Course
digicode: CEHBP
EC-Council: Certified Ethical Hacker Practical (v13 CEH) (CEHBP)
Course facts
Download as PDF- Demonstrating knowledge of attack vectors
- Performing network scans to identify active and vulnerable computers on a network
- Performing OS banner grabbing as well as service and user enumeration
- Performing system hacking, steganography, steganalysis attacks, and cover-up techniques
- Identifying and using viruses, computer worms, and malware to exploit systems
- Performing packet sniffing
- Performing a variety of attacks on web servers and web applications, including directory traversal, parameter manipulation, XSS, etc.
- Performing SQL injection attacks
- Performing various types of cryptography attacks
- Performing vulnerability analyses to identify security gaps
All 20 modules of the official EC-Council course “Certified Ethical Hacker (v13 CEH)” will be covered.
1 Introduction to Ethical Hacking
2 Footprinting and Reconnaissance
3 Scanning Networks
4 Enumeration
5 Vulnerability Analysis
6 System Hacking
7 Malware Threats
8 Sniffing
9 Social Engineering
10 Denial-of-Service
11 Session Hijacking
12 Evading IDS, Firewalls, and Honeypots
13 Hacking Web Servers
14 Hacking Web Applications
15 SQL Injection
16 Hacking Wireless Networks
17 Hacking Mobile Platforms
18 IoT and OT Hacking
19 Cloud Computing
20 Cryptography
Component of the following courses
Together with the instructors, you’ll work through practical hacking challenges from 10 CEH modules relevant to the exam and apply the material directly through hands-on exercises. Guided exercises, targeted explanations, and group discussions promote lasting knowledge retention.
We will provide you with the EC-Council CEH Elite Package. This includes the following resources and allows you to review and reinforce the course material between class sessions:
- Digital course materials
- Labs
- CEH Engage
- CEH Complete
- Microlearning library comprising 10 courses
This course is designed for individuals who wish to demonstrably strengthen and apply their practical skills in ethical hacking. It is suitable for IT professionals, security analysts, administrators, network and system administrators, as well as consultants and technical managers who want to independently execute and understand real-world attack scenarios. The CEH Practical appeals to anyone involved in cybersecurity, incident response, penetration testing, or vulnerability management within their organization who wishes to specifically expand their hands-on expertise in realistic scenarios.
To get the most out of the training, you should be familiar with both Windows and Linux/Unix systems. In addition to a solid foundation in networking—particularly TCP/IP, the OSI model, and key protocols such as Ethernet, ARP, IP, ICMP, TCP/UDP, DNS, DHCP, FTP, and HTTP—knowledge of Linux and Windows command lines is also expected, including the use of Linux commands and package management under Debian/Kali. You should also be able to work confidently with security-focused operating systems such as Kali Linux or Parrot OS. Basic knowledge of Bash or Python scripting is also helpful.
To earn the «CEH Master» certification, you must have obtained the «Certified Ethical Hacker (CEHB)» certification. We recommend taking the following course beforehand:
The goal of this certification is to demonstrate genuine, practical ethical hacking skills. This course builds on the «Certified Ethical Hacker (CEHB)» course. Only after you have earned both the «Certified Ethical Hacker» certification and the certification for this course will you become a «CEH Master».
You will receive an exam voucher from us, which you redeem at the EC-Council Exam Center. There, you create a user account and can freely choose your exam date and time. The exam takes place online and is monitored live by an EC-Council proctor.
On the day of the exam, log in to your account and connect to the remote proctor using the “Start Exam” feature. You’ll need a PC or Mac with a camera, microphone, and a stable internet connection. Before the exam begins, the proctor will conduct a brief identity verification, check your room and surroundings, and ensure that no aids are present (e.g., books, notes, or other devices). Have your ID or passport ready for the identity verification.
During the exam, you must allow screen sharing, and the proctor will start the exam for you. You must remain within the camera’s field of view for the entire duration of the exam.
After submitting your answers, you will receive your results directly on the screen. Your digital certificate will be available a few days later on the EC-Council portal (ASPEN).
Exam:
- 20 practical scenarios
- Port scanning (e.g., Nmap, Hping)
- Identifying vulnerabilities
- Exploits against systems (DoS, DDoS, session hijacking, web server/web app attacks, SQL injection, wireless attacks)
- Web security tools (e.g., Acunetix WVS)
- SQL injection detection tools (e.g., IBM AppScan)
- Working in a live network environment
- Online in the EC-Council Cyber Range
- Duration: 6 hours