CEH v13 Exam Topics & Modules

The CEH v13 certification covers 20 comprehensive modules designed to give you hands-on ethical hacking skills. Here's everything you need to know about the exam curriculum.

What's New in CEH v13?

CEH v13 introduces cutting-edge topics including AI-driven security, advanced cloud hacking techniques, and updated modules covering the latest attack vectors. The certification now includes over 550 attack techniques and emphasizes practical, hands-on skills through the iLabs environment.

Exam Overview

125
Total Questions
4 Hours
Duration
70%
Passing Score
Multiple Choice
Exam Format

All 20 CEH v13 Modules

Module 1

Introduction to Ethical Hacking

Understand the fundamentals of ethical hacking, information security threats, attack vectors, and hacking concepts.

Information Security OverviewHacking ConceptsEthical Hacking ConceptsInformation Security Controls
Module 2

Footprinting and Reconnaissance

Learn techniques to gather information about target systems through footprinting, OSINT, and social engineering.

Footprinting ConceptsSearch Engine FootprintingWeb FootprintingEmail FootprintingWHOIS Footprinting
Module 3

Scanning Networks

Master network scanning techniques to discover live hosts, open ports, and services running on target systems.

Network Scanning ConceptsScanning ToolsHost DiscoveryPort ScanningOS Discovery
Module 4

Enumeration

Extract detailed information about target systems including usernames, groups, and network resources.

Enumeration ConceptsNetBIOS EnumerationSNMP EnumerationLDAP EnumerationDNS Enumeration
Module 5

Vulnerability Analysis

Identify security vulnerabilities in systems using various scanning tools and assessment methodologies.

Vulnerability AssessmentVulnerability ScoringVulnerability ToolsVulnerability Reports
Module 6

System Hacking

Learn techniques to gain access to systems, escalate privileges, and maintain access while clearing tracks.

Password CrackingPrivilege EscalationMaintaining AccessClearing LogsCovering Tracks
Module 7

Malware Threats

Understand different types of malware, their propagation methods, and analysis techniques.

Malware ConceptsTrojansVirusesWormsFileless MalwareMalware Analysis
Module 8

Sniffing

Capture and analyze network traffic to extract sensitive information using sniffing techniques.

Sniffing ConceptsMAC AttacksDHCP AttacksARP PoisoningDNS PoisoningSniffing Tools
Module 9

Social Engineering

Explore human-based attack vectors and manipulation techniques used by attackers.

Social Engineering ConceptsPhishingIdentity TheftImpersonationInsider Threats
Module 10

Denial-of-Service

Learn about DoS and DDoS attack vectors, techniques, and defense mechanisms.

DoS/DDoS ConceptsBotnetsDoS Attack TechniquesDDoS Case StudiesDoS Protection
Module 11

Session Hijacking

Understand how attackers hijack user sessions and learn countermeasures.

Session Hijacking ConceptsApplication Level HijackingNetwork Level HijackingSession Hijacking Tools
Module 12

Evading IDS, Firewalls, and Honeypots

Learn techniques to bypass security controls and intrusion detection systems.

IDS ConceptsFirewall ConceptsHoneypot ConceptsEvasion Techniques
Module 13

Hacking Web Servers

Identify and exploit vulnerabilities in web server infrastructure.

Web Server ConceptsWeb Server AttacksWeb Server Attack MethodologyWeb Server Security
Module 14

Hacking Web Applications

Discover common web application vulnerabilities including OWASP Top 10.

Web Application ConceptsOWASP Top 10SQL InjectionXSSCSRFWeb App Security
Module 15

SQL Injection

Deep dive into SQL injection attacks, techniques, and prevention methods.

SQL Injection ConceptsTypes of SQL InjectionSQL Injection MethodologySQL Injection Tools
Module 16

Hacking Wireless Networks

Learn wireless network security concepts and attack methodologies.

Wireless ConceptsWireless EncryptionWireless ThreatsWireless Hacking ToolsBluetooth Hacking
Module 17

Hacking Mobile Platforms

Understand mobile platform vulnerabilities and security for iOS and Android.

Mobile Platform Attack VectorsAndroid HackingiOS HackingMobile SecurityMDM
Module 18

IoT and OT Hacking

Explore security challenges in Internet of Things and Operational Technology.

IoT ConceptsIoT AttacksIoT Hacking MethodologyOT ConceptsOT Attacks
Module 19

Cloud Computing

Learn cloud security concepts, threats, and attack vectors for major cloud platforms.

Cloud Computing ConceptsContainer TechnologyCloud ThreatsCloud SecurityCloud Hacking
Module 20

Cryptography

Understand encryption algorithms, PKI, and cryptographic attacks.

Cryptography ConceptsEncryption AlgorithmsPKIEmail EncryptionCryptanalysis

Study Tips for CEH v13

Hands-on Practice

Use the EC-Council iLabs environment to practice real-world attack scenarios.

Focus on Tools

Master common tools like Nmap, Wireshark, Metasploit, and Burp Suite.

Understand Concepts

Don't just memorize - understand the underlying principles of each attack.

Stay Updated

Keep up with the latest cybersecurity news and emerging threats.

Ready to Master These Topics?

Get our comprehensive CEH v13 preparation bundle with practice exams covering all 20 modules.

Get CEH v13 Bundle