Certified Ethical Hacking – v13 (CEH) cover image

Certified Ethical Hacking – v13 (CEH)

Duration: 5 Days

SGD 2,200.00

The Certified Ethical Hacker (CEH v13) training program is designed to equip professionals with the essential skills to become proficient in ethical hacking and cybersecurity. The v13 version introduces a robust integration of AI-powered technologies and advanced techniques to enhance the learning experience and effectiveness of ethical hacking strategies. Through hands-on labs, real-world simulations, and cutting-edge AI-driven tools, participants will become proficient in ethical hacking techniques and critical cybersecurity practices for defending against traditional and modern AI-powered threats.
Module 1: Introduction to Ethical Hacking

Information Security Overview

Hacking Concepts

Ethical Hacking Concepts

Hacking Methodologies and Frameworks

Information Security Controls

Information Security Laws and Standards

Module 2: Footprinting and Reconnaissance

Footprinting through Search Engines & Internet Services

Social Engineering and AI-based tools

Footprinting Countermeasures

Module 3: Scanning Networks

Host, Port and OS Discovery

Bypassing IDS/Firewalls

Scanning Countermeasures

Module 4: Enumeration

NetBIOS, SNMP, LDAP, SMTP, DNS Enumeration

Countermeasures

Module 5: Vulnerability Analysis

Assessment Concepts, Tools, Reports and Lifecycle

Module 6: System Hacking

Gaining and Maintaining Access

Privilege Escalation

Clearing Logs

Module 7: Malware Threats

Trojan, Virus, Worms, Fileless and AI-Based Malware

Countermeasures and Anti-malware tools

Module 8: Sniffing

Sniffing Techniques, Tools and Countermeasures

Module 9: Social Engineering

Human, Computer and Mobile-based Attacks

Countermeasures

Module 10: Denial-of-Service

DoS/DDoS Techniques, Botnets, Case Studies

Countermeasures

Module 11: Session Hijacking

Application-Level and Network-Level Hijacking

Tools and Countermeasures

Module 12: Evading IDS, Firewalls, and Honeypots

Evasion Techniques and Countermeasures

IDS/IPS, Firewall Tools, NAC Bypass

Module 13: Hacking Web Servers

Attack Methodologies and Patch Management

Module 14: Hacking Web Applications

Web App Threats, APIs, Webhooks, Security Measures

Module 15: SQL Injections

Injection Types, Methodologies, Evasion & Countermeasures

Module 16: Hacking Wireless Networks

Encryption, Threats, Attacks, and Countermeasures

Module 17: Hacking Mobile Platforms

Android/iOS Hacking

Mobile Security Tools and MDM

Module 18: IoT & OT Hacking

IoT and OT Concepts, Attacks, Methodologies

Module 19: Cloud Computing

Cloud Security, Container & Serverless Tech

AWS, Azure, GCP Hacking and Countermeasures

Module 20: Cryptography

Encryption, Cryptanalysis and Defense Techniques