EC-Council BECOME A CERTIFIED Ethical Hacker (C|EH)


Description
With 20 cutting-edge modules, you’ll gain the core skills needed to dominate the cybersecurity landscape. CEH isn’t just keeping pace—it’s leading the charge, evolving with the latest operating systems, exploits, tools, and hacking techniques to ensure you’re always ahead of the curve.
Dive deep into the future of cybersecurity with training that integrates AI into all five phases of ethical hacking, reconnaissance and scanning to gaining access, maintaining access, and covering tracks. You’ll harness the power of AI to supercharge your hacking techniques and disrupt AI systems—giving you 10x efficiency in your cybersecurity role.
CEH v13 isn’t just a certification; it’s a fully immersive experience. CEH combines comprehensive knowledge-based training with immersive hands-on labs to ensure a well-rounded learning experience. You’ll engage with live targets, tools, and vulnerable systems in a controlled environment, building real-world skills that empower you to confidently apply your expertise in any scenario. Get ready to transform the way you hack and protect the digital world!
The CEH v13 is a specialized, one-of-akind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.
This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, handson lab and practice range experience.
Target group
- In-depth knowledge of ethical hacking methodologies and practices, augmented with AI techniques
- The skills to integrate AI across ethical hacking phases: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
- AI techniques to automate tasks, boost efficiency, and detect sophisticated threats beyond traditional methods
- Tools that will utilize AI for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks
Training Program
- Duration : 5 days
Module 01 : Introduction to Ethical Hacking
- Information Security Overview
- Hacking Concepts
- Ethical Hacking Concepts
- Hacking Methodologies and Frameworks
- Information Security Controls
- Information Security Laws and Standards
Module 02 : Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Internet Research Services
- Footprinting through Social Networking Sites
- Whois Footprinting
- DNS Footprinting
- Network and Email Footprinting
- Footprinting through Social Engineering
- Footprinting Tasks using Advanced Tools and AI
- Footprinting Countermeasures
Module 03 : Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Host Discovery
- Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Network Scanning Countermeasures
Module 04 : Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
Module 05 : Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
Module 06 : System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
Module 07 : Malware Threats
- Malware Concepts
- APT Concepts
- Trojan Concepts
- Virus and Worm Concepts
- Fileless Malware Concepts
- AI-based Malware Concepts
- Malware Analysis
- Malware Countermeasures
- Anti-Malware Software
Module 08 : Sniffing
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
- Sniffing Countermeasures
Module 09 : Social Engineering
- Social Engineering Concepts
- Human-based Social Engineering Techniques
- Computer-based Social Engineering Techniques
- Mobile-based Social Engineering Techniques
- Social Engineering Countermeasures
Module 10 : Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Countermeasures
Module 11 : Session Hijacking
- Session Hijacking Concepts
- Application-Level Session Hijacking
- Network-Level Session Hijacking
- Session Hijacking Tools
- Session Hijacking Countermeasures
Module 12 : Evading IDS, Firewalls, and Honeypots
- IDS, IPS, and Firewall Concepts
- IDS, IPS, and Firewall Solutions
- Evading IDS/Firewalls
- Evading NAC and Endpoint Security
- IDS/Firewall Evading Tools
- Honeypot Concepts
- IDS/Firewall Evasion Countermeasures
Module 13 : Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Countermeasures
- Patch Management
Module 14 : Hacking Web Applications
- Web Application Concepts
- Web Application Threats
- Web Application Hacking Methodology
- Web API and Webhooks
Module 15 : SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- Evasion Techniques
- SQL Injection Countermeasures
Module 16 : Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Attack Countermeasures
Module 17 : Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines and Tools
Module 18 : IoT and OT Hacking
- IoT Hacking
- OT Hacking
Module 19 : Cloud Computing
- Cloud Computing Concepts
- Container Technology
- Serverless Computing
- Cloud Computing Threats
- Cloud Hacking
- AWS Hacking
- Microsoft Azure Hacking
- Google Cloud Hacking
- Container Hacking
- Cloud Security
Module 20 : Cryptography
- Cryptography Concepts and Encryption Algorithms
- Applications of Cryptography
- Cryptanalysis
- Cryptography Attack Countermeasures
Goal
Armed with your attack platform (Parrot OS) and a plethora of tools used by ethical hackers, you will embark on a 4-part engagement to assess ABCDorg’s security posture. Follow the process, practice your TTP, and experience the real thing in a controlled environment with no consequences. It’s the ultimate learning experience to support your career as an ethical hacker! Each phase builds on the last as you progress through your ABCDorg engagement.
Recommended
- You need only an internet connection, and can compete through your browser.
- We provide the attack platform, targets and all the required tools. You bring the skills to win!
- Langue : Anglais
- Niveau : Avancé
- Organisme de certification : EC-Council
- Certification : Oui
- Accesibilité : Oui
- Durée : 5 Jours
Information importante :
Nos formations ne sont pas inscrites au Répertoire National des Certifications Professionnelles (RNCP), mais elles sont conformes aux exigences du Répertoire Spécifique (RS).