EC Council Certified
Ethical Hacker v13
Overview
CEH v13 powered with AI capabilities was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker.
Course Objective
Who Should Attend
• Mid-Level Information Security Auditor
• Cybersecurity Auditor
• Security Administrator
• IT Security Administrator
• Cyber Defense Analyst
• Vulnerability Assessment Analyst
• Warning Analyst
• Information Security Analyst 1
• Security Analyst L1
• Infosec Security Administrator
• Cybersecurity Analyst level 1, level 2, & level 3
• Network Security Engineer
• SOC Security Analyst
• Security Analyst
• Network Engineer
• Senior Security Consultant
• Information Security Manager
• Senior SOC Analyst
• Solution Architect
• Cybersecurity Consultant
Prerequisites

Training Calendar
Intake
Duration
Program Fees
Module
Module 1 - Introduction to Ethical Hacking
Learn the fundamentals and key issues in information security, including the
basics of ethical hacking, information security controls, relevant laws, and
standard procedures.
Module 2 - Foot Printing and Reconnaissance
Learn how to use the latest techniques and tools for foot printing and
reconnaissance, a critical pre-attack phase of ethical hacking.
Module 3 - Scanning Networks
Learn different network scanning techniques and countermeasures.
Module 4 - Enumeration
Learn various enumeration techniques, including Border Gateway Protocol
(BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Module 5 - Vulnerability Analysis
Learn how to identify security loopholes in a target organization’s network,
communication infrastructure, and end systems. Different types of vulnerability
assessment and vulnerability assessment tools are also included.
Module 6 - System Hacking
Learn about the various system hacking methodologies used to discover system
and network vulnerabilities, including steganography, steganalysis attacks, and
how to cover tracks.
Module 7 - Malware Threats
Learn about different types of malware (Trojan, viruses, worms, etc.), APT and
fileless malware, malware analysis procedures, and malware countermeasures.
Module 8 - Sniffing
Learn about packet sniffing techniques and their uses for discovering network
vulnerabilities, plus countermeasures to defend against sniffing attacks.
Module 9 - Social Engineering
Learn social engineering concepts and techniques, including how to identify
theft attempts, audit human-level vulnerabilities, and suggest social engineering
countermeasures.
Module 10 - Denial-of-Service
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack
techniques, plus the tools used to audit a target and devise DoS and DDoS
countermeasures and protections.
FAQs
General Questions:
Q: What is the Certified Ethical Hacker (CEH) v13 course about?
A: The CEH v13 course provides an in-depth understanding of ethical hacking phases, attack vectors, and preventive countermeasures. With AI-powered capabilities, it teaches how hackers think and act to help you strengthen your security infrastructure and defend against attacks. The course covers system weaknesses and vulnerabilities, helping you protect organizations from malicious threats.
Q: Who should attend this course?
A: The CEH v13 course is ideal for cybersecurity professionals, including:
Information Security Auditors
Security Administrators
Vulnerability Assessment Analysts
Network Security Engineers
SOC Analysts
IT Security Administrators
Cybersecurity Consultants
Network Engineers
Cyber Defense Analysts
and anyone aiming to enhance their ethical hacking skills.
Q: What are the prerequisites for this course?
A: There are no strict prerequisites, but it is recommended that participants have at least 2 years of IT security experience. A basic understanding of IT systems, networking, and common hacking tools is crucial for success.
Q: How long is the course?
A: The course lasts 5 days.
Q: What key topics are covered in this course?
Key topics include:
Ethical Hacking Fundamentals
Footprinting and Reconnaissance
Network Scanning and Enumeration
System Hacking and Malware Threats
Sniffing and Social Engineering
Denial-of-Service and Session Hijacking
Hacking Web Servers and Applications
SQL Injection and Wireless Network Security
Mobile and IoT Hacking
Cloud Computing and Cryptography
Q: Will I receive a certification after completing the course?
A: Yes. After successfully completing the course and exam, you will earn the Certified Ethical Hacker (CEH) v13 certification, validating your expertise in ethical hacking and cybersecurity.
Program Content & Skills:
Q: What is the Certified Threat Intelligence Analyst (CTIA) course about?
A: The CTIA course builds specialist-level skills in cyber threat intelligence. It teaches participants how to convert unknown threats into known threats using structured methodologies and real-world frameworks. The course covers the entire Threat Intelligence Life Cycle, helping professionals proactively detect, analyze, and respond to cyber threats.
Q: Who should attend this course?
A: This course is ideal for cybersecurity professionals such as Ethical Hackers, Security Analysts, SOC Team Members, Threat Hunters, Digital Forensics Experts, Malware Analysts, Incident Responders, and anyone looking to deepen their expertise in threat intelligence and cyber defense.
Q: What are the prerequisites for this course?
A: Participants should have at least 2 years of experience in cybersecurity or information security, with a good understanding of cyber threats, network security, and basic security operations.
Q: How long is the course?
A: The course duration is 5 days.
Q: What key topics are covered in this course?
A: Topics include cyber threat intelligence concepts, kill chain methodology, planning and managing a threat intelligence program, data collection and processing, threat analysis techniques, reporting and dissemination of intelligence, and use of threat intelligence tools and platforms.
Q: Will I learn about real-world threat intelligence practices?
A: Yes, the course uses practical scenarios, intelligence frameworks, and tools to help participants apply threat intelligence techniques in real-world environments.
Q: Will I receive a certification after completing the course?
A: Yes. After successfully completing the course and passing the exam, participants will earn the Certified Threat Intelligence Analyst (CTIA) certification.
Submit your interest today !