for?

Cybersecurity professionals

Drive your cybersecurity career forward with CEH, enhanced by the power of AI

Teams and organizations

Turbocharge your team's knowledge with certified ethical hacking powered by AI

Government and military

CEH is trusted and highly valued globally by government departments and defense bodies

Educators

Create and grow your own cybersecurity courses and programs

40% expected surge in demand for specialists in AI and Machine Learning

- World Economic Forum, Future of Jobs Report, May 2023

Trusted worldwide

Earn world-class certifications trusted and highly valued globally by government bodies, private organizations, and the defense.

Advance your career with our expert guidance.

IBM Logo Microsoft Logo TCS Logo Xerox Logo Accenture Logo CISCO Logo
  • Official Training: Available through EC-Council iClass, Authorized Training Centers (ATCs), and academic partners.
  • Self-Study: Materials available for purchase; eligibility application required for exam.
  • Funding: Payment plans, discounts, and military/tuition assistance may be available.
  • AI Integration: Automate and optimize cybersecurity workflows, double productivity, and learn to secure and hack AI systems.
  • Continuous Learning: Access to global competitions, practice ranges, and CodeRed learning libraries.
  • Accreditation & Recognition: Meets US DoD 8140 requirements and is accepted for college credit by many institutions.
  1. Choose your preferred training format (online, live, in-person).
  2. Enroll through EC-Council or an Authorized Training Center.
  3. Complete the training and hands-on labs.
  4. Attempt the CEH exam (and practical exam for Master level).
  5. Join the global network of certified ethical hackers.
testimonial

Before I started, I had some knowledge about KaliLinux, BackTrack, Wireshark and other tools, but the CEH gave me a more advanced training on these tools and many more.

Iskren-Yankon

Chief Expert Information Security Officer, Ministry of Agriculture, Food and Forestry

testimonial

CEH was my first confidence booster and helped land me a job on a Red team in the government sector.

Farzan Karimi

Engineering Manager, Android Offensive Security, Google

testimonial

Knowledge I gained from CEH gave me the confidence I needed to step into a role as a security engineer and penetration tester.

Roy Davis

Security Engineer, Zoom

Get advice

Schedule your consultation today and start achieving your goals

FAQs

CEH is a great place to start your career in cybersecurity, but you’re required to have some knowledge before applying. It’s recommended that you have a minimum of 2 years of IT security experience before attempting CEH. If you don’t have the experience and are just getting started on this path as an entry-level professional, we recommend taking our Cybersecurity Essentials Series where you can learn the foundations required to pursue mid-level and specialization certifications like CEH, CND, CHFI, CTIA, ECIH, CSA, CCISO, and others.

There are no specific prerequisites for the CEH program. However, we strongly recommend that candidates possess a minimum of 2 years of experience in IT security before attempting CEH.

CEH training involves testing systems and using them for purposes not originally intended. Candidates should understand the basic functions of those IT systems before attempting to hack them.

For example, CEH will teach the process of host evaluation leading to enumeration. In this process, trainees will scan downrange targets using common scanning techniques such as Nmap, which will respond with a list of ports. Enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems.

However, in this scenario, CEH will not teach you what a port is. This is essential knowledge that you must have to be successful in the class.

If you do not possess the foundational skills in IT and networking, we recommend starting with our Cybersecurity Essentials Series.

CEH pricing varies depending on a few factors. First, you need to decide whether you prefer online self-paced, online live, or in-person training. Speak with one of our career advisors about CEH costs and available funding options. We are excited that you are considering this career path, and our team is here to help you find the best CEH price that fits your budget and schedule.

Considering the global need and lack of qualified talent in the workforce, cybersecurity professionals are usually paid exceptionally well.

As of September 2024, a simple search on Salary.com for US -based positions shows that Ethical Hackers make an average of $110,757 per year, which is an increase of $6800 compared to $103,866 in 2022, and with the 90th percentile earning above $137,000.

Experience, education levels, and other certifications typically increase earning potential, but it’s common to see starting salaries for ethical hackers that often exceed six figures.

We recommend searching your local job boards, viewing local salary information, and talking to potential employers to assess your own value in the market. CEH has been ranked in the top 5 highest paid cybersecurity certifications for the last 10 years and continues to grow worldwide.

Ethical hacking is crucial to cybersecurity and offers extensive growth opportunities. If you want to learn ethical hacking on your own, it may seem easy, but it requires a lot of experience and knowledge.

You need to stay up-to-date with the latest hacking trends and resources in order to combat the escalating cyber threats. In addition to technical skills, you should also be familiar with basic hacking tools, penetration testing, and other aspects of ethical hacking, including the use of AI in cybersecurity.

The ethical hacking phases require extensive training and practical experience in areas such as attack vectors and penetration testing, SQL injection attacks, denial of service attacks, firewall attacks, password cracking, enumeration, and cloud computing.

There are many online resources available for learning ethical hacking, but it can be difficult to choose the right one. Therefore, it is important to have a structured learning method from a reliable source.

An accredited program like the EC-Council’s CEH (Certified Ethical Hacker) is considered the gold standard in ethical hacking and is recognized worldwide. If you’re passionate about this field and enjoy thinking outside the box, then you can build a successful career in this field.

Yes, CEH is available online through both self-paced learning and live instructor-led training. Click here for more information.

Getting certified is about validating your knowledge. CEH is trusted by employers across the globe as a baseline cybersecurity certification. Certified ethical hackers hold various job titles and roles because the ethical hacking process is fundamental to many cybersecurity operations.

While some organizations have ethical hackers in their job role framework, they often take on other forms with a specialization such as Network Defender, Penetration Tester, Secure Coder, Cloud Security Engineer, Security Architect, Auditor, and even leadership roles.

Yes, if you enroll as a student at EC-Council University (ECCU) and pursue a bachelor’s or master’s degree, many of the courses throughout the program align with industry certifications.

The CIS 404 Hacker Techniques, Tools, and Incident Handling program maps to the Certified Ethical Hacker exam. Students who complete this course through ECCU will be eligible to attempt the CEH exam.

CIS 404 Hacker Techniques, Tools, and Incident Handling +

Accreditations measure the capability of the certification body in various aspects, including program design, management, content, delivery, policy, discipline, financial viability, relevance of training, demand, and more.

CEH is accredited by:

  • ANAB (ANSI National Accreditation Board): Accredited under ISO/IEC 17024 standards.
  • The American Council on Education (ACE): Accredited under ACE ID ECCL-0002, CEH is credit bearing and transferrable for three elective credits.

Yes, the CEH is recognized by the United States military. It is eligible for military benefit reimbursement through the US Army Ignited program and is approved by the US Department of Veterans Affairs for reimbursement utilizing Post-9/11 GI Bill funds.

CEH is also recognized across various military forces in their enlisted and officer ranks, meeting the requirements of over 320 distinct job roles.

Funding and reimbursement eligibility may vary depending on the specific branch of the military.

Yes, the CEH is approved by the US Department of Defense (DoD) under Directive 8140 as meeting the baseline requirements for 4 out of the 5 Cybersecurity Service Provider Roles (CSSP) roles.

  • CSSP Analyst
  • CSSP Infrastructure Support
  • CSSP Incident Responder
  • CSSP Auditor

As mentioned in the 8140 Information Assurance Workforce Improvement Program, as per the latest DoD 8140, CEH is recognized for the following job roles:

  • 111 – All-Source Analyst
  • 141 – Warning Analyst
  • 511 – Cyber Defense Analyst
  • 531 – Cyber Defense Incident Responder
  • 541 – Vulnerability Assessment Analyst
  • 661 – Research & Development Specialist

8570 baseline certifications

Top Courses

Discover our most popular certifications and see for yourself why participants rate them so highly.

Accreditations and Recognitions

EC-Council is recommended and endorsed by leading organisations and government bodies in the cybersecurity industry.

American Council on Education
American Council on Education

EC-Council is recommended and endorsed by leading organisations and government bodies in the cybersecurity industry.

ANSI National Accreditation board
ANSI National Accreditation board

ANAB, the ANSI National Accreditation Board, provides accreditation services in over 75 countries and is the largest accreditation body in N. America.

Army Credentialing Assistance
Army Credentialing Assistance

Helps Army Soldiers with full tuition and exam cost coverage for IT, cybersecurity and project management certifications.

National Initiative for Cybersecurity Education
National Initiative for Cybersecurity Education

A partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.