Leader dans le secteur des formations en cybersécurité.

EC-Council BECOME A CERTIFIED Ethical Hacker (C|EH)

Catégorie
Taux satisfaction
4.9
Taux de réussite
4.9

Description

With 20 cutting-edge modules, you’ll gain the core skills needed to dominate the cybersecurity landscape. CEH isn’t just keeping pace—it’s leading the charge, evolving with the latest operating systems, exploits, tools, and hacking techniques to ensure you’re always ahead of the curve.

Dive deep into the future of cybersecurity with training that integrates AI into all five phases of ethical hacking, reconnaissance and scanning to gaining access, maintaining access, and covering tracks. You’ll harness the power of AI to supercharge your hacking techniques and disrupt AI systems—giving you 10x efficiency in your cybersecurity role. 

CEH v13 isn’t just a certification; it’s a fully immersive experience. CEH combines comprehensive knowledge-based training with immersive hands-on labs to ensure a well-rounded learning experience. You’ll engage with live targets, tools, and vulnerable systems in a controlled environment, building real-world skills that empower you to confidently apply your expertise in any scenario. Get ready to transform the way you hack and protect the digital world!

The CEH v13 is a specialized, one-of-akind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.

This learning framework offers not only a comprehensive training program to prepare you for the certification exam but also the industry’s most robust, in-depth, handson lab and practice range experience.

Target group

  • In-depth knowledge of ethical hacking methodologies and practices, augmented with AI techniques
  • The skills to integrate AI across ethical hacking phases: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
  • AI techniques to automate tasks, boost efficiency, and detect sophisticated threats beyond traditional methods
  • Tools that will utilize AI for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks

Training Program

Module 01 : Introduction to Ethical Hacking
  • Information Security Overview
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Hacking Methodologies and Frameworks
  • Information Security Controls
  • Information Security Laws and Standards
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Internet Research Services
  • Footprinting through Social Networking Sites
  • Whois Footprinting
  • DNS Footprinting
  • Network and Email Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tasks using Advanced Tools and AI
  • Footprinting Countermeasures
  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Fileless Malware Concepts
  • AI-based Malware Concepts
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software
  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • Social Engineering Concepts
  • Human-based Social Engineering Techniques
  • Computer-based Social Engineering Techniques
  • Mobile-based Social Engineering Techniques
  • Social Engineering Countermeasures
  • DoS/DDoS Concepts
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Countermeasures
  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • IDS, IPS, and Firewall Concepts
  • IDS, IPS, and Firewall Solutions
  • Evading IDS/Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Honeypot Concepts
  • IDS/Firewall Evasion Countermeasures
  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Patch Management
  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API and Webhooks
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • Evasion Techniques
  • SQL Injection Countermeasures
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Attack Countermeasures
  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • IoT Hacking
  • OT Hacking
  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Threats
  • Cloud Hacking
  • AWS Hacking
  • Microsoft Azure Hacking
  • Google Cloud Hacking
  • Container Hacking
  • Cloud Security
  • Cryptography Concepts and Encryption Algorithms
  • Applications of Cryptography
  • Cryptanalysis
  • Cryptography Attack Countermeasures

Goal

Armed with your attack platform (Parrot OS) and a plethora of tools used by ethical hackers, you will embark on a 4-part engagement to assess ABCDorg’s security posture. Follow the process, practice your TTP, and experience the real thing in a controlled environment with no consequences. It’s the ultimate learning experience to support your career as an ethical hacker! Each phase builds on the last as you progress through your ABCDorg engagement.

Recommended

  • You need only an internet connection, and can compete through your browser.
  • We provide the attack platform, targets and all the required tools. You bring the skills to win!
Réservez maintenant

Information importante :

Nos formations ne sont pas inscrites au Répertoire National des Certifications Professionnelles (RNCP), mais elles sont conformes aux exigences du Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

Nous utilisons des cookies pour améliorer votre expérience. Consultez notre Politique de cookies et notre Politique de confidentialité.

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.