Certified Ethical Hacker C|EH v13 AI

Course summary Certified Ethical Hacker offers a balanced blend of knowledge-based training and hands-on labs. This all takes place in a virtual environment with live targets as well as the latest in AI tools, techniques, and systems. Who is a Certified Ethical Hacker? A Certified Ethical Hacker is a specialist typically working in a red […]

EC Council

Delivered in partnership with EC-Council, the world’s leading cybersecurity certification body—home of CEH, CHFI, and CCISO.
8 dates available
19 - 23 January 2026 Best Value
Weekdays only
Online
8 hours/day
5 days
1.750,00  + VAT
Apply now
02 - 06 March 2026
Weekdays only
Online
8 hours/day
5 days
1.750,00  + VAT
Apply now
20 - 24 April 2026
Weekdays only
Online
8 hours/day
5 days
1.750,00  + VAT
Apply now
22 - 26 June 2026
Weekdays only
Online
8 hours/day
5 days
1.750,00  + VAT
Apply now
17 - 21 August 2026
Weekdays only
Online
8 hours/day
5 days
1.750,00  + VAT
Apply now
21 - 26 September 2026
Weekdays only
Online
8 hours/day
5 days
1.750,00  + VAT
Apply now
02 - 06 November 2026
Weekdays only
Online
8 hours/day
5 days
1.750,00  + VAT
Apply now
07 - 11 December 2026
Weekdays only
Online
8 hours/day
5 days
1.750,00  + VAT
Apply now
Online Course

Course Summary

Below, you'll find a summary of your enrollment details
Course: Certified Ethical Hacker C|EH v13 AI
Location: Online
Duration:

Course summary

Certified Ethical Hacker offers a balanced blend of knowledge-based training and hands-on labs. This all takes place in a virtual environment with live targets as well as the latest in AI tools, techniques, and systems.

  • 100% visualization with full access to pre-configured targets, networks, and attack tools
  • Pre-configured vulnerable websites o Vulnerable, unpatched operating systems
  • Fully networked environments of 4000+ hacking tools
  • Wide range of target platforms to hone your skills, with 550 attack techniques covered
  • Objective-oriented flags for critical thinking and applied knowledge assessment
  • Cloud-based cyber range

Who is a Certified Ethical Hacker?

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A C|EH® understands attack strategies and the use of creative attack vectors and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

What’s new for version 13

  • AI-powered

The world’s first ethical hacking program to harness the power of AI.

  • Hands-on experience

Cybersecurity professionals can hone their skills in real-world scenarios through hands-on labs. Here, they’ll practice attack vectors and master advanced hacking tools.

  • 40% more efficient
    Learn AI-driven techniques to boost 40% more efficiency in cyber defense while streamlining workflows.
  • Power-packed, updated curriculum
    Master the latest advanced attack techniques, trends, and countermeasures.
  • 2x productivity gains
    Advanced threat detection, enhanced decision-making, adaptive learning, enhanced reporting, and automation of repetitive tasks.
  • Real-world skills, proven mastery
    Participate in monthly global hacking competitions, compete with peers, and make it onto the leaderboard.

Learning Program

  • 5 days of training
  • 20 modules
  • 91 Core Labs + 130 Self-study Labs*
  • 3000+ Student Manual Pages
  • Learn how to hack multiple operating systems
  • (Windows 11, Windows servers, Linux,
  • Ubuntu, Android)
  • MITRE Attack Framework
  • Diamond model of intrusion analysis
  • Techniques for establishing persistence
  • Evading NAC and endpoint security
  • Understand Fog, Edge, and Grid Computing Model

C|EH v13 – Inclusions & Validity

InclusionsLite Package ValidityElite Package Validity
eCourseware2 years2 years
Exam Voucher1 year1 year
Ethical Hacking Videos1 year1 year
Exam Retakes1
EC-Council Labs6 months
C|EH Engage1 year
Global C|EH Challenge1 year
C|EH Practical1 year

CEH Exam

The C|EH® exam is a 4-hour exam with 125 multiple-choice questions. This knowledge-based exam will test our skills in information security threats and attack vectors, attack detection, attack prevention, procedures, methodologies, and more!

Course Outline

From the creators of Certified Ethical Hacker (CEH) comes the new and evolved version 13 with added AI capabilities. Structured across 20 learning modules covering over 550 attack techniques, CEH provides the core knowledge needed to thrive as a cybersecurity professional.

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks 
  • Module 04: Enumeration Module
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking 
  • Module 07: Malware Threats 
  • Module 08: Sniffing 
  • Module 09: Social Engineering 
  • Module 10: Denial-of-Service 
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography
     

Which certification is best for hacking?

The CEH program helps you understand hackers by getting you into their mindset. After all, to be a kicker, you need to think like a hacker. There are both unethical and ethical hackers: unethical hackers engage in illegal or unlawful activities, while ethical hackers use their hacking knowledge to protect organizations and their assets. The official C|EH course is the world’s #1 ethical hacking certification. If you want to become one of the world’s best ethical hackers, the C|EH is recommended by experienced professionals, organizations in both the private and public sectors, industry leaders and experts, and hiring managers.

Prerequisites for Certified Hacker Program

There are no specific prerequisites for the Certified Hacker Program; however, we strongly recommend candidates possess a minimum of 2 years’ experience in IT security before joining a CEH training program. CEH training is about testing systems and using them for purposes not originally intended; candidates should understand the basic functions of those IT systems before attempting to hack them. (Example: CEH will teach the process of host evaluation leading to enumeration; in this process trainees will scan downrange targets using common scanning techniques such as Nmap which will respond with a list of ports, enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems. The CEH program will not teach you what a port is, that is essential knowledge you must have to be successful in the class.)

Open AI credits

  • Open AI credits are not included in the program, since Open Ai owns proprietary technology, it is necessary to purchase license keys with credits.
  • Prospective students who wish to use this technology in the classroom must purchase OpenAI API credits to perform ShellGPT labs in the classroom.
  • Each partner has the option to require each student to purchase the licenses individually or to purchase the licenses for a specific class (estimated costs are under $1 per student, per CEH class).

Who CEH v13 is for

Cybersecurity professionals

Those looking to drive their cybersecurity career forward with the power of AI.

Teams and organizations

Teams looking to turbocharge their AI knowledge in order to stay one step ahead of malicious actors.

Government and military

Government departments and defense bodies looking for a trusted and highly valued global certification partner.

    EC-Council's Certified Ethical Hacker AI (CEH v13) program logo

    About the course:

    Need a Personalized Quote?Get in Touch!

    For bulk enrollments or special pricing options, request a customized quote.
    PRINCE2®, PRINCE2 Agile® and ITIL® are registered trade marks of AXELOS Limited, used under permission of AXELOS Limited. The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

    PNRR. Finanțat de Uniunea Europeană – UrmătoareaGenerațieUE

    Conținutul acestui material nu reprezintă în mod obligatoriu poziția oficială a Uniunii Europene sau a Guvernului României
    Stay Up-to-Date!
    Stay updated with the latest news and insights by joining our newsletter! Sign up today to receive exclusive content, tips, and special offers tailored just for you.

    © 2025 · RQM CERT · All Rights Reserved
    This website is managed by RQM Certification SRL, VAT no. RO34221359, Reg. no. J35/591/2015, headquartered at Str. Marginii no. 4, Corp A, Ap. 6, Timișoara, Romania.