Course Outline
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT and OT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
Included in the price of the training is a CEH v13 Elite package that includes training materials, exam voucher, access to the video library and labs (for 6 months), and 1 extra retake of the exam.
Requirements
What is new in CEH version 13?
- AI-powered - The world’s first ethical hacking certification to harness the power of AI.
- Hands-on experience - Hone your skills in real-world scenarios through hands-on labs, where you practice attack vectors and master advanced hacking tools.
- More efficiency - Learn AI-driven techniques to boost efficiency by 40% in cyber defense and streamline your workflow.
- Power-packed, updated curriculum - Master the latest advanced attack techniques, trends, and countermeasures.
- 2x productivity gains - Advanced Threat Detection, Enhanced Decision Making, Adaptive Learning, Enhanced Reporting, and Automation of Repetitive Tasks.
- Real-world skills, proven mastery - Participate in monthly global hacking competitions, compete with your peers, and make it to the leaderboard.
Prerequisites
- An understanding of Windows and Linux operating systems
- Basic experience with cybersecurity and IT
Audience
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Information Security Analyst 1
- Infosec Security Administrator
- Cybersecurity Analyst level 1, level 2, & level 3
- Network Security Engineer
- SOC Security Analyst
- Network Engineer
- Senior Security Consultant
- Information Security Manager
- Senior SOC Analyst
- Solution Architect
- Cybersecurity Consultant
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- All-Source Analyst
- Cyber Defense Incident Responder
- Research & Development Specialist
- Senior Cloud Security Analyst
- Third Party Risk Management
- Threat Hunting Analyst
- Penetration tester
- Cyber Delivery Manager
- Application Security Risk
- Threat Modelling Specialist
- Web Application Penetration Testing
- SAP Vulnerability Management - Solution Delivery Advisor
- Ethical Hacker
- SIEM Threat Responder
- Product Security Engineer / Manager
- Endpoint Security Engineer
- Cybersecurity Instructor
- Red Team Specialist
- Data Protection & Privacy Officer
- SOAR Engineer
- AI Security Engineer
- Sr. IAM Engineer
- PCI Security Advisor
- Exploitation Analyst (EA)
- Zero Trust Solutions Engineer / Analyst
- Cryptographic Engineer
- AI/ML Security Engineer
- Machine Learning Security Specialist
- AI Penetration Tester
- AI/ML Security Consultant
- Crypto Security Consultant