Course Outline

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT and OT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

Included in the price of the training is a CEH v13 Elite package that includes training materials, exam voucher, access to the video library and labs (for 6 months), and 1 extra retake of the exam.

Requirements

What is new in CEH version 13?

  • AI-powered - The world’s first ethical hacking certification to harness the power of AI.
  • Hands-on experience - Hone your skills in real-world scenarios through hands-on labs, where you practice attack vectors and master advanced hacking tools.
  • More efficiency - Learn AI-driven techniques to boost efficiency by 40% in cyber defense and streamline your workflow.
  • Power-packed, updated curriculum - Master the latest advanced attack techniques, trends, and countermeasures.
  • 2x productivity gains - Advanced Threat Detection, Enhanced Decision Making, Adaptive Learning, Enhanced Reporting, and Automation of Repetitive Tasks.
  • Real-world skills, proven mastery - Participate in monthly global hacking competitions, compete with your peers, and make it to the leaderboard.

Prerequisites

  • An understanding of Windows and Linux operating systems
  • Basic experience with cybersecurity and IT

Audience

  • Mid-Level Information Security Auditor
  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Information Security Analyst 1
  • Infosec Security Administrator
  • Cybersecurity Analyst level 1, level 2, & level 3
  • Network Security Engineer
  • SOC Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
  • Senior SOC Analyst
  • Solution Architect
  • Cybersecurity Consultant
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • All-Source Analyst
  • Cyber Defense Incident Responder
  • Research & Development Specialist
  • Senior Cloud Security Analyst
  • Third Party Risk Management
  • Threat Hunting Analyst
  • Penetration tester
  • Cyber Delivery Manager
  • Application Security Risk
  • Threat Modelling Specialist
  • Web Application Penetration Testing
  • SAP Vulnerability Management - Solution Delivery Advisor
  • Ethical Hacker
  • SIEM Threat Responder
  • Product Security Engineer / Manager
  • Endpoint Security Engineer
  • Cybersecurity Instructor
  • Red Team Specialist
  • Data Protection & Privacy Officer
  • SOAR Engineer
  • AI Security Engineer
  • Sr. IAM Engineer
  • PCI Security Advisor
  • Exploitation Analyst (EA)
  • Zero Trust Solutions Engineer / Analyst
  • Cryptographic Engineer
  • AI/ML Security Engineer
  • Machine Learning Security Specialist
  • AI Penetration Tester
  • AI/ML Security Consultant
  • Crypto Security Consultant
 35 Hours

Number of participants


Price Per Participant (Exc. Tax)

Promotional Courses (Price Per Participant)

Promotional Courses

Provisional Courses

Related Categories