Certified Ethical Hacker (CEH) Study Guide: Everything You Need to Know 2025
312-50
The Certified Ethical Hacker (CEH) v13 by EC-Council is the world's most recognized ethical hacking certification, now enhanced with AI-driven cybersecurity tools and techniques. This comprehensive study guide covers all 20 exam modules — from reconnaissance and system hacking to cloud security, IoT/OT, and cryptography.
The CEH v13 exam (312-50v13) consists of 125 multiple-choice questions to be completed in 4 hours, with a passing score typically around 60-85% depending on the exam form. With proper preparation using this guide, you can expect to pass on your first attempt.
Below you'll find a structured 12-week study plan, curated resources including official EC-Council materials, hands-on lab platforms (iLabs, TryHackMe, HackTheBox), recommended books, and expert tips from certified ethical hackers.
20
Domains
8
Weeks
500+
Questions
95%
Pass Rate
Quick Start
Essential steps to begin
Review Exam Objectives
View all domains →Take Assessment Quiz
Free practice test →Follow Study Plan
8-week roadmap →Full Practice Exams
Start practicing →Exam Objectives
Exam Domains & Objectives
Master these 20 domains to pass the 312-50 exam
Introduction to Ethical Hacking
Fundamentals of information security, ethical hacking concepts, cyber kill chain methodology, MITRE ATT&CK framework, and relevant laws and standards.
Footprinting and Reconnaissance
Techniques and tools for gathering information about target networks, including OSINT, DNS footprinting, and social engineering reconnaissance.
Scanning Networks
Network scanning techniques for host, port, service, and OS discovery, including methods to bypass IDS and firewalls.
Enumeration
Enumerating network resources including NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, and SMB services.
Vulnerability Analysis
Identifying security loopholes using vulnerability scoring systems, databases, scanning tools, and AI-powered assessment.
System Hacking
System hacking methodologies including password cracking, privilege escalation, steganography, and covering tracks.
Malware Threats
Types of malware including trojans, viruses, worms, ransomware, fileless malware, and APTs with static and dynamic analysis.
Sniffing
Packet-sniffing techniques including MAC flooding, ARP poisoning, MITM attacks, DNS poisoning, and countermeasures.
Social Engineering
Social engineering concepts and techniques including phishing, impersonation, identity theft, and AI-powered attacks.
Denial-of-Service
DoS and DDoS attack techniques, botnet operations, and detection/protection strategies.
Session Hijacking
Session hijacking techniques at application and network levels including TCP/IP hijacking, session ID compromise, and countermeasures.
Evading IDS, Firewalls, and Honeypots
Techniques for evading intrusion detection systems, firewalls, and honeypots, and related countermeasures.
Hacking Web Servers
Web server attack methodology including reconnaissance, DNS hijacking, web cache poisoning, and server hardening.
Hacking Web Applications
Web application hacking methodology covering OWASP Top 10, API security, web service attacks, and security testing.
SQL Injection
SQL injection attack techniques, evasion methods, and countermeasures for protecting database-driven applications.
Hacking Wireless Networks
Wireless network security including encryption cracking, Bluetooth hacking, and wireless attack countermeasures.
Hacking Mobile Platforms
Mobile platform attack vectors for Android and iOS, mobile device management, and mobile security guidelines.
IoT and OT Hacking
IoT and Operational Technology attack surfaces, vulnerabilities, hacking methodologies, and security countermeasures.
Cloud Computing
Cloud computing concepts, threats, attacks on cloud services (AWS, Azure, GCP), and cloud security best practices.
Cryptography
Encryption algorithms, PKI, digital signatures, cryptanalysis techniques, and cryptographic attack countermeasures.
Study Plan
8-Week Study Plan
Follow this structured plan to prepare for your Certified Ethical Hacker (CEH) exam
Foundation
Week 1–2
Understand core concepts and exam objectives
Focus Areas
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
Deep Dive
Week 3–4
Master advanced topics and practical applications
Focus Areas
- Scanning Networks
- Enumeration
Practice & Review
Week 5–6
Take practice exams and review weak areas
Focus Areas
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
Final Prep
Week 7–8
Full practice exams and last-minute review
Focus Areas
- Full-length practice tests
- Review all domains
Expert-Curated
Curated Study Resources
Curated resources with real links to help you prepare for the Certified Ethical Hacker (CEH) exam
Certified Ethical Hacker (CEH) v13 Study Guide
The Certified Ethical Hacker (CEH) v13 certification by EC-Council is the world's leading ethical hacking credential. CEH v13 incorporates AI-driven tools and techniques, preparing cybersecurity professionals to identify vulnerabilities, counter threats, and protect organizational assets using the same knowledge and tools as malicious hackers — but lawfully. This comprehensive study guide covers all 20 modules of the CEH v13 exam, providing structured study plans, recommended resources, and expert tips to help you pass on your first attempt.
Who Should Take This Exam
- Information Security Analysts and Engineers
- Penetration Testers and Vulnerability Assessors
- Network Security Administrators
- SOC Analysts and Incident Responders
- IT Professionals pursuing ethical hacking skills
- Cybersecurity students and career changers
Prerequisites
- Basic understanding of networking (TCP/IP, DNS, HTTP)
- Familiarity with operating systems (Windows, Linux)
- 2+ years of IT security experience (recommended, not required)
- Understanding of common security concepts (firewalls, IDS/IPS, encryption)
- Basic knowledge of programming/scripting (Python, Bash) is helpful
Official Resources
EC-Council CEH v13 Official Page
Official certification overview, exam details, and registration information from EC-Council.
View ResourceCEH v13 Exam Blueprint
Detailed exam blueprint with all 20 modules, domains, and weightings for the CEH v13 certification.
View ResourceEC-Council iLabs
Official hands-on lab environment with 220+ labs covering real-world ethical hacking scenarios aligned with CEH modules.
View ResourceEC-Council CodeRed
EC-Council's online learning platform with video courses, practice tests, and supplementary materials for CEH preparation.
View ResourceNIST Cybersecurity Framework
Essential reference for understanding cybersecurity risk management frameworks tested in the CEH exam.
View ResourceOWASP Top 10
Critical reference for web application security vulnerabilities heavily tested in CEH modules on web app hacking.
View ResourceRecommended Courses
Penetration Testing with Kali Linux (PEN-200)
Offensive Security • Self-paced (90 days)
View CourseRecommended Books
CEH Certified Ethical Hacker All-in-One Exam Guide (5th Edition)
by Matt Walker
The most comprehensive CEH study guide covering all exam objectives with practice questions, lab exercises, and exam tips.
View on AmazonCEH v12 Certified Ethical Hacker Study Guide
by Ric Messier
Sybex study guide with thorough coverage of all CEH domains, hands-on exercises, and online practice exams.
View on AmazonThe Web Application Hacker's Handbook (2nd Edition)
by Dafydd Stuttard & Marcus Pinto
Essential reading for the web application hacking modules. Covers discovery, exploitation, and defense of web apps in depth.
View on AmazonHacking: The Art of Exploitation (2nd Edition)
by Jon Erickson
Deep dive into the technical foundations of hacking — networking, shellcode, exploitation, and cryptography from a practitioner's perspective.
View on AmazonMetasploit: The Penetration Tester's Guide
by David Kennedy et al.
Comprehensive guide to the Metasploit Framework — the most important tool tested in the CEH exam's system hacking modules.
View on AmazonPractice & Hands-On Resources
HydraNode CEH Practice Exam
Full-length timed practice exams with detailed explanations for every question, covering all 20 CEH v13 modules.
View ResourceEC-Council iLabs
220+ official hands-on labs with real hacking tools and environments. Aligned with all CEH exam modules.
View ResourceHackTheBox
Online platform with vulnerable machines for practicing ethical hacking techniques in a safe environment.
View ResourceTryHackMe
Guided learning paths with browser-based attack boxes. Great for beginners building up to CEH-level skills.
View ResourceOWASP Juice Shop
Intentionally vulnerable web application for practicing OWASP Top 10 attacks tested in CEH web hacking modules.
View ResourceVulnHub
Download vulnerable virtual machines to practice penetration testing locally in your own lab environment.
View ResourceCommunity & Forums
r/CEH — Reddit
Active Reddit community for CEH exam discussion, study tips, and experience sharing from certified professionals.
Join Communityr/ethicalhacking — Reddit
Broader ethical hacking community with discussions on tools, techniques, and career advice.
Join CommunityEC-Council Community Forum
Official EC-Council community for CEH candidates and certified professionals.
Join CommunityInfoSec Discord Servers
Active Discord communities for real-time discussion on ethical hacking, CTFs, and certification prep.
Join CommunityNull Byte — WonderHowTo
Blog with practical ethical hacking tutorials, tool guides, and step-by-step exploitation walkthroughs.
Join CommunityStudy Tips
Hands-On Practice Is Essential
- Set up a home lab with Kali Linux, Metasploitable, and DVWA — theory alone won't pass the CEH exam
- Practice every tool mentioned in the exam objectives: Nmap, Wireshark, Metasploit, Burp Suite, SQLMap, Aircrack-ng
- Complete at least 100 hands-on lab exercises before attempting the exam
- Use CTF (Capture the Flag) challenges to reinforce offensive techniques
Master the Tools and Their Flags
- CEH heavily tests tool-specific knowledge — know Nmap flags (-sS, -sT, -sU, -A, -O, -sV) cold
- Understand Wireshark display filters and how to identify attacks in packet captures
- Learn Metasploit workflow: msfconsole → search → use → set options → exploit
- Know when to use which tool for each phase of the penetration testing methodology
Focus on High-Weight Domains
- System Hacking (7%) and Web Application Hacking (7%) carry the most weight — prioritize these
- SQL Injection and Footprinting/Reconnaissance are also heavily tested
- Don't neglect newer domains: IoT/OT, Cloud, and AI-driven attack techniques (new in v13)
- Review OWASP Top 10 thoroughly — it appears across multiple exam domains
Exam Strategy
- Read each question completely — CEH questions often have subtle clues in the scenario description
- Eliminate obviously wrong answers first to improve your odds
- Know your port numbers: 21 (FTP), 22 (SSH), 23 (Telnet), 25 (SMTP), 53 (DNS), 80 (HTTP), 443 (HTTPS), 445 (SMB)
- Time management is critical: 125 questions in 4 hours — roughly 1.9 minutes per question
Exam Day Tips
- 1Get 7–8 hours of sleep the night before — a rested mind performs significantly better on scenario-based questions
- 2Review your cheat sheet of port numbers, tool flags, and encryption algorithms in the morning
- 3Arrive at the testing center 30 minutes early (or ensure your Pearson VUE setup is tested for remote proctoring)
- 4Read each question fully — scenario-based questions often contain the key in the last sentence
- 5Flag difficult questions and return to them — don't spend more than 2 minutes on any single question
- 6For questions about attack types, visualize the attack flow and match it to the correct technique name
- 7Trust your preparation — if you've completed practice exams scoring 85%+, you're ready
- 8Double-check answers on flagged questions in the last 30 minutes of the exam
Study guide generated on April 12, 2026
Pro Tips
Pro Study Tips
Expert advice to maximize your study effectiveness
Active Learning Strategies
- Hands-on practice: Apply concepts in real scenarios
- Teach others: Explain concepts to reinforce learning
- Take notes: Write summaries in your own words
Exam Day Preparation
- Get enough sleep: Rest well the night before
- Review key points: Go through your notes and cheat sheets
- Time management: Practice pacing with timed exams
More Resources
Continue Your Preparation
Complete Certified Ethical Hacker (CEH) Study Guide
This comprehensive study guide will help you prepare for the 312-50 certification exam offered by EC-Council. Whether you are a beginner or experienced professional, this guide covers everything you need to know to pass on your first attempt.
What You Will Learn
- Introduction to Ethical Hacking (6%)
- Footprinting and Reconnaissance (6%)
- Scanning Networks (5%)
- Enumeration (5%)
- Vulnerability Analysis (5%)
- + 15 more domains
Recommended Timeline
Most candidates need 6–8 weeks of dedicated study to pass the Certified Ethical Hacker (CEH) exam. We recommend studying 1–2 hours daily and taking practice exams weekly to track your progress.
Next Step: Start with our free practice test to assess your current knowledge level.