Course
digicode: CEHM
EC-Council: Certified Ethical Hacker- Master (v13 CEH)
Course facts
- Mastering the five phases of ethical hacking for the systematic identification, exploitation, and protection of vulnerabilities
- Using AI-supported tools to automate and increase the efficiency of security-related tasks
- Analyzing and securing modern IT environments such as web, cloud, mobile, and IoT/OT
- Performing realistic attack simulations to strengthen practical defense capabilities
- Applying modern threat hunting and defense methods for early detection and defense against advanced attacks
- Demonstrating key attack vectors to understand typical attacker tactics
- Performing network scans to identify active and vulnerable systems
- Performing OS banner grabbing and service and user enumeration to analyze systems in a targeted manner
- Performing system hacking, steganography, stegananalysis, and cover-up techniques to understand real-world attack techniques
- Identifying and exploiting malware, worms, and viruses to understand typical exploitation strategies
- Performing packet sniffing to analyze network traffic and identify vulnerabilities
- Performing web server and web application attacks, e.g., directory traversal, parameter manipulation, or XSS
- Performing SQL injection attacks to uncover database and application vulnerabilities
- Performing cryptographic attacks to understand vulnerabilities in encryption mechanisms
1 Introduction to Ethical Hacking
2 Footprinting and Reconnaissance
3 Scanning Networks
4 Enumeration
5 Vulnerability Analysis
6 System Hacking
7 Malware Threats
8 Sniffing
9 Social Engineering
10 Denial-of-Service
11 Session Hijacking
12 Evading IDS, Firewalls, and Honeypots
13 Hacking Web Servers
14 Hacking Web Applications
15 SQL Injection
16 Hacking Wireless Networks
17 Hacking Mobile Platforms
18 IoT and OT Hacking
19 Cloud Computing
20 Cryptography
All 20 modules of the official EC Council course “Certified Ethical Hacker (v13 CEH)” will be covered.
Consists of the following modules
- EC-Council: Certified Ethical Hacker Practical (v13 CEH) (CEHBP)
- EC-Council: Certified Ethical Hacker (v13 CEH) (CEHB)
The knowledge-transfer part of the training is structured in intervals and offers sufficient time to consolidate what has been learned and apply the content independently in the labs outside of the course. The attendance times focus on structured knowledge transfer and are complemented by the labs provided. This creates a balanced and sustainable learning experience.
The second part of the training focuses on applying what you have learned. Together with the trainer, you will work on practical hacking challenges from the exam-relevant CEH modules and apply the content directly in a hands-on manner. Guided exercises, targeted explanations, and group discussions promote sustainable knowledge transfer.
You will receive the EC-Council CEH Elite package from us. It consists of the following content and allows you to repeat and deepen the course content between the individual course days.
- Digital course materials
- Labs
- CEH Engage
- CEH Complete
- Microlearning library of 10 courses
This course is aimed at individuals who want to demonstrably strengthen and apply their practical skills in ethical hacking. It is suitable for IT professionals, security analysts, administrators, network and system managers, consultants, and technical managers who want to independently carry out and understand real attack scenarios. CEH Practical appeals to anyone who is operationally involved in cybersecurity, incident response, penetration testing, or vulnerability management within a company and wants to specifically expand their hands-on skills in realistic scenarios.
To get the most out of CEH v13, you should have at least two years of experience in the IT field and be familiar with Windows and Linux/Unix systems. In addition to solid networking fundamentals—especially TCP/IP, the OSI model, and key protocols such as Ethernet, ARP, IP, ICMP, TCP/UDP, DNS, DHCP, FTP, and HTTP—you are also expected to have Linux and Windows command line skills, including the use of Linux commands and package management under Debian/Kali. You should also be confident working with security-related operating systems such as Kali Linux or Parrot OS. A basic understanding of security concepts and frameworks (e.g., ISO 27001), data protection and compliance standards, and initial practical experience in ethical hacking – for example, through “expert hacking” training or certifications such as EC-Council Certified Network Defender, CompTIA Network+, or Security+ – are also advantageous. Basic knowledge of Bash or Python scripting is also helpful.
The aim of this certification is to demonstrate pure knowledge and genuine practical ethical hacking skills.
You will receive two exam vouchers from us, which you can redeem at the EC-Council Exam Center. There, you will create a user account and can freely choose your exam date and time. The exam takes place online and is monitored live by an EC-Council supervisor.
On the day of the exam, you log into your account and connect to the remote proctor using the “Start Exam” function. You will need a PC or Mac with a camera, microphone, and stable internet connection. Before starting, the proctor will perform a brief identity check, check your room and surroundings, and ensure that no aids are present (e.g., books, notes, or other devices). Have your ID or passport ready for the identity check.
During the exam, you must allow screen sharing, and the proctor will activate the exam for you. You must remain in the camera's field of view throughout the entire exam.
After submitting your exam, you will receive your results directly on the screen. Your digital certificate will be available a few days later on the EC Council portal (ASPEN).
Knowledge-based exam:
- Format: Multiple-choice exam, web-based
- Questions: 125
- Duration: 4 hours
Practical exam:
- 20 practical scenarios
- Port scanning (e.g., Nmap, Hping)
- Detecting vulnerabilities
- Exploits against systems (DoS, DDoS, session hijacking, web server/web app attacks, SQL injection, wireless attacks)
- Web security tools (e.g., Acunetix WVS)
- SQL injection detection tools (e.g., IBM AppScan)
- Working in a live network environment
- Online in the EC-Council Cyber Range
- Duration: 6 hours