Get the Newest CompTIA A+ 2025 Course for Only $12.99

For a limited time, check out some of our most popular courses for free on Udemy.  View Free Courses.

Certified Ethical Hacker (CEH v13) – Get Your CEH Cert

Comprehensive Certified Ethical Hacker (CEH v13) training with 69 hours of video, hands-on labs, and practice tests to prepare you for the CEH 312-50 exam, exam cost details, and ethical hacking certification success.

Course Level: Intermediate, Experienced
Duration: 68 Hrs 56 Min
Total Videos: 320 On-demand Videos

Get exam-ready with our Certified Ethical Hacker (CEH v13) training course — 69 hours of video, hands-on labs, and practice tests aligned to the CEH 312-50 exam. Learn real-world hacking techniques, explore CEH exam questions, and get guidance on the certified ethical hacker exam cost so you can plan with confidence. Start your ethical hacker certification training today and take the next step in your cybersecurity career.

Purchase Options

You can purchase this course individually on Udemy, or unlock every course we offer with the exclusive 365 Training Pass—one low price, unlimited access for a full year.

Learning Objectives

01

Understand the fundamentals of information security, ethical hacking, and risk management.

02

Learn how to use open-source intelligence (OSINT) tools and techniques for footprinting and reconnaissance.

03

Acquire skills to conduct network scanning and enumeration for potential vulnerabilities.

04

Understand the process of vulnerability analysis and how to exploit system vulnerabilities.

05

Learn to identify, analyze, and mitigate malware threats and denial-of-service attacks.

06

Gain knowledge of various hacking methods for web servers, web applications, and mobile platforms.

07

Understand the risks and vulnerabilities associated with cloud computing and IoT devices.

08

Learn the principles of cryptography and how to use cryptographic tools and techniques for data protection.

Course Description

Prepare for the Certified Ethical Hacker (CEH v13) exam with our 69-hour training course that combines expert instruction, hands-on labs, and practice tests designed to master the concepts for the official CEH 312-50 exam. This course not only covers the high-demand topics in ethical hacking certification but also addresses practical details like the certified ethical hacker exam cost, requirements, and format to help you plan ahead.

You’ll get step-by-step lessons, real-world scenarios, and practice questions similar to CEH exam questions to boost your confidence before exam day. Plus, we provide a free CEH v13 practice exam at Vision Training Systems so you can test your readiness anytime.

Key highlights:

  • Certified ethical hacker training tailored to CEH v13 exam objectives

  • Guidance on certified ethical hacker exam cost and certification paths

  • Full coverage of ethical hacker certification skills: reconnaissance, scanning, exploitation, and defense strategies

  • Access to 312-50 study material with exam-focused insights

  • Hands-on labs replicating real-world hacking scenarios

  • Comprehensive exam prep with CEH exam questions, practice tests, and study guides

Whether you’re aiming to pass the certified ethical hacker certification exam or advance your career in cybersecurity, this course delivers both the knowledge and resources to help you succeed.

Enroll now in our CEH v13 Udemy course and take advantage of low-cost, high-quality CEH training designed to get you exam-ready.

What’s New in CEH v13

The Certified Ethical Hacker (CEH v13) exam has been updated to reflect the latest challenges in today’s cyber landscape. Aligned with the CEH 312-50 exam objectives, this version goes beyond traditional hacking tools and techniques, ensuring you’re prepared for real-world threats.

Key updates in CEH v13 training include:

  • Expanded coverage of cloud security, IoT vulnerabilities, and operational technology hacking

  • Deeper focus on malware analysis, ransomware, and emerging attack vectors

  • Practical modules on artificial intelligence (AI) in cybersecurity and how adversaries use AI in attacks

  • Enhanced hands-on labs replicating real-world penetration testing scenarios

  • Updated CEH exam questions reflecting the latest frameworks, tools, and methodologies

By mastering these updates, you’ll gain the skills employers expect from today’s cybersecurity professionals and be ready to tackle the certified ethical hacker certification exam with confidence.

Career Outcomes with CEH Certification

Earning your Certified Ethical Hacker certification is more than passing the CEH v13 exam—it’s a career-defining achievement. Employers recognize CEH as one of the most important cybersecurity certifications to have, opening doors across multiple industries.

With this ethical hacking certification training, you’ll qualify for roles such as:

  • Penetration Tester (Pen Tester) — conducting authorized attacks to find vulnerabilities

  • Security Analyst — monitoring and defending enterprise networks

  • Cybersecurity Engineer — designing and implementing defensive measures

  • Incident Responder — investigating breaches and mitigating damage

  • IT Security Specialist — ensuring compliance and safeguarding sensitive data

Professionals with CEH skills are in demand globally, and the certified ethical hacker exam cost is a small investment compared to the career opportunities it unlocks. Whether you’re preparing for the 312-50 exam or seeking to advance in your current role, this course provides the training and resources needed to succeed.

Enroll now in our CEH v13 Udemy course and take advantage of low-cost, high-quality CEH training designed to get you exam-ready.

Who Benefits From This Course

  • Information security professionals seeking to enhance their skills in ethical hacking and cybersecurity.
  • IT administrators interested in understanding vulnerabilities and improving security measures within their organizations.
  • Network engineers looking to gain insights into network security and attack detection.
  • Software developers aiming to learn secure coding practices and how to defend against web application attacks.
  • Business leaders and executives who want to understand the implications of cybersecurity threats on their organizations.
  • Students and recent graduates aspiring to start a career in cybersecurity and ethical hacking.
  • Compliance officers needing to stay informed about security laws and standards relevant to their industry.
  • Incident response teams wanting to refine their skills in managing and mitigating security incidents.
  • Individuals interested in developing advanced skills in penetration testing and vulnerability assessment.
  • Those seeking to understand the intersection of artificial intelligence and cybersecurity.

Frequently Asked Questions

What are the key updates in the CEH v13 exam compared to previous versions?

The CEH v13 exam introduces several critical updates to address the evolving landscape of cybersecurity threats. One significant change is the expanded coverage of cloud security, which reflects the growing reliance on cloud infrastructure and the unique vulnerabilities associated with it.

Additionally, CEH v13 delves into Internet of Things (IoT) vulnerabilities and operational technology hacking, emphasizing the security concerns arising from interconnected devices. The updated curriculum also includes a deeper focus on malware analysis and ransomware, preparing candidates for the latest attack vectors.

Furthermore, practical modules on the role of artificial intelligence (AI) in cybersecurity provide insights into how adversaries leverage AI for attacks, ensuring that students are equipped to tackle modern challenges.

How does hands-on training enhance the ethical hacking certification process?

Hands-on training is a crucial component of the ethical hacking certification process, particularly for the Certified Ethical Hacker (CEH v13) exam. This practical approach enables learners to apply theoretical concepts in real-world scenarios, thereby solidifying their understanding of ethical hacking methodologies.

By engaging in hands-on labs, students can replicate actual penetration testing environments, gaining first-hand experience in identifying vulnerabilities and exploiting them responsibly. This practical knowledge not only prepares candidates for the exam but also enhances their skills for future employment opportunities in the cybersecurity field.

Ultimately, hands-on training fosters a deeper comprehension of ethical hacking tools and techniques, allowing professionals to respond effectively to contemporary cyber threats.

What career paths can open up after obtaining CEH certification?

Achieving Certified Ethical Hacker (CEH) certification can significantly enhance career prospects in the cybersecurity domain. This certification is highly regarded by employers and can lead to various roles, including Penetration Tester, where professionals conduct authorized assessments to uncover vulnerabilities in systems and networks.

Additionally, certified individuals may pursue positions as Security Analysts, responsible for monitoring and defending enterprise networks, or Cybersecurity Engineers, who design and implement robust security measures to protect sensitive data.

Other career outcomes include roles such as Incident Responders, tasked with investigating breaches and mitigating damage, or IT Security Specialists, who ensure compliance and safeguard information assets. The widespread recognition of CEH certification opens doors across multiple industries, making it a valuable credential for aspiring cybersecurity professionals.

How does the CEH v13 exam address emerging cybersecurity threats?

The CEH v13 exam is designed to tackle the latest challenges in cybersecurity by incorporating updated content that reflects emerging threats. It includes comprehensive modules on malware analysis, ransomware, and the evolving tactics used by cybercriminals.

By focusing on contemporary attack vectors, the CEH v13 curriculum ensures that candidates are well-versed in identifying and mitigating risks associated with modern cybersecurity incidents. The inclusion of topics such as artificial intelligence in attacks further highlights the need for professionals to understand how adversaries leverage technology to exploit vulnerabilities.

This proactive approach prepares candidates not just for the certification exam but also equips them with the knowledge and skills necessary to face real-world cybersecurity challenges effectively.

What role does practice testing play in preparing for the CEH certification?

Practice testing is a vital element in preparing for the Certified Ethical Hacker (CEH) certification, as it helps candidates gauge their knowledge and readiness for the actual exam. Engaging with practice questions that mirror the format and content of the CEH v13 exam allows learners to familiarize themselves with the types of scenarios they will encounter.

These practice tests not only assess understanding of ethical hacking concepts but also help identify areas that may require further study. By replicating exam conditions, candidates can build their confidence and test-taking skills, ultimately leading to improved performance on exam day.

Overall, practice testing serves as a comprehensive review tool, reinforcing learning and enhancing the likelihood of passing the CEH certification exam.

Included In This Course

Module 1: Information Security and Ethical Hacking Overview

  •    1.0 Introduction to CEH v13
  •    1.1 Elements of Security
  •    1.2 Cyber Kill Chain
  •    1.3 MITRE ATT&CK Framework
  •    1.3.1 ACTIVITY - Examining MITRE ATT&CK
  •    1.4 Hacking
  •    1.5 Ethical Hacking
  •    1.6 Information Assurance
  •    1.7 Risk Management
  •    1.8 Incident Management
  •    1.9 Information Security Laws and Standards
  •    1.10 Using AI in Ethical Hacking
  •    1.11 Information Security and Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  •    2.1 Footprinting Concepts
  •    2.2 OSINT Tools
  •    2.2.1 ACTIVITY - Finding Internet-Connected Devices with Shodan
  •    2.2.2 ACTIVITY - Performing OSINT with theHarvester
  •    2.3 Advanced Google Search
  •    2.3.1 ACTIVITY - Google Hacking
  •    2.4 Whois Footprinting
  •    2.4.1 ACTIVITY - Footprinting with WHOIS
  •    2.5 DNS Footprinting
  •    2.5.1 ACTIVITY - Enumerating DNS
  •    2.6 Website Footprinting
  •    2.7 Email Footprinting
  •    2.8 Network Footprinting
  •    2.8.1 ACTIVITY - Tracing a Network Path with Traceroute
  •    2.9 Social Network Footprinting
  •    2.10 Enhanced OSINT
  •    2.11 Footprinting-and-Reconnaissance-Countermeasures
  •    2.12 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  •    3.1 Scanning Concepts
  •    3.2 Discovery Scans
  •    3.3 Port Scans
  •    3.4 Other Scan Types
  •    3.5 Scanning Tools
  •    3.6 NMAP
  •    3.6.1 ACTIVITY - Port Scanning and Fingerprinting with NMAP
  •    3.7 Firewall and IDS Evasion
  •    3.8 Proxies
  •    3.9 AI Enhanced SCANNING Tools
  •    3.10 Scanning counter-measures
  •    3.11 Scanning Networks Review

Module 4: Enumeration

  •    4.1 Enumeration Overview
  •    4.2 SMB_NetBIOS_Enumeration
  •    4.3 File Transfer Enumeration
  •    4.4 WMI Enumeration
  •    4.5 SNMP Enumeration
  •    4.6 LDAP Enumeration
  •    4.7 DNS Enumeration
  •    4.8 SMTP Enumeration
  •    4.8.1 ACTIVITY - SMTP Enumeration
  •    4.9 Remote Connection Enumeration
  •    4.10 Website Enumeration
  •    4.10.1 ACTIVITY - Enumerating Website Directories
  •    4.11 Local User and Active Directory Enumeration
  •    4.12 Other Enumeration Types
  •    4.13 Enumeration Using AI
  •    4.14 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  •    5.1 Vulnerability Scanning
  •    5.1.1 ACTIVITY - Vulnerability Scanning with OpenVAS
  •    5.2 Vulnerability Assessment
  •    5.3 AI Assisted Vulnerability Assessment
  •    5.4 Vulnerability Analysis Review

Module 6: System Hacking

  •    6.1 System Hacking Concepts
  •    6.2 Common Operating System Exploits
  •    6.3 Buffer Overflows
  •    6.4 System Hacking Tools and Frameworks
  •    6.5 Metasploit
  •    6.5.1 ACTIVITY - Hacking with Metasploit
  •    6.6 Meterpreter
  •    6.6.1 ACTIVITY - Having Fun with Meterpreter
  •    6.7 Keylogging_and_Spyware-
  •    6.8 Netcat
  •    6.8.1 ACTIVITY - Using Netcat
  •    6.9 Windows Exploitation
  •    6.10 Windows Post- Exploitation
  •    6.10.1 ACTIVITY - Windows Post Exploitation with Eternal Blue
  •    6.10.2 ACTIVITY - Escalating Privilege with Token Passing
  •    6.11 Linux Exploitation
  •    6.11.1 ACTIVITY - Pwn a Linux Target from Start to Finish
  •    6.12 Linux Post-Exploitation
  •    6.13 Password Attacks
  •    6.13.1 ACTIVITY - Pass-the-Hash
  •    6.13.2 ACTIVITY - Password Spraying with Hydra
  •    6.14 Linux Password Cracking
  •    6.14.1 ACTIVITY - Password Cracking with Hashcat
  •    6.14.2 ACTIVITY - Brute Forcing with Medusa
  •    6.15 Additional Password Attacks
  •    6.16 Attacking Network Services
  •    6.16.1 ACTIVITY - Cracking Linux Passwords with John-the-Ripper
  •    6.17 Other Methods for Obtaining Passwords
  •    6.18 Network Service Attacks
  •    6.19 Lateral Movement
  •    6.19.1 ACTIVITY - Preparing to Pivot
  •    6.19.2 ACTIVITY - Lateral Movement through Pivoting
  •    6.20 Persistence
  •    6.20.1 ACTIVITY - Creating a Persistent Netcat Back Door
  •    6.20.2 ACTIVITY - APT Persistence
  •    6.21 Hiding Data
  •    6.21.1 ACTIVITY - Hiding Data with Steganography
  •    6.22 Covering Tracks
  •    6.22.1 ACTIVITY - Cover Tracks with Log Tampering
  •    6.23 Side-Channel-Attacks
  •    6.24 AI-Powered Vulnerability Exploitation Tools
  •    6.25 System Hacking Countermeasures
  •    6.26 System Hacking Review

Module 7: Malware Threats

  •    7.1 Malware Overview
  •    7.2 Viruses
  •    7.3 Trojans
  •    7.4 Rootkits
  •    7.5 Other Malware
  •    7.6 Advanced Malware Threats
  •    7.7 Malware Makers
  •    7.7.1 ACTIVITY - Creating a Malware Dropper and Handler
  •    7.8 Malware Deployment
  •    7.9 Malware Detection
  •    7.10 Malware Analysis
  •    7.10.1 ACTIVITY - Analyzing the SolarWinds Orion Hack
  •    7.11 AI and Malware
  •    7.12 Malware Countermeasures
  •    7.13 Malware Threats Review

Module 8: Sniffing and Spoofing

  •    8.1 Network Sniffing
  •    8.2 Sniffing Tools
  •    8.2.1 ACTIVITY - Intercepting Data with Wireshark
  •    8.2.2 ACTIVITY - Capturing Files off the Network
  •    8.3 MAC and ARP Attacks
  •    8.3.1 ACTIVITY - Performing an MITM Attack with Ettercap
  •    8.4 Name Resolution Attacks
  •    8.4.1 ACTIVITY - Spoofing an Authentication Service with Responder
  •    8.5 Other Layer 2 Attacks
  •    8.6 Sniffing and Spoofing Countermeasures
  •    8.7 Sniffing and Spoofing Review

Module 9: Social Engineering

  •    9.1 Social Engineering Concepts
  •    9.2 Social Engineering Techniques
  •    9.3 Social Engineering Tools
  •    9.3.1 ACTIVITY - Phishing for Credentials
  •    9.3.2 ACTIVITY - OMG Cable Baiting
  •    9.4 Social Media, Identity Theft, Insider Threats
  •    9.5 Social Engineering and AI
  •    9.6 Social Engineering Countermeasures
  •    9.7 Social Engineering Review

Module 10: Denial-of-Service

  •    10.1 DoS-DDoS Concepts
  •    10.2 Volumetric Attacks
  •    10.3 Fragmentation Attacks
  •    10.4 State Exhaustion Attacks
  •    10.5 Application Layer Attacks
  •    10.5.1 ACTIVITY - Conducting a Slowloris DDoS Attack
  •    10.6 Other Attacks
  •    10.7 DoS Tools
  •    10.7.1 ACTIVITY - Performing a HOIC DDoS Attack
  •    10.8 DoS Countermeasures
  •    10.9 DoS Review

Module 11: Session Hijacking

  •    11.1 Session Hijacking
  •    11.2 Compromising a Session Token
  •    11.3 XSS
  •    11.3.1 ACTIVITY - Web Session Hijacking with XSS
  •    11.4 CSRF
  •    11.5 Other Web Hijacking Attacks
  •    11.6 Network-Level Session Hijacking
  •    11.7 Session Hijacking Tools
  •    11.8 Session Hijacking Countermeasures
  •    11.9 Session Hijacking Review

Module12: Attack Detection and Prevention

  •    12.1 Types of IDS
  •    12.2 Snort
  •    12.3 Logging and Monitoring
  •    12.4 IDS Considerations
  •    12.5 IDS Evasion
  •    12.6 Firewalls
  •    12.7 Packet Filtering Rules
  •    12.8 Firewall Deployments
  •    12.9 Split DNS
  •    12.10 Firewall Product Types
  •    12.11 Firewall Evasion
  •    12.11.1 ACTIVITY - Busting the DOM for WAF Evasion
  •    12.12 NAC and Endpoint Security
  •    12.13 NAC and EDR Evasion
  •    12.14 Honeypots
  •    12.15 Evasion Countermeasures
  •    12.16 Attack Detection and Prevention Review

Module 13: Hacking Web Servers

  •    13.1 Web Server Operations
  •    13.2 Hacking Web Servers
  •    13.3 Common Web server Attacks
  •    13.4 Webserver Attack Tools
  •    13.5 AI and Webserver Attacks
  •    13.6 Hacking Web Servers Countermeasures
  •    13.7 Hacking Web Servers Review

Module 14: Hacking Web Applications

  •    14.1 Web Application Concepts
  •    14.2 Attacking Web Apps
  •    14.3 A01 Broken Access Control
  •    14.4 A02 Cryptographic Failures
  •    14.5 A03 Injection
  •    14.5.1 ACTIVITY - Command Injection
  •    14.6 A04 Insecure Design
  •    14.7 A05 Security Misconfiguration
  •    14.8 A06 Vulnerable and Outdated Components
  •    14.9 A07 Identification and Authentication Failures
  •    14.10 A08 Software and Data integrity Failures
  •    14.11 A09 Security Logging and Monitoring Failures
  •    14.12 A10 Server-Side Request Forgery
  •    14.13 XSS Attacks
  •    14.14 CSRF
  •    14.15 Parameter Tampering
  •    14.15.1 ACTIVITY - Parameter Tampering with Burp Suite
  •    14.16 Clickjacking
  •    14.16.1 ACTIVITY - Clickjacking with XSS and iFrame Injection
  •    14.17 SQL Injection
  •    14.17.1 ACTIVITY - Using SQL Injection to Steal Sensitive Data
  •    14.18 Insecure Deserialization Attacks
  •    14.19 IDOR
  •    14.19.1 ACTIVITY - IDOR Abuse with Burp Suite
  •    14.20 Directory Traversal
  •    14.20.1 ACTIVITY - Directory Traversal
  •    14.21 Session Management Attacks
  •    14.22 Response Splitting
  •    14.23 Overflow Attacks
  •    14.24 XXE Attacks
  •    14.25 Web App DoS
  •    14.26 Soap Attacks
  •    14.27 AJAX Attacks
  •    14.28 Web API Hacking
  •    14.29 Webhooks and Web Shells
  •    14.30 Web App Hacking Tools
  •    14.31 AI and Web Application Attacks
  •    14.32 Hacking Web Applications Countermeasures
  •    14.33 Hacking Web Applications Review

Module 15: SQL Injection

  •    15.1 SQL Injection Overview
  •    15.2 Basic SQL Injection
  •    15.3 Finding Vulnerable Websites
  •    15.4 Error-based SQL Injection
  •    15.5 Union SQL Injection
  •    15.5.1 ACTIVITY - SQLi on a Live Website - Part 1
  •    15.5.2 ACTIVITY - SQLi on a Live Website - Part 2
  •    15.6 Blind SQL Injection
  •    15.7 SQL Injection Tools
  •    15.8 Evading Detection
  •    15.9 Analyzing SQL Injection
  •    15.10 SQL Injection Countermeasures
  •    15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  •    16.1 Wireless Concepts
  •    16.2 Wireless Security Standards
  •    16.3 WI-FI Discovery Tools
  •    16.4 Common Wi-Fi Attacks
  •    16.5 Wi-Fi Password Cracking
  •    16.6 WEP Cracking
  •    16.7 WPA,WPA2,WPA3 Cracking
  •    16.7.1 ACTIVITY - WPA2 KRACK Attack
  •    16.8 WPS Cracking
  •    16.9 Bluetooth Hacking
  •    16.10 Other Wireless Hacking
  •    16.11 Wireless Security Tools
  •    16.12 Wireless Hacking Countermeasures
  •    16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  •    17.1 Mobile Platform Overview
  •    17.2 Mobile Device Attacks
  •    17.3 Android Overview
  •    17.4 Rooting Android
  •    17.5 Android Exploits
  •    17.5.1 ACTIVITY - Pwn a Mobile Device
  •    17.6 Android-based Hacking Tools
  •    17.7 Reverse Engineering an Android App
  •    17.8 Securing Android
  •    17.9 iOS Overview
  •    17.10 Jailbreaking iOS
  •    17.11 IOS Exploits
  •    17.12 iOS-based Hacking Tools
  •    17.13 Reverse Engineering an iOS App
  •    17.14 Securing iOS
  •    17.15 Mobile Device Management
  •    17.16 Hacking Mobile Platforms Countermeasures
  •    17.17 Hacking Mobile Platforms Review

Module 18: IoT Hacking & OT Hacking

  •    18.1 IoT Overview
  •    18.2 IoT Infrastructure
  •    18.3 IoT Vulnerabilities and Threats
  •    18.4 IoT Hacking Methodology and Tools
  •    18.4.1 ACTIVITY - Card Cloning with Flipper Zero
  •    18.5 IoT Hacking Countermeasures
  •    18.6 OT Concepts
  •    18.7 IT-OT Convergence
  •    18.8 OT Components
  •    18.9 OT Vulnerabilities
  •    18.10 OT Attack Methodology and Tools
  •    18.11 OT Hacking Countermeasures
  •    18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  •    19.1 Cloud Computing Concepts
  •    19.2 Cloud Types
  •    19.3 Cloud Benefits and Considerations
  •    19.4 Cloud Risks and Vulnerabilities
  •    19.5 AWS Hacking
  •    19.5.1 ACTIVITY - AWS S3 Bucket Hacking
  •    19.6 Azure Cloud Hacking
  •    19.7 Google Cloud Hacking
  •    19.8 Container Hacking
  •    19.9 Cloud Threat Countermeasures
  •    19.10 Cloud Computing Review

Module 20: Cryptography

  •    20.1 Cryptography Concepts
  •    20.2 Symmetric Encryption
  •    20.2.1 ACTIVITY - Symmetric Encryption
  •    20.3 Asymmetric Encryption
  •    20.3.1 ACTIVITY - Asymmetric Encryption
  •    20.4 Public Key Exchange
  •    20.5 PKI
  •    20.5.1 ACTIVITY - Generating and Using an Asymmetric Key Pair
  •    20.6 Digital Signatures
  •    20.7 Hashing
  •    20.7.1 ACTIVITY - Calculating Hashes
  •    20.8 Common Encryption Use Cases
  •    20.9 Cryptography Tools
  •    20.10 Cryptography Attacks
  •    20.11 Cryptography Review
  •    20.12 Course Conclusion

Module 21: Challenge Lab

  •    21.1-ACTIVITY-Challenge-Lab-Introduction
  •    21.2-ACTIVITY-Flag 1 - Port Authority, Please!
  •    21.3-ACTIVITY-Flag 2 - Moo-ve Fast and Break Things
  •    21.4-ACTIVITY-Flag 3 - Pixels, Packets & Patient X
  •    21.5-ACTIVITY-Flag 4 - Hexes and Hashes
  •    21.6-ACTIVITY-Flag 5 - APT & the PowerShell Symphony
  •    21.7-ACTIVITY-Flag 6 - Script Kiddie's Revenge
  •    21.8-ACTIVITY-Flag 7 - Oh Mannie, You Shouldn't Have!
  •    21.9-ACTIVITY-Report