Loading...

Course Description

With 20 cutting-edge modules, you’ll gain the core skills needed to dominate the cybersecurity landscape. C|EH isn’t just keeping pace—it’s leading the charge, evolving with the latest operating systems, exploits, tools, and hacking techniques to ensure you’re always ahead of the curve.

Dive deep into the future of cybersecurity with training that integrates AI into all five phases of ethical hacking, reconnaissance and scanning to gaining access, maintaining access, and covering tracks. You’ll harness the power of AI to supercharge your hacking techniques and disrupt AI systems—giving you 10x efficiency in your cybersecurity role.

CEH v13 isn’t just a certification; it’s a fully immersive experience. CEH combines comprehensive knowledge-based training with immersive hands-on labs to ensure a well-rounded learning experience. You’ll engage with live targets, tools, and vulnerable systems in a controlled environment, building real-world skills that empower you to confidently apply your expertise in any scenario. Get ready to transform the way you hack and protect the digital world!

Course Outline

  • CEHv13 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training.
    1. Introduction to Ethical Hacking
    2. Footprinting and Reconnaissance
    3. Scanning Networks
    4. Enumeration
    5. Vulnerability Analysis
    6. System Hacking
    7. Malware Threats
    8. Sniffing
    9. Social Engineering
    10. Denial-of-Service
    11. Session Hijacking
    12. Evading IDS, Firewalls, and Honeypots
    13. Hacking Web Servers
    14. Hacking Web Applications
    15. SQL Injection
    16. Hacking Wireless Networks
    17. Hacking Mobile Platforms
    18. IoT Hacking
    19. Cloud Computing
    20. Cryptography

Learner Outcomes

Students going through CEH training will learn:

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures
  • Different types of web application attacks, web application hacking methodology, and countermeasures
  • SQL injection attacks and injection detection tools
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
  • Perform vulnerability analysis to identify security loopholes in the target organization’s
    network, communication infrastructure, and end systems.
  • Different threats to IoT platforms and learn how to defend IoT devices securely

Additional Information

The delivery of training is instructor-led training modules with streaming video presentations, practice simulators and learning supplements including official EC-Council Courseware for an all-inclusive training program that provides the benefits of classroom training at your own pace.
 
The CEH iLearn course package includes:
  • One Year Access to the official online e-courseware
  • Digital courseware
  • 6 months access to EC-Council's official Online lab environment (iLabs) with all tools pre-loaded into platform
  • Certification Voucher
  • Practice exam prep 

Exam Details:

  • Exam Title: Certified Ethical Hacker (ANSI accredited)
  • Exam Code: 312-50 (IBT), 312-50 (VUE) or EC0-350 (APTC)
  • Number of Questions: 125
  • Duration: 4 hours
  • Availability: Prometric Prime/ Prometric APTC/ VUE
  • Test Format: Multiple Choice
  • Passing Score: 70%

Prerequisites

There are no prerequisites.
Loading...
Enroll Now - Select a section to enroll in
Section Title
Certified Ethical Hacker - Online Training
Section Schedule
Date and Time TBA
Delivery Option
Course Fee(s)
Rate non-credit $2,795.00
Potential Discount(s)
Required fields are indicated by .
*Academic Unit eligibility to be determined by college/university in which you are enrolled in a degree seeking program.