CEHv13 – Certified Ethical Hacker

CEHv13
https://www.mtc-training.co.uk/wp-content/uploads/2023/04/download-9.png

Overview

About the Course

The EC-Council’s Certified Ethical Hacker (CEH v13) training programme will enhance your knowledge of essential security fundamentals, powered by the latest AI capabilities. Certified Ethical Hacker (CEH v13) certification is one of the most in-demand cybersecurity qualifications globally. This internationally recognised course validates your ability to discover weaknesses in an organisation’s network infrastructure, leverage AI for automating threat detection, and effectively combat sophisticated cyber-attacks.

The C|EH v13 programme is a specialised, comprehensive training programme that combines ethical hacking with AI-powered tools and hands-on experience. It includes labs, assessments, a mock engagement, and a global hacking competition, designed to equip you with real-world skills.

As cyber threats continuously evolve, organisations worldwide need cybersecurity professionals who can anticipate and prevent AI-driven threats. The Certified Ethical Hacker (C|EH v13) programme is respected globally for its forward-thinking curriculum, which includes AI integration, advanced hacking tools, and techniques to address modern security challenges.

Key updates in the CEH v13 programme include AI-driven reconnaissance, automated threat detection, predictive breach analysis, and securing AI systems. This new version will prepare you to stay ahead in cybersecurity, leveraging AI skills alongside ethical hacking techniques.

This professional edition of the EC-Council Certified Ethical Hacker includes:

  • CEHv13 e-book (and next version)
  • CEHv13 official videos
  • 6 months access to CEHv13 labs
  • CEHv13 exam voucher with 1 retake attempt (to be used within 6 months)
  • CEH Engage (mock hacking engagement)

This certification is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements, while also aligning with global standards such as ANAB ISO 17024 and NICE 2.0.


Audience Profile

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat / Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers

Prerequisites

Basic understanding of network essentials, core concepts, and familiarity with server and network components. AI skills are not a prerequisite but will be developed during the course.

Course Details

  • Course Ref: CEHv13
  • Course Duration: 5 days
  • Course Location: Sunderland
  • Course Dates: 10—14 February 2025
  • Course Price: £2495 (Excl VAT)

Modules

  • Module 01: Introduction to Ethical Hacking
    • Overview of ethical hacking fundamentals, security controls, and laws.
  • Module 02: Footprinting and Reconnaissance
    • Techniques and tools for information gathering and reconnaissance.
  • Module 03: Scanning Networks
    • Methods for network scanning and identifying vulnerabilities.
  • Module 04: Enumeration
    • Techniques for discovering network resources and services.
  • Module 05: Vulnerability Analysis
    • Identifying security weaknesses in networks and systems.
  • Module 06: System Hacking
    • Methods for exploiting system vulnerabilities, including data hiding.
  • Module 07: Malware Threats
    • Different types of malware, analysis techniques, and countermeasures.
  • Module 08: Sniffing
    • Packet sniffing techniques and defense strategies.
  • Module 09: Social Engineering
    • Exploiting human vulnerabilities through social engineering attacks.
  • Module 10: Denial-of-Service
    • Techniques for conducting and mitigating DoS/DDoS attacks.
  • Module 11: Session Hijacking
    • Methods to hijack and exploit session vulnerabilities.
  • Module 12: Evading IDS, Firewalls, and Honeypots
    • Techniques to bypass intrusion detection systems and firewalls.
  • Module 13: Hacking Web Servers
    • Web server attack methodologies and defenses.
  • Module 14: Hacking Web Applications
    • Techniques for web app exploitation and protection.
  • Module 15: SQL Injection
    • Exploiting databases using SQL injection and mitigation techniques.
  • Module 16: Hacking Wireless Networks
    • Wireless encryption weaknesses and hacking techniques.
  • Module 17: Hacking Mobile Platforms
    • Attacks targeting Android and iOS devices, mobile security measures.
  • Module 18: IoT Hacking
    • Exploiting IoT and operational technology vulnerabilities.
  • Module 19: Cloud Computing
    • Threats and security techniques for cloud infrastructure.
  • Module 20: Cryptography
    • Encryption algorithms, cryptographic attacks, and countermeasures.