EC Council Certified
Ethical Hacker v13

Overview

The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. CEH v13 powered with AI capabilities will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.

CEH v13 powered with AI capabilities was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker.

Course Objective

CEH is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module offers extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time on live machines.

Who Should Attend

• Mid-Level Information Security Auditor
• Cybersecurity Auditor
• Security Administrator
• IT Security Administrator
• Cyber Defense Analyst
• Vulnerability Assessment Analyst
• Warning Analyst
• Information Security Analyst 1
• Security Analyst L1
• Infosec Security Administrator
• Cybersecurity Analyst level 1, level 2, & level 3
• Network Security Engineer
• SOC Security Analyst
• Security Analyst
• Network Engineer
• Senior Security Consultant
• Information Security Manager
• Senior SOC Analyst
• Solution Architect
• Cybersecurity Consultant

Prerequisites

There are no specific prerequisites for the CEH program, however we strongly recommend candidates possess a minimum of 2 years’ experience in IT security before joining a CEH training program. CEH training is about testing systems and using them for purposes not originally intended, candidates should understand the basic functions of those IT systems before attempting to hack them. (Example: CEH will teach the process of host evaluation leading to enumeration, in this process trainees will scan downrange targets using common scanning techniques such as Nmap which will respond with a list of ports, enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems. The CEH program will not teach you what a port is, that is essential knowledge you must have to be successful in the class.) If you do not possess the foundational skills in IT and Networking, we recommend starting with our free cybersecurity Essentials Series found here: https://www.eccouncil.org/academia/essentials
Analyzing Data with MS Excel

Training Calendar

Intake

Duration

Program Fees

Inquire further

5 Day

Contact us to find out more

Module


Learn the fundamentals and key issues in information security, including the
basics of ethical hacking, information security controls, relevant laws, and
standard procedures.


Learn how to use the latest techniques and tools for foot printing and
reconnaissance, a critical pre-attack phase of ethical hacking.


Learn different network scanning techniques and countermeasures.


Learn various enumeration techniques, including Border Gateway Protocol
(BGP) and Network File Sharing (NFS) exploits and associated countermeasures.


Learn how to identify security loopholes in a target organization’s network,
communication infrastructure, and end systems. Different types of vulnerability
assessment and vulnerability assessment tools are also included.


Learn about the various system hacking methodologies used to discover system
and network vulnerabilities, including steganography, steganalysis attacks, and
how to cover tracks.


Learn about different types of malware (Trojan, viruses, worms, etc.), APT and
fileless malware, malware analysis procedures, and malware countermeasures.


Learn about packet sniffing techniques and their uses for discovering network
vulnerabilities, plus countermeasures to defend against sniffing attacks.


Learn social engineering concepts and techniques, including how to identify
theft attempts, audit human-level vulnerabilities, and suggest social engineering
countermeasures.

Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack
techniques, plus the tools used to audit a target and devise DoS and DDoS
countermeasures and protections.

FAQs

Q: What is the Certified Ethical Hacker (CEH) v13 course about?
A: The CEH v13 course provides an in-depth understanding of ethical hacking phases, attack vectors, and preventive countermeasures. With AI-powered capabilities, it teaches how hackers think and act to help you strengthen your security infrastructure and defend against attacks. The course covers system weaknesses and vulnerabilities, helping you protect organizations from malicious threats.

Q: Who should attend this course?
A: The CEH v13 course is ideal for cybersecurity professionals, including:

  • Information Security Auditors

  • Security Administrators

  • Vulnerability Assessment Analysts

  • Network Security Engineers

  • SOC Analysts

  • IT Security Administrators

  • Cybersecurity Consultants

  • Network Engineers

  • Cyber Defense Analysts
    and anyone aiming to enhance their ethical hacking skills.

Q: What are the prerequisites for this course?
A: There are no strict prerequisites, but it is recommended that participants have at least 2 years of IT security experience. A basic understanding of IT systems, networking, and common hacking tools is crucial for success.

Q: How long is the course?
A: The course lasts 5 days.

Q: What key topics are covered in this course?
Key topics include:

  • Ethical Hacking Fundamentals

  • Footprinting and Reconnaissance

  • Network Scanning and Enumeration

  • System Hacking and Malware Threats

  • Sniffing and Social Engineering

  • Denial-of-Service and Session Hijacking

  • Hacking Web Servers and Applications

  • SQL Injection and Wireless Network Security

  • Mobile and IoT Hacking

  • Cloud Computing and Cryptography

Q: Will I receive a certification after completing the course?
A: Yes. After successfully completing the course and exam, you will earn the Certified Ethical Hacker (CEH) v13 certification, validating your expertise in ethical hacking and cybersecurity.

Q: What is the Certified Threat Intelligence Analyst (CTIA) course about?
A: The CTIA course builds specialist-level skills in cyber threat intelligence. It teaches participants how to convert unknown threats into known threats using structured methodologies and real-world frameworks. The course covers the entire Threat Intelligence Life Cycle, helping professionals proactively detect, analyze, and respond to cyber threats.

Q: Who should attend this course?
A: This course is ideal for cybersecurity professionals such as Ethical Hackers, Security Analysts, SOC Team Members, Threat Hunters, Digital Forensics Experts, Malware Analysts, Incident Responders, and anyone looking to deepen their expertise in threat intelligence and cyber defense.

Q: What are the prerequisites for this course?
A: Participants should have at least 2 years of experience in cybersecurity or information security, with a good understanding of cyber threats, network security, and basic security operations.

Q: How long is the course?
A: The course duration is 5 days.

Q: What key topics are covered in this course?
A: Topics include cyber threat intelligence concepts, kill chain methodology, planning and managing a threat intelligence program, data collection and processing, threat analysis techniques, reporting and dissemination of intelligence, and use of threat intelligence tools and platforms.

Q: Will I learn about real-world threat intelligence practices?
A: Yes, the course uses practical scenarios, intelligence frameworks, and tools to help participants apply threat intelligence techniques in real-world environments.

Q: Will I receive a certification after completing the course?
A: Yes. After successfully completing the course and passing the exam, participants will earn the Certified Threat Intelligence Analyst (CTIA) certification.

Submit your interest today !

Contact us