pds-it
['Product detail page','no']
IT security / cybersecurity
The illustrations were created in cooperation between humans and artificial intelligence. They show a future in which technology is omnipresent, but people remain at the center.
AI-generated illustration

Certified Ethical Hacker v13 - Training with certification

The intensive penetration testing course including exam and certification

Online
5 days
German
Download PDF
€ 3.890,-
plus VAT.
€ 4.629,10
incl. VAT.
Booking number
33882
Venue
Online
3 dates
€ 3.890,-
plus VAT.
€ 4.629,10
incl. VAT.
Booking number
33882
Venue
Online
3 dates
Become a certified
Machine Learning Engineer
This course is part of the certified Master Class "Machine Learning Engineer". If you book the entire Master Class, you save over 15 percent compared to booking this individual module.
To the Master Class
In-house training
In-house training just for your employees - exclusive and effective.
Inquiries
In cooperation with
In cooperation with
ITech Progress
Build a solid foundation of knowledge in ethical hacking with the EC-Council CEH: Understand how modern cyberattacks work and gain a globally recognized certification for roles in security and cyber defense.
Contents

You can have security gaps checked by external consultants, for example. Or you can protect your system yourself. In 5.5 days of intensive training, you will be optimally prepared for practical work in defending against cybercrime and for the exam for the internationally recognized certification as a Certified Ethical Hacker.

In a realistic hacking environment, you will learn how to protect your company against Trojans, viruses and worms, SQL injections as well as MAC, DHCP and DDoS attacks. You will be able to scan IT systems for threats, hack and secure them. To ensure that what you learn is not misused, course participants sign a corresponding agreement before each course. This is because as a CEH Certified Ethical Hacker, you use exactly the same tools as a hacker, but not to attack, but to defend.

Overview:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System hacking
  • Malware Threats
  • Sniffing
  • Social engineering
  • Denial of service
  • Session hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud computing
  • Cryptography

 

Requirements: 

To get the most out of CEH v13, you should have the following knowledge and experience:

 

Work Experience & IT Fundamentals

  • At least two years of experience in the IT field
  • Familiarity with Windows and Linux/Unix systems

Networking skills

  • Basics of TCP/IP and the OSI Model
  • Understanding of key protocols such as Ethernet, ARP, IP, HTTP, and others

Linux & Windows Command Line

  • Using Linux Commands Safely
  • Knowledge of package management in Debian/Kali
  • Experience with key Windows commands

Basic Security Knowledge

  • Basic understanding of security concepts and frameworks (e.g., ISO 27001)
  • Basic Knowledge of Data Protection and Compliance Standards
  • Initial experience in ethical hacking – e.g., from the course “Cyber Security Tester – Hands-on Foundation”

Optional—but helpful

  • Basic knowledge of Bash or Python scripting

 

Your benefit
  • Mastering the five phases of ethical hacking to systematically identify and mitigate vulnerabilities
  • Analyzing and securing modern IT environments such as the web, cloud, mobile, and IoT/OT
  • Conducting realistic attack simulations to strengthen practical defense capabilities
  • Using modern threat hunting and defense methods to detect and thwart advanced attacks at an early stage
trainer
Michael Ruppe
Methods

The training is structured in intervals and provides ample time to reinforce what has been learned and to apply the material independently in the labs outside of class. Class time is focused on structured instruction and is effectively supplemented by the labs provided. This creates a balanced and sustainable learning experience.

We will provide you with the EC-Council CEH Elite package. It includes the following materials and allows you to review and reinforce the course content between class sessions.

  • Digital course materials
  • Labs
  • CEH Engage
  • CEH Complete
  • Microlearning library consisting of 10 courses

 

Certification

We will send you an exam voucher, which you can redeem at the EC-Council Exam Center. There, you will create a user account and can choose your exam date and time. The exam is taken online and is proctored live by an EC-Council proctor.

On the day of the exam, log in to your account and connect with the remote proctor using the “Start Exam” feature. You will need a PC or Mac with a camera, microphone, and a stable internet connection. Before the exam begins, the proctor will conduct a brief identity verification, inspect your room and surroundings, and ensure that no aids are present (e.g., books, notes, or other devices). Have your ID or passport ready for the identity verification.

During the exam, you must allow screen sharing, and the proctor will start the exam for you. You must remain in the camera's field of view for the entire duration of the exam.

After submitting your exam, you'll see your results right on the screen. Your digital certificate will be available on the EC-Council portal (ASPEN) a few days later.

And if you didn't pass: Another voucher for a retake is included in the course price.

Examination:

  • Format: Multiple-choice exam, web-based
  • Questions: 125
  • Duration: 4 hours
Recommended for

MCSE and CCNA graduates who wish to obtain additional certification in the field of security. Individuals who wish to earn an international certification in the field of ethical hacking. Security consultants who wish to obtain additional certification at the international level. Anyone who wantsspecialist .

 

Common job roles for CEH:

Mid-Level Information Security Auditor, Cybersecurity Auditor, Security Administrator, IT Security Administrator, Cyber Defense analyst, Vulnerability Assessment analyst, Warning analyst, Information Security analyst , Security analyst , Infosec Security Administrator, Cybersecurity analyst 1, Level 2 & Level 3, Network Security Engineer, SOC Security analyst, Security analyst, Network Engineer, Senior Security Consultant, Information Security Manager, Senior SOC analyst, Solution Architect, and Cybersecurity Consultant

Start dates and details

Form of learning

Learning form

10.6.2026
Online
Places free
Implementation secured
Online
Places free
Implementation secured
1.9.2026
Online
Places free
Implementation secured
Online
Places free
Implementation secured
17.11.2026
Online
Places free
Implementation secured
Online
Places free
Implementation secured

The training is conducted in cooperation with the accredited training organization Digicomp Academy AG.
Digicomp is an ATC-Accredited Training Center authorized by the EC-Council.

Participants' data will be transmitted to Digicomp Academy AG for the purpose of conducting the training.
The latter collects and processes data under its own responsibility.
Please take note of the relevant data protection declaration.

No items found.
No items found.
*Mandatory fields

Do you have questions about training?

Call us on +49 761 595 33900 or write to us at service@haufe-akademie.de or use the contact form.

The illustrations were created in cooperation between humans and artificial intelligence. They show a future in which technology is omnipresent, but people remain at the center.
AI-generated illustration