Certified Ethical Hacker

Offensive Security - Hacking Techniques
Level III - Core

cover

Course Description

The first cybersecurity program on the market to integrate AI!

The CEHv13 program stands out for its thorough integration of AI in all phases of ethical hacking, offering participants a 40% increase in efficiency and doubled productivity.

Unlike CEHv12, CEHv13 includes AI tools and techniques to automate threat detection, predict security breaches and respond rapidly to incidents, it also offers skills to secure AI-based technologies. The program includes 221 hands-on labs, over 550 attack techniques, and the use of more than 4,000 hacking tools. Globally recognized and accredited by organizations such as the US DoD and ANAB, CEH has been the world’s leading certification in ethical hacking for over 20 years!

CEH Methodology

CEHv13 training offers a comprehensive program in cybersecurity. This ethical hacking certification is based on four fundamental points: Learn, Certify, Engage and Challenge. This 4-phase methodology will provide you with a wealth of learning resources, labs, current technologies and techniques, the most accurate simulations possible, and monthly challenges to bring you face to face with the realities of the field.

Who Should Attend

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.

CEHv13 Course – Certified Ethical Hacker

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Footprinting and Reconnaissance
  • Module 3: Scanning Networks
  • Module 4: Enumeration
  • Module 5: Vulnerability Analysis
  • Module 6: System Hacking
  • Module 7: Malware Threats
  • Module 8: Sniffing
  • Module 9: Social Engineering
  • Module 10: Denial of Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT and OT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography