Certified Ethical Hacker v13
About Course
๐ย Welcome to your ultimate CEH v13 study hub!
This playlist is designed to help aspiring ethical hackers, cybersecurity enthusiasts, and IT professionals prepare for theย Certified Ethical Hacker v13ย certification exam from EC-Council. Whether you’re starting from scratch or brushing up on key concepts, these videos cover every module, tool, and technique you need to know.
๐ Whatโs Covered in This Playlist?
Introduction to Ethical Hacking
Basics, key concepts, and ethics
Types of hackers and penetration testing phases
Footprinting and Reconnaissance
Information gathering techniques
Tools: WHOIS, Nmap, Shodan, Google Dorks
Scanning Networks
Network scanning methodologies
Port scanning, vulnerability scanning
Enumeration
SNMP, DNS, SMB enumeration techniques
Vulnerability Analysis
Identifying and assessing vulnerabilities
System Hacking
Password cracking, privilege escalation, steganography
Malware Threats
Trojans, viruses, ransomware analysis
Sniffing
MITM attacks, ARP poisoning, Wireshark demos
Social Engineering
Phishing, pretexting, insider threats
Denial of Service (DoS/DDoS)
Attack types and mitigation strategies
Session Hijacking
Techniques and countermeasures
Evading IDS, Firewalls, and Honeypots
Bypassing security mechanisms
Hacking Web Servers & Web Applications
SQL injection, XSS, CSRF, OWASP Top 10
SQL Injection & Database Hacking
Manual and automated exploitation
Wireless Network Hacking
Wi-Fi encryption cracking, rogue access points
Mobile Platform & IoT Hacking
Android/iOS vulnerabilities, IoT attacks
Cloud Computing Security
AWS/Azure security, container vulnerabilities
Cryptography
Encryption algorithms, PKI, cryptographic attacks
๐ ๏ธ Tools Demonstrated:
Nmap, Burp Suite, Metasploit, Wireshark
John the Ripper, Hashcat, Aircrack-ng
SQLMap, Hydra, Maltego, and many more
๐ฏ Who Is This Playlist For?
Aspiring ethical hackers preparing for the CEH v13 exam
IT professionals transitioning into cybersecurity
Students pursuing cybersecurity careers
Anyone interested in learning offensive security skillsย ethically & legally
โ ๏ธ Important Disclaimer:
This content is forย educational purposes only.
All demonstrations are performed inย controlled lab environmentsย or withย proper authorization.
Unauthorized hacking is illegal. Use these skills responsibly to protect systems, not harm them.
๐ Tips for Success:
Take notesย alongside each video.
Practice in a labย (use VirtualBox/VMware with Kali Linux).
Try official EC-Council materialsย for exam-specific details.
Join cybersecurity communitiesย for discussions and support.
๐ Useful Resources:
Practice Labs: TryHackMe, HackTheBox
Books: CEH Official Study Guide, All-in-One CEH Guide
Course Content
Introduction to Ethical Hacking
- 01:05:35
- 01:36:05
- 42:07
- 01:01:56
- 01:16:52
- 24:10
- 43:18
- 40:51
- 01:18:41
- 46:01
- 43:04
- 27:49
- 17:33
- 42:40
- 32:26
- 02:11:12
- 59:21
- 01:26:08
- 01:21:03
- 01:42:29
- 02:14:26
- 52:37
- 01:26:17
- 01:35:00
- 01:42:35
- 01:30:40


