Master the art of ethical hacking with the Certified Ethical Hacker (CEH) v13, designed for cybersecurity professionals to stay ahead with cutting-edge techniques, tools, and AI integration.
EnrollUnderstand ethical hacking phases and preventative countermeasures.
Implement skills to think like hackers for improved security infrastructure.
Design real-world ethical hacking solutions in consequence-free environments.
Execute comprehensive vulnerability assessments and penetration tests.
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v13 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.” CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure. In its 13th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. The CEH v13 program immerses you in real-world ethical hacking through the dynamic CEH practice environment. With CEH Engage, you’ll sharpen your skills and prove you have what it takes to thrive as an ethical hacker. New to CEH v13, learners will embark on their first emulated ethical hacking engagement. This four-phase engagement requires students to think critically and test the knowledge and skills gained by capturing a series of flags in each phase. It demonstrates the live application of skills and abilities in a consequence-free environment through EC-Council’s new “Cyber Range.” As you complete your training and labs, CEH Engage empowers you to put theory into practice through a mock hacking engagement. You’ll navigate a real-world, four-part engagement, targeting an emulated organization. Using a capture-the-flag format, you’ll progress by answering critical “flag” questions, gaining hands-on experience in a full-scale ethical hacking operation. This course includes one remote exam voucher for the CEH - Certified Ethical Hacker exam (312-50).
Fundamentals of information security
Basics of ethical hacking
Information security controls
Relevant laws and procedures
Techniques and tools for footprinting
Reconnaissance methods
Network scanning techniques
Countermeasures
Enumeration techniques
BGP and NFS exploits
Countermeasures
Identifying security loopholes
Vulnerability assessment tools
System hacking methodologies
Steganography and steganalysis attacks
Types of malware
Malware analysis procedures
Countermeasures
Packet sniffing techniques
Defenses against sniffing
Social engineering concepts
Identification of theft attempts
DoS and DDoS attack techniques
Countermeasures and protections
Session hijacking techniques
Network session management vulnerabilities
Evasion techniques
Tools for auditing network perimeters
Web server attack methodologies
Web application hacking methodologies
SQL injection techniques
Countermeasures
Wireless network vulnerabilities
Security tools and countermeasures
Mobile platform attack vectors
Mobile security guidelines
IoT attack methodologies
Countermeasures
Cloud computing threats and attacks
Security techniques and tools
Encryption algorithms
Cryptography attacks
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier