CEH V13ai Brochure
CEH V13ai Brochure
BECOME A CERTIFIED
ETHICAL HACKER
Powered by AI Capabilities
LEARN | CERTIFY | ENGAGE | COMPETE
Ethical Hacking
Certification 12 C|EH Ranks 12th among the
Top 75 Highest-Paying IT
Certifications in the US and Globally
Certifications by ZDNet
95% Chose C|EH for
Career Growth
Ranked 4 Among
th 45+ Cybersecurity Job Roles Are
Mapped to the C|EH Certification in
2024, Compared to 20+ Roles in 2022
the Top 50 Leading
Cybersecurity Certifications
1 in every 2 Professionals Received
Promotions After Completing the C|EH
Cybersecurity Professionals
with AI Skills is on the Rise 66 % admit Being Unprepared
for AI Cyber Onslaughts
(EC-Council, 2024)
Countermeasures
AI Skills No Longer Optional;
They Are Essential Up to
AI
accelerate AI integration (IBM, 2024)
and automation slashed breach
impact by 30%, saving businesses
40% surge in demand for specialists in USD 850,000 and reducing breach
Artificial Intelligence and Machine lifecycles by 108 days (IBM, 2023)
Learning (World Economic Forum, 2023)
What’s New in
The CEH v13
1 Reconnaissance
cal Hacking
Ethi
of
AI
s
2
se
Scanning
5 Pha
Hacking
AI and
Using AI 3 Gaining Access
4 Maintaining Access
5 Clearing Tracks
1. Live-Online
2. Self-Paced Video Lectures
3. In-Person training
4. Masterclass
4. Maintaining Access
| Develop skills to maintain continued
access to the target systems
5. Clearing Tracks
| Master the art of erasing any
trace of your activities
Learn
CEH v13: The
World's First
1
Courseware
Cyber Range
Ethical Hacking Gain Skills
Certification with
a 4-Phase
AI-Powered
Learning Certify
Framework
2
Knowledge-Based
The C|EH v13 is a specialized, one-of-a- Practical Exam
kind training program that helps you gain Gain Recognition
expertise in ethical hacking, AI, and machine
learning. With hands-on training labs,
knowledge-based and practical exams, a
mock ethical hacking engagement on live
networks, and a global hacking competition,
this program ensures you master the most
in-demand skills needed to excel and
stand out in the cybersecurity industry.
Engage
3
This learning framework offers not only a Live Cyber Range
comprehensive training program to prepare
Gain Experience
you for the certification exam but also the
industry’s most robust, in-depth, hands-
on lab and practice range experience.
Compete
4
Global Ethical
Hacking Competition
Gain Respect
Learn
Certify
Vulnerability detection
Communication protocols
CEH Master
Upon successfully completing both the C|EH Knowledge-based Exam and the C|EH Practical
Exam, the C|EH (Master) designation is awarded. A C|EH (Master) signifies a high level of
proficiency in ethical hacking knowledge, skills, and abilities, with a total of 6 hours of testing to
prove their competency. The top 10 performers in both the C|EH Knowledge-based Exam and
C|EH Practical Exam are featured on the C|EH Master Global Ethical Hacking Leader Board.
Number of Questions/
125 Questions 20 Practical Challenges
Practical Challenges
Engage
The C|EH v13 program immerses you in real-world ethical hacking through
the dynamic C|EH practice environment. With C|EH Engage, you’ll sharpen
your skills and prove you have what it takes to thrive as an ethical hacker.
New to C|EH v13, learners will embark on their first emulated ethical hacking
engagement. This four-phase engagement requires students to think critically
and test the knowledge and skills gained by capturing a series of flags in
each phase. It demonstrates the live application of skills and abilities in a
consequence-free environment through EC-Council’s new “Cyber Range.”
As you complete your training and labs, C|EH Engage empowers you to put
theory into practice through a mock hacking engagement. You’ll navigate a
real-world, four-part engagement, targeting an emulated organization. Using a
capture-the-flag format, you’ll progress by answering critical “flag” questions,
gaining hands-on experience in a full-scale ethical hacking operation.
Your Mission:
Whether this is your first engagement or you’re honing your skills, get
ready to test your ethical hacking knowledge like never before! Once
you’ve practiced through the hands-on guided labs, it’s time to apply your
knowledge, take on the hacker’s persona, and find the vulnerabilities and
weaknesses in the ABCD organization (fictitious organization, but with real
live networks)—all built within our C|EH Engage (practice range).
Objectives
Armed with your attack platform (Parrot OS) and a plethora of tools used by ethical hackers,
you will embark on a 4-part engagement to assess ABCDorg’s security posture. Follow the
process, practice your TTP, and experience the real thing in a controlled environment with
no consequences. It’s the ultimate learning experience to support your career as an ethical
hacker! Each phase builds on the last as you progress through your ABCDorg engagement.
Phase 1 Phase 2
Vulnerability assessment: Gaining access:
Phase 4 Phase 3
Mobile, IoT, OT Exploitation: Perimeter and Web App Exploitation:
Compete
You will compete against other ethical hackers in a fast-paced, four-hour event as
you climb the leaderboard in curated CTFs designed around the ethical hacking
process. Each objective-based flag sharpens your current skills, tests your critical
thinking, and covers the latest vulnerabilities and exploits. Hosted entirely online in
EC-Council’s advanced Cyber Range, these scenario-based engagements are
set in fully developed network and application environments with real operating
systems, networks, tools, and vulnerabilities. You’ll have the opportunity to practice,
engage, compete, build and hone your hacking techniques as you engage with new
target organizations, all while racing against the clock to prove your mastery.
Hack Your Way to the Top – Become the Name Everyone Knows!
As an ethical hacker, you will battle to the top of the monthly Ethical Hacking Leaderboards as
you race against the clock in these four-hour CTF challenges. The challenge is open all month
long, so compete when you’re ready! Leaderboards” as you race against the clock in these 4-hour
CTF challenges. The challenge is open all month long, so compete when you’re ready!
Pre-Requisites
You need only an internet connection, and can compete through your browser.
We provide the attack platform, targets and all the required tools. You bring the skills to win!
Brief: You have been called in by a reputable MNC that was recently hit with malware.
This malware locked up their services and infected a slew of customers who were using their
software. The incident response team managed to extract some of the code. Now, your job
is to reverse-engineer the malware and identify encryption algorithms used, plus identify any
trace of command-and-control servers that may be helpful to law enforcement agencies.
Brief: Your employer, a large financial institution, has suffered a breach where hackers were
able to inject code into a web application, exposing sensitive customer data. Your company
has faced tremendous scrutiny from the public and must pay fines to its regulators.
You have to perform a series of manual and automated tests against the web application to
identify weaknesses and provide recommended countermeasures to the app security team.
Stay Ahead of
Emerging Threats:
Cloud Security
22. Senior Cloud Security Analyst 46. Machine Learning Security Specialist
Training Options
iLearn (Self-Study)
This solution is an asynchronous, self-study
environment in a video-streaming format.
Master Class
This solution offers the opportunity
to learn from world-class instructors
and collaborate with top information
security professionals.
About EC-Council
EC-Council’s sole purpose is to build and redefine
the cybersecurity profession globally.
Now Powered by AI
Visit: www.eccouncil.org/ceh