
Certified Ethical Hacker (CEH v13) — AI-Powered
Learn to think like the attacker.
01. At a Glance
About the course
CEH v13 is the world's most recognized ethical-hacking certification — and the first version to integrate AI across every attack domain. Macksofy delivers it the way it was meant to be taught: instructor-led, fully hands-on, in a Mumbai-classroom + live-online format, with mentorship that runs until you clear the exam.
02. Who Is This Course For
- Aspiring penetration testers and red-team operators
- SOC analysts who need offensive context to write better detections
- Network and system administrators moving into security
- Engineering students preparing for a cybersecurity career
Prerequisites
- Working knowledge of TCP/IP, OSI model, common protocols
- Comfort with Linux and Windows command lines
- No prior hacking experience required — we cover the basics
03. What You Will Be Able To Do
- Run end-to-end recon, scanning and enumeration on real targets
- Exploit OWASP Top 10 web vulnerabilities and modern privilege escalation
- Use AI-driven offense (LLMs, prompt injection, AI-assisted recon) covered in v13
- Pass the EC-Council CEH v13 (312-50) exam on the first attempt
04. Curriculum — 21 Modules
Module structure and topic coverage authored by Macksofy Technologies based on the publicly-published vendor syllabus, current as of the issue date of this brochure. Vendor reserves the right to revise content; Macksofy keeps cohort material aligned to the latest release.
- Module 01
Module 01 · Introduction to Ethical Hacking
4 topics- Information security overview
- Cyber kill chain & MITRE ATT&CK
- Hacker classes, attack vectors, IoCs
- Information security laws — Indian IT Act 2000, UAE cyber law
- Module 02
Module 02 · Footprinting and Reconnaissance
4 topics- Active vs passive footprinting
- OSINT — theHarvester, Maltego, Shodan, Censys
- WHOIS, DNS, network footprinting
- Email, web, social-media footprinting
- Module 03
Module 03 · Scanning Networks
4 topics- Network scanning concepts
- Nmap deep-dive — NSE, scan timing, evasion
- Banner grabbing, OS fingerprinting
- Drawing network diagrams
- Module 04
Module 04 · Enumeration
3 topics- NetBIOS, SNMP, LDAP, SMTP enumeration
- DNS, NFS, NTP, IPv6 enumeration
- Active Directory enumeration basics
- Module 05
Module 05 · Vulnerability Analysis
3 topics- Vulnerability classification & CVSS 3.1
- Vulnerability assessment lifecycle
- Tools — Nessus, OpenVAS, Nikto, Qualys
- Module 06
Module 06 · System Hacking
4 topics- Password cracking — Hashcat, John the Ripper
- Privilege escalation (Linux + Windows)
- Maintaining access, covering tracks
- Steganography & rootkits
- Module 07
Module 07 · Malware Threats
4 topics- Malware concepts, APT, fileless malware
- Trojan / virus / worm / ransomware analysis
- Static + dynamic malware analysis basics
- Anti-malware countermeasures
- Module 08
Module 08 · Sniffing
4 topics- Packet sniffing — Wireshark, tcpdump
- MAC flooding, DHCP / ARP / DNS spoofing
- Bettercap MITM workflows
- Sniffing detection & countermeasures
- Module 09
Module 09 · Social Engineering
3 topics- Human-based, computer-based, mobile-based vectors
- Phishing simulation with GoPhish
- Insider threats & identity theft
- Module 10
Module 10 · Denial-of-Service
3 topics- Volumetric, protocol, application-layer DoS
- DDoS botnets and reflection attacks
- Mitigation strategies
- Module 11
Module 11 · Session Hijacking
3 topics- Application-layer (web) session hijacking
- Network-layer hijacking — TCP/IP, MITM
- Tools — Burp, ZAP — and detection
- Module 12
Module 12 · Evading IDS, Firewalls & Honeypots
3 topics- IDS / IPS evasion techniques
- Firewall bypass — fragmentation, tunneling
- Honeypot detection
- Module 13
Module 13 · Hacking Web Servers
3 topics- Web-server architecture and attack surface
- Misconfiguration, directory traversal, source-code disclosure
- Patch management and hardening
- Module 14
Module 14 · Hacking Web Applications
4 topics- OWASP Top 10 hands-on — XSS, IDOR, SSRF, XXE, deserialization
- Burp Suite Pro — proxy, repeater, intruder, extensions
- API testing (REST + GraphQL)
- Authentication / session-management attacks
- Module 15
Module 15 · SQL Injection
3 topics- In-band, blind, time-based, second-order SQLi
- sqlmap automation and manual exploitation
- WAF bypass techniques
- Module 16
Module 16 · Hacking Wireless Networks
4 topics- 802.11 fundamentals
- WEP / WPA / WPA2 / WPA3 attacks
- Aircrack-ng suite + Hashcat handshake cracking
- Evil twin, KARMA, enterprise EAP attacks
- Module 17
Module 17 · Hacking Mobile Platforms
4 topics- Android architecture + reversing — Frida, Objection
- iOS attack surface
- OWASP MASVS basics
- Mobile device management bypass
- Module 18
Module 18 · IoT and OT Hacking
3 topics- IoT attack surface — firmware, BLE, ZigBee
- OT / SCADA introduction — Modbus, DNP3
- IoT firmware extraction (binwalk)
- Module 19
Module 19 · Cloud Computing
4 topics- AWS / Azure / GCP attack chains
- Container & K8s escapes
- Serverless attacks
- Cloud-native pentest tooling — Pacu, ScoutSuite
- Module 20
Module 20 · Cryptography + AI-Driven Offense (v13)
4 topics- Symmetric / asymmetric crypto attacks
- PKI, hashing, certificate pinning
- AI-assisted recon, prompt injection, LLM jailbreaks (NEW v13)
- Defensive AI controls
- Module 21
Capstone · Exam preparation + mock CEH (Macksofy)
6h3 topics- End-to-end engagement on a corporate-grade lab
- Mock CEH exam under timed conditions
- Reporting and documentation
05. Tools You Will Operate
06. Career Outcomes
| Role | Experience | Salary band (India) |
|---|---|---|
| SOC Analyst (L1 / L2) | 0–2 years | ₹4–7 LPA |
| Junior Penetration Tester | 1–3 years | ₹6–10 LPA |
| Vulnerability Analyst | 1–2 years | ₹6–9 LPA |
| Cybersecurity Consultant | 2–4 years | ₹8–12 LPA |
07. Placement Support
70%+ of CEH graduates progress into security roles within 6 months. Our placement cell connects you with 80+ hiring partners across India and UAE.
- 1:1 resume and LinkedIn rewrite with our hiring desk
- Mock interviews with senior pen-testers (technical + behavioural)
- Direct intros to hiring managers at our partner network
- Mentor-led exam-prep continues until you clear CEH
08. Why Macksofy
- Vendor-true delivery — Macksofy is an EC-Council Accredited Training Center (ATC) delivering practitioner-led bootcamps with exam-prep support.
- Practitioner-led delivery — every Macksofy instructor is a working OSCP / OSWE / OSEP / CISA-certified consultant on real client engagements during the week.
- Mentor support until you pass — extended access to mentor office hours and exam-day prep at no additional cost.
- Placement desk — Macksofy works with 80+ hiring partners across India and the UAE; your post-course resume, portfolio review and mock interviews are included.
- Indian classroom + online cohorts — onsite delivery in Mumbai BKC and Hyderabad HITEC City; live virtual cohorts pan-India with recordings.
09. How to Enrol
- Submit the enquiry form at macksofy.com/contact or call +91 99308 24239.
- A Macksofy advisor will respond within 4 business hours with the next batch dates, payment terms and invoice.
- Confirm enrolment via NEFT / RTGS / corporate card. EMI options available for select courses.
- Receive welcome kit, lab credentials and the cohort calendar within 24 hours of confirmation.
10. Trademarks & Disclaimer
EC-Council, CEH v13 and related course names are trademarks or registered trademarks of their respective owners. Macksofy is an authorised training partner and uses these names only to identify the official course delivered. Course content, schedules and pricing quoted in this brochure are subject to change; please refer to the current edition at macksofy.com/training/ceh for the latest information.

Talk to a Macksofy course advisor.
We respond within 4 business hours with batch dates, payment terms, EMI options and the corporate training menu.
