Training Highlights

CEH Course Highlights

40-Hour Instructor-led Online Training

CEH Course Highlights

EC-Council Authorized Partner

CEH Course Highlights

Median Salary of Cybersecurity Professionals

CEH Course Highlights

Access to Recorded Sessions

CEH Course Highlights

98% Pass Rate

CEH Course Highlights

24x7 Post-Training Support

CEH Course Highlights

CEI Certified Trainers

CEH Course Highlights

Scenario-based Learning

CEH - An Overview

The EC-Council’s Certified Ethical Hacker (CEH v13) Training program will enhance your knowledge of essential security fundamentals. Certified Ethical Hacker (CEH v13) certification course is one of the most sought-after security qualifications in the world. This internationally recognized security course validates your ability to discover weaknesses in the organization’s network infrastructure and aids in the effective combat of cyber-attacks.

The C|EH v13 program is a specialized, one-of-a-kind training program that teaches everything about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and a global hacking competition.

Course Curriculum

Module 1: Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Hacking Methodologies and Frameworks
  • Information Security Controls
  • Information Security Laws and Standards

 

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Internet Research Services
  • Footprinting through Social Networking Sites
  • Whois Footprinting
  • DNS Footprinting
  • Network and Email Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tasks using Advanced Tools and AI
  • Footprinting Countermeasures

 

Module 3: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Source Port Manipulation
  • Network Scanning Countermeasures

 

Module 4: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures

 

Module 5: Vulnerability Analysis 

  • Vulnerability Assessment Concepts
  • Vulnerability Scoring Systems and Databases
  • Vulnerability-Management Life Cycle
  • Vulnerability Research
  • Vulnerability Scanning and Analysis
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

 

Module 6: System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs

 

Module 7: Malware Threats

  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Viruses and Worms
  • Fileless Malware Concepts
  • AI-based Malware Concepts
  • Malware Countermeasures
  • Anti-Malware Software

 

Module 8: Sniffing

  • Sniffing Concepts
  • Sniffing Technique
  • Sniffing Tools
  • Sniffing Countermeasures

 

Module 9: Social Engineering

  • Social Engineering Concepts
  • Human-based Social Engineering Techniques
  • Computer-based Social Engineering Techniques
  • Mobile-based Social Engineering Techniques
  • Social Engineering Countermeasures

 

Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Countermeasures

 

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures

 

Module 12: Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection/Prevention System (IDS/IPS) Concepts
  • Firewall Concepts
  • IDS, IPS, and Firewall Solutions
  • Evading IDS/Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Honeypot Concepts
  • IDS/Firewall Evasion Countermeasures

 

Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Patch Management

 

Module 14: Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API and Webhooks
  • Web Application Security

 

Module 15: SQL Injections 

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • Evasion Techniques
  • SQL Injection Countermeasures

 

Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Attack Countermeasures

 

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines
  • Mobile Security Tools

 

Module 18: IoT Hacking & OT Hacking

  • IoT Hacking
  • IoT Concepts and Attacks
  • IoT Hacking Methodology
  • OT Hacking

 

Module 19: Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Hacking
  • Cloud Hacking Methodology
  • AWS Hacking
  • Microsoft Azure Hacking
  • Google Cloud Hacking
  • Container Hacking
  • Cloud Security

 

Module 20: Cryptography

  • Cryptography Concepts and Encryption Algorithms
  • Applications of Cryptography
  • Cryptanalysis
  • Cryptography Attack Countermeasures

 

Download Brochure

Course Objectives

  • Ethical hacking fundamentals, cyber kill chain concepts, an overview of information security and security measures with AI-enhanced threat detection and response.
  • Concepts, methodologies, and tools of footprinting using AI for automated information gathering and reconnaissance.
  • Concepts of vulnerability assessment, its categories and strategies, and AI-driven exposure to technologies used in the industry.
  • Social engineering concepts and terminologies, including identity theft, impersonation, insider threats, social engineering techniques, and AI-based countermeasures.
  • Operational Technology (OT) essentials, threats, attack methodologies, and AI-powered attack prevention.
  • Recognizing vulnerabilities in IoT and ensuring the safety of IoT devices using AI-based security solutions.
  • Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, cryptanalysis, and enhanced cryptographic defense.
  • Cloud computing, threats and security, AI-driven container technology, and serverless computing security measures.

Tools Covered

Footprinting Tools

  • Maltego
  • Foca
  • Recon-ng
  • Google Dorks
  • Whois
  • theHarvester
  • Shodan
  • Dnsrecon
  • Grecon
  • Photon
  • Sherlock
  • Spiderfoot
  • holehe

Scanning Tools

  • Nmap
  • Rustscan
  • sx-Tool
  • Colasoft Packet Builder
  • Nessus
  • OpenVAS
  • QualysGuard
  • Nikto
  • Angry IP Scanner
  • Hping3

Enumeration Tools

  • Netcat
  • SNMPCheck
  • SNMPEnum
  • Enum4Linux
  • NbtScan
  • SuperEnum
  • RPCScan
  • Dnsrecon

Vulnerability Assessment Tools

  • Nessus
  • OpenVAS
  • QualysGuard
  • Nikto
  • Burp Suite
  • W3af

System Hacking Tools

  • Metasploit Framework
  • Msfvenom
  • Cain & Abel
  • John the Ripper
  • Hydra
  • Medussa
  • Hashcat
  • RainbowCrack
  • Havoc
  • PowerSploit
  • Reverse-shell-generator
  • L0pthCrack
  • Winrtgen
  • pwdump7
  • Tanium Endpoint Management

Sniffing Tools

  • Wireshark
  • Tcpdump
  • Ettercap
  • Dsniff
  • MITM
  • Cain & Abel
  • Macchanger

Social Engineering Tools

  • Social-Engineer Toolkit (SET)
  • Dark-Phish
  • Shellphish

Denial of Service Tools

  • Slowloris
  • LOIC
  • HOIC
  • UltraDDoS
  • pyDDoS
  • PyFlooder

Session Hijacking Tools

  • CAIDO
  • Hetty
  • OWASP ZAP

Evading IDS, Firewall, and Honeypots Tools

  • Nmap
  • Tcpreplay
  • Snort
  • Hping3
  • Pfsense

Hacking Web Server Tools

  • Ghost_eye
  • Impacket
  • Ncat
  • NMAP
  • Httprecon
  • ID Serve

Web Application Hacking Tools

  • OWASP ZAP
  • Burp Suite
  • SQLmap
  • Wapiti
  • Nikto
  • DirBuster
  • Wpscan
  • Skipfish
  • PwnXSS
  • Dirsearch
  • ClickjackPOC

SQL Injection Tools

  • DSSS
  • ghauri
  • SQLmap

Hacking Wireless Networks Tools

  • Sparrow-wifi
  • Airodump-ng
  • Aircrack-ng

Hacking Mobile Platforms Tools

  • AndroRAT
  • PhoneSploit-Pro
  • LOIC

IoT and OT Tools

  • Bevywise IoT Simulator

AI Tools

  • ShellGPT
  • Tranis AI
  • Malware.AI
  • ChatGPT
  • DeepfakeVFX
  • SmartScanner
  • OSS Insight
  • DeepExploit
  • Hoodem

Target Audience

This course is ideal for:

  • Security Analysts
  • Ethical Hackers
  • System Administrators
  • Network Administrators
  • Network and Security Engineers
  • Cyber Security Managers
  • Information Security Auditors
  • Security Professionals

Pre-requisites

  • Basic understanding of network essentials and core concepts, including server and network components.

Exam Details

Certification Name C|EH v13 (MCQ Exam) C|EH v13 (Practical Exam)
Exam Format Multiple Choice Questions iLabs Cyber Range
Number of Questions 125 Questions 20 Questions
Exam Duration 240 Minutes 360 Minutes
Passing Score 60% to 85% 60% to 85%
Exam Delivery VUE / ECCEXAM

Talk To Our Experts

CEH Training Calendar

Start Date End Date Start/End Time Batch Type Training Mode Batch Status
02-May-2026 07-Jun-2026 09:00 - 13:00 (IST) Weekend Online [ Open ] Enroll
06-Jun-2026 12-Jul-2026 19:00 - 23:00 (IST) Weekend Online [ Open ] Enroll
Training Calendar

Can't Find a Suitable Schedule? We Can Help You Customize

Choose Your Preferred Learning Mode

1-TO-1 Training

1-TO-1 TRAINING

  • Customized Schedule
  • Learn at Your Dedicated Hour
  • Instant Clarification of Doubts
  • Guaranteed to Run
Online Training

ONLINE TRAINING

  • Flexible, Convenient & Time Saving
  • Highly Interactive
  • Affordable Yet Effective
  • Guaranteed to Run
Corporate Training

CORPORATE TRAINING

  • Anytime, Anywhere - Across The Globe
  • Hire a Trainer
  • Your Schedule, Your Pace
  • Customized for Your Team

Our Expert Course Advisors

Ashish Dhyani|InfosecTrain Instructor
Ashish Dhyani
10+ Years of Experience
Network+ | Security+| Pentest+ | CEH | CND | ECSA | CCNA | ECDE
10+ years of experience as a Network Security Expert in delivering training to government and non-government organizations around the globe on different cyber security verticals and Network Security.
SANYAM NEGI|InfosecTrain Instructor
SANYAM NEGI
10+ Years of Experience
CEH | CSA | CND | CHFI | CTIA | CCISO | Security+ | Pentest+ | CySA+
Sanyam is an Information Security Consultant & Trainer with 10+ years of hands-on experience in Security Testing, Cloud Security, Threat Hunting and DevOps. He is adept at designing tailored training programs and courseware on Security Solutions for various organizations.
ABHISHEK SHARMA|InfosecTrain Instructor
ABHISHEK SHARMA
10+ Years of Experience
Information Security Corporate Trainer
10+ years of experience as an Information Security Consultant and Trainer in delivering training to government and non-government organizations around the globe on different Information security verticals.
Ashish Rawat|InfosecTrain Instructor
Ashish Rawat
10+ Years of Experience
CISSP | CISA | CISM | CEH | CCSK | CCSP | CCIE | PMP | MCSE
Ashish have Over 10 years of experience in Cyber & Cloud Security Architecture, Product Security, Risk Management, and Project Management. Ashish Holds certifications including CISSP, CISA, CISM, PMP, CCSK, CCSP, CCIE (Security), ITIL, RHCE, MCSE, AWS Solutions Architect, CEH, and PRINCE2.
Prerna|InfosecTrain Instructor
Prerna
7+ Years of Experience
Information Security Management Consultant and Trainer
With over 7+ hands-on experience in Information Systems Management, OSINT, cybersecurity, and GRC integration, Prerna provides tailored training to global organizations, ensuring professionals meet industry standards and compliance. She excels in security management, vulnerability assessments, and risk management, with a proven track record of high exam success rates.
Amit|InfosecTrain Instructor
Amit
6+ Years of Experience
Information Security | Cloud Security | Cloud Audit | Consultant and Trainer
An experienced Information Security Consultant and Trainer. Proven expertise in deploying, migrating, auditing and securing various public cloud platforms including Amazon Web Services (AWS) & Microsoft Azure.

Why Choose InfosecTrain?

InfosecTrain - Your Trusted Cybersecurity Training Partner

Learn from certified trainers and industry experts

InfosecTrain - Your Trusted Cybersecurity Training Partner

Practice with labs, regular assessments, and case studies

InfosecTrain - Your Trusted Cybersecurity Training Partner

Get immersed in scenario-based learning

InfosecTrain - Your Trusted Cybersecurity Training Partner

Best Quality Training with Best Price Guarantee

InfosecTrain - Your Trusted Cybersecurity Training Partner

Prepare to excel with mock tests, exam tips, and real-world examples

InfosecTrain - Your Trusted Cybersecurity Training Partner

Conquer the exam and achieve success in the very first attempt

InfosecTrain - Your Trusted Cybersecurity Training Partner

Updated curriculum aligned with CEH version 13

InfosecTrain - Your Trusted Cybersecurity Training Partner

Choose our Flexible Learning schedule on weekdays or weekends

Benefits of CEH Certification

Benefits of ceh Certification

Get global recognition

Benefits of ceh Certification

Maximize your earning potential

Benefits of ceh Certification

Earn the status of a cybersecurity expert

Benefits of ceh Certification

Advanced career growth

Benefits of ceh Certification

Become a part of an esteemed community

Average salary range for different Cybersecurity profiles

Benefits of ceh Certification

Confused if this is the right course for you

Words Have Power

I had a truly enriching experience with the CEH Course from InfosecTrain. The course was meticulously crafted, and the trainer’s teaching approach was exceptional. I am completely content with the course.

Aditya Vivek Kulkarni

Aditya Vivek Kulkarni

UAE

Reflecting on my experience with the CEH Course from InfosecTrain, it was truly exceptional. Throughout the course, I gained a wealth of ideas and knowledge. The trainer’s expertise in CEH and the security sector was remarkable, and his approachability and friendliness made the learning experience even more enriching. I look forward to participating in more of his classes in future courses offered by InfosecTrain.

Nizamuddin ck

Nizamuddin ck

UAE

I’m grateful for the opportunity to have learned with your team through the CEH Course offered by InfosecTrain. The course provided valuable practical learning experiences, enhancing my understanding and skills in cybersecurity.

Fernando Guerra

Fernando Guerra

Chile

My learning journey with the CEH Course from InfosecTrain was truly remarkable. The course delivered excellent explanations and practical lab exercises. Overall, I am highly satisfied with both the team and the trainer. Their clear explanations and engaging lab sessions significantly enhanced my understanding and skills.

Dr Surya Prakash Okhrabo

Dr Surya Prakash Okhrabo

Nepal

The CEH Course provided by InfosecTrain was highly informative, and the overall experience was commendable. The training was thorough and well-structured, contributing to a positive learning experience.

Shivam Chandra

Shivam Chandra

India

Real Stories, Real Success

CEH Success Story
CEH Success Story
CEH Success Story
CIPPE Training Certification Success Rate

Frequently Asked Questions

What is the CEH v13 course?

The Certified Ethical Hacker course from the EC-Council will improve your understanding of key security principles. This version introduces advanced ethical hacking techniques, including AI-powered tools for automated threat detection, vulnerability scanning, and penetration testing. This course enables you to think like a hacker and provides the skills to protect your infrastructure.

How does CEH v13 differ from v12?

CEH v13 introduces AI-powered tools, enhanced cloud and IoT security, and new attack vectors, reflecting the latest industry trends and real-world cybersecurity challenges.

Which is the best ethical hacking certification?

EC-Council Certified Ethical Hacker (C|EH v13) program is one of the most prestigious certifications in the cybersecurity field. For two decades, it has held the top choice in the world for ethical hacking certification, and numerous firms have consistently placed it first.

What are the prerequisites for doing CEH certification?

To pursue CEH certification you must have a basic understanding of networking essentials and core concepts, including server and network components.

What is the qualification for an Ethical Hacker?

It is recommended to have a bachelors degree in Computer Science or related discipline.

How many questions are on the CEH exam?

There are 125 questions in the CEH objective exam and 20 questions in the practical exam.

What is the pass rate for CEH?

The passing score is 60%-80% in the CEH objective exam and 70% in the practical exam.

Who can register for this CEH Certification training course?

This course is suitable for Security Analysts, System Administrators, Network Administrators, Network and Security Engineers, Cyber Security Managers, Information Security Auditors, Security Professionals or anyone who is interested in becoming an Ethical Hacker.

What are the career opportunities after CEH?

Career opportunities after CEH:

  • Security Analyst
  • Penetration Tester
  • Malware Analyst
  • Cybersecurity Consultant
  • Cloud Security Expert
  • AI Security Specialist
  • IoT Security Specialist

How long is the CEH v13 Certification training course?

The CEH course is a comprehensive training program spanning 40 hours.

Where can I enroll in the CEH Certification training course?

Enroll in the CEH Certification Training at InfosecTrain:

  • Visit the InfosecTrain website, www.infosectrain.com, and navigate the CEH Certification training page.
  • Fill out the registration form.
  • You will get a confirmation email with further instructions.
  • Book your free demo with Expert.

You can also directly drop mail with your requirements at sales@infosectrain.com

Reach Us

Need Help? Reach Us.

Top