OVERVIEW
The EC-Council’s Certified Ethical Hacker (CEH v13) program delivers advanced training in identifying, analyzing, and countering cyber threats, vulnerabilities, and attack strategies in modern IT frameworks. Integrating AI-driven techniques, this version enhances threat detection and response capabilities for Ethical Hackers. With modules mapped to over 45 cybersecurity roles, CEH v13 provides participants with versatile expertise to excel across the cybersecurity landscape.
Provide in-depth coverage of all 20 CEH exam domains and current attack trends Develop mastery of penetration testing, vulnerability assessment and cybersecurity methodologies Teach proactive ethical hacking skills for assessing risk and hardening systems Apply knowledge gained through simulated hands-on labs practicing with industry tools Instill an attitude of lifelong learning to stay abreast of evolving technologies and best practices in the field Furnish credentials recognized globally demonstrating technical expertise for career growth Align learning to address most in-demand IT jobs requiring security certifications Lay the practical and conceptual foundation for other top specialist security certifications
AI Certification Training Course Syllabus
Introduction to Ethical Hacking
- Real-world hacking skills
- Hacking Concepts
- Ethical Hacking Concepts
- Hacking Methodologies and Frameworks
- Information Security Controls
- Enumeration Countermeasures
- Information Security Laws and Standards
Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Internet Research Services
- Whois Footprinting
- DNS Footprinting
- Network and Email Footprinting
- Footprinting through Social Engineering
- Footprinting Tasks using Advanced Tools and AI
- Footprinting Countermeasures
Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Host Discovery
- Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Network Scanning Countermeasures
Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Scoring Systems and Databases
- Vulnerability-Management Life Cycle
- Vulnerability Research
- Vulnerability Scanning and Analysis
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
Malware Threats
- Malware Concepts
- Trojan Concepts
- Viruses and Worms
- Fileless Malware Concepts
- AI-based Malware Concepts
- Malware Countermeasures
- Anti-Malware Software
Sniffing
- Sniffing Concepts
- Sniffing Technique
- Sniffing Tools
- Sniffing Countermeasures
Social Engineering
- Social Engineering Concepts
- Human-based Social Engineering Techniques
- Computer-based Social Engineering Techniques
- Mobile-based Social Engineering Techniques
- Social Engineering Countermeasures
Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Countermeasures
Session Hijacking
- Session Hijacking Concepts
- Application-Level Session Hijacking
- Network-Level Session Hijacking
- Session Hijacking Tools
- Session Hijacking Countermeasures
Evading IDS, Firewalls, and Honeypots
- Intrusion Detection/Prevention System (IDS/IPS) Concepts
- Firewall Concepts
- IDS, IPS, and Firewall Solutions
- Evading IDS/Firewalls
- Evading NAC and Endpoint Security
- IDS/Firewall Evading Tools
- Honeypot Concepts
- IDS/Firewall Evasion Countermeasures
- Mobile Device Management
- Mobile Security Guidelines
- Mobile Security Tools
Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Countermeasures
- Patch Management
Hacking Web Applications
- Web Application Concepts
- Web Application Threats
- Web Application Hacking Methodology
- Web API and Webhooks
- Web Application Security
SQL Injections
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- Evasion Techniques
- SQL Injection Countermeasures
Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Ethical hackers and security engineers
- Network security architects and administrators
- IT auditors and security operations center analysts
- Threat intelligence analysts looking to supplement OSINT skills
- Information risk managers seeking to shore up technical expertise
- Security leaders interested in an executive overview of modern attacks
IoT Hacking & OT Hacking
- IoT Hacking
- IoT Concepts and Attacks
- IoT Hacking Methodology
- OT Hacking
Cloud Computing
- Cloud Computing Concepts
- Container Technology
- Serverless Computing
- Cloud Hacking
- Cloud Hacking Methodology
- AWS Hacking
- Microsoft Azure Hacking
- Google Cloud Hacking
- Container Hacking
- Cloud Security
Cryptography
- Cryptography Concepts and Encryption Algorithms
- Applications of Cryptography
- Cryptanalysis
- Cryptography Attack Countermeasures
Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Countermeasures
Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Countermeasures