
CEH v13 AI Certification Training
Program Highlights
The EC-Council’s Certified Ethical Hacker (CEH v13) training program focuses on understanding and countering cyber threats, vulnerabilities, and attack vectors in modern IT environments. This version emphasizes the use of AI techniques to enhance cybersecurity defenses and help Ethical Hackers identify threats more efficiently.
The new CEH v13 modules are aligned with 45+ cybersecurity job roles, ensuring that participants gain the expertise required for diverse positions in the cybersecurity field.
- 40-Hour LIVE Instructor-led Training
- EC-Council Authorized Partner
- Highly Interactive and Dynamic Sessions
- Practical Training on Latest Tools
- 98% Exam Pass Rate
- Learn from CEI Certified Trainers
- Career Guidance and Mentorship
- Extended Post- Training Support
- Access to Recorded Sessions
Curriculum
- 20 Sections
- 20 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Module 1: Introduction to Ethical Hacking1
- Module 2: Footprinting and Reconnaissance1
- Module 3: Scanning Networks1
- Module 4: Enumeration1
- Module 5: Vulnerability Analysis1
- Module 6: System Hacking1
- Module 7: Malware Threats1
- Module 8: Sniffing1
- Module 9: Social Engineering1
- Module 10: Denial-of-Service1
- Module 11: Session Hijacking1
- Module 12: Evading IDS, Firewalls, and Honeypots1
- Module 13: Hacking Web Servers1
- Module 14: Hacking Web Applications1
- Module 15: SQL Injections1
- Module 16: Hacking Wireless Networks1
- Module 17: Hacking Mobile Platforms1
- Module 18: IoT Hacking & OT Hacking1
- Module 19: Cloud Computing1
- Module 20: Cryptography1
Requirements
- Basic understanding of network essentials and core concepts, including server and network components.
Features
- Ethical hacking fundamentals, cyber kill chain concepts, an overview of information security and security measures with AI-enhanced threat detection and response.
- Concepts, methodologies, and tools of footprinting using AI for automated information gathering and reconnaissance.
- Concepts of vulnerability assessment, its categories and strategies, and AI-driven exposure to technologies used in the industry.
- Social engineering concepts and terminologies, including identity theft, impersonation, insider threats, social engineering techniques, and AI-based countermeasures.
- Operational Technology (OT) essentials, threats, attack methodologies, and AI-powered attack prevention.
- Recognizing vulnerabilities in IoT and ensuring the safety of IoT devices using AI-based security solutions.
- Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, cryptanalysis, and enhanced cryptographic defense.
- Cloud computing, threats and security, AI-driven container technology, and serverless computing security measures.
Target audiences
- Security Analysts
- Ethical Hackers
- System Administrators
- Network Administrators
- Network and Security Engineers
- Cyber Security Managers
- Information Security Auditors
- Security Professionals