Certified Ethical Hacking – v13 (CEH) cover image

Certified Ethical Hacking – v13 (CEH)

Duration: 5 Days

The Certified Ethical Hacker (CEH v13) training program is designed to equip professionals with the essential skills to become proficient in ethical hacking and cybersecurity. The v13 version introduces a robust integration of AI-powered technologies and advanced techniques to enhance the learning experience and effectiveness of ethical hacking strategies. Through hands-on labs, real-world simulations, and cutting-edge AI-driven tools, participants will become proficient in ethical hacking techniques and critical cybersecurity practices for defending against traditional and modern AI-powered threats.

Course Outline:

Module 1: Introduction to Ethical Hacking

Information Security Overview

Hacking Concepts

Ethical Hacking Concepts

Hacking Methodologies and Frameworks

Information Security Controls

Information Security Laws and Standards

Module 2: Footprinting and Reconnaissance

Footprinting through Search Engines & Internet Services

Social Engineering and AI-based tools

Footprinting Countermeasures

Module 3: Scanning Networks

Host, Port and OS Discovery

Bypassing IDS/Firewalls

Scanning Countermeasures

Module 4: Enumeration

NetBIOS, SNMP, LDAP, SMTP, DNS Enumeration

Countermeasures

Module 5: Vulnerability Analysis

Assessment Concepts, Tools, Reports and Lifecycle

Module 6: System Hacking

Gaining and Maintaining Access

Privilege Escalation

Clearing Logs

Module 7: Malware Threats

Trojan, Virus, Worms, Fileless and AI-Based Malware

Countermeasures and Anti-malware tools

Module 8: Sniffing

Sniffing Techniques, Tools and Countermeasures

Module 9: Social Engineering

Human, Computer and Mobile-based Attacks

Countermeasures

Module 10: Denial-of-Service

DoS/DDoS Techniques, Botnets, Case Studies

Countermeasures

Module 11: Session Hijacking

Application-Level and Network-Level Hijacking

Tools and Countermeasures

Module 12: Evading IDS, Firewalls, and Honeypots

Evasion Techniques and Countermeasures

IDS/IPS, Firewall Tools, NAC Bypass

Module 13: Hacking Web Servers

Attack Methodologies and Patch Management

Module 14: Hacking Web Applications

Web App Threats, APIs, Webhooks, Security Measures

Module 15: SQL Injections

Injection Types, Methodologies, Evasion & Countermeasures

Module 16: Hacking Wireless Networks

Encryption, Threats, Attacks, and Countermeasures

Module 17: Hacking Mobile Platforms

Android/iOS Hacking

Mobile Security Tools and MDM

Module 18: IoT & OT Hacking

IoT and OT Concepts, Attacks, Methodologies

Module 19: Cloud Computing

Cloud Security, Container & Serverless Tech

AWS, Azure, GCP Hacking and Countermeasures

Module 20: Cryptography

Encryption, Cryptanalysis and Defense Techniques