CEH v13 AI Certification Training
Become a Certified Ethical Hacker (New version)
- Highly interactive CEH v13 certification training provided by industry leaders
- Master all domains of the latest CEH v13 with AI driven tools and techniques
- Our CEH v13 Course highlights the promise of a 98% Pass Rate
- CEH v13 Course benefits with career transformations across the globe
Program Highlights
The EC-Council Certified Ethical Hacker (CEH v13) training program equips professionals with the skills to detect and counter cyber threats, vulnerabilities, and attack vectors in modern IT environments. This updated version highlights the integration of AI techniques to enhance cybersecurity defenses, enabling Ethical Hackers to identify threats more effectively and efficiently.
CEH v13 is aligned with 45+ cybersecurity job roles, providing participants with the practical expertise and knowledge needed for a wide range of roles in the cybersecurity field, including Penetration Tester, Security Analyst, and more.
About course
The Certified Ethical Hacker (CEH v13) training program is designed to equip professionals with the essential skills to become proficient in ethical hacking and cybersecurity. The v13 version introduces a robust integration of AI-powered technologies and advanced techniques to enhance the learning experience and effectiveness of ethical hacking strategies.
Through hands-on labs, real-world simulations, and cutting-edge AI-driven tools, participants will become proficient in ethical hacking techniques and critical cybersecurity practices for defending against traditional and modern AI-powered threats.
Differences Between CEH v12 and CEH v13
CEH v12 | CEH v13 | |
Total Number of Modules | 20 | 20 |
Total Number of Labs | 220 | 91 Core Labs + 130 Self-study Labs* |
Attack Techniques | 519 | 550 |
New Technology Added | MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, Techniques for Establishing Persistence, Evading NAC and Endpoint Security, Fog Computing, Edge Computing, and Grid Computing | AI-Driven Ethical Hacking, Active Directory Attacks, Ransomware Attacks and Mitigation, AI and Machine Learning in Cybersecurity, IoT Security Challenges, Critical Infrastructure Vulnerabilities, Deepfake Threats |
Through hands-on labs, real-world simulations, and cutting-edge AI-driven tools, participants will become proficient in ethical hacking techniques and critical cybersecurity practices for defending against traditional and modern AI-powered threats.
Learning Outcome
Module 1.0: Introduction to Ethical Hacking
1.1 Information Security Overview
1.2 Hacking Concepts
1.3 Ethical Hacking Concepts
1.4 Hacking Methodologies and Frameworks
1.5 Information Security Controls
1.6 Information Security Laws and Standards
Module 2.0: Footprinting and Reconnaissance
2.1 Footprinting Concepts
2.2 Footprinting through Search Engines
2.3 Footprinting through Internet Research Services
2.4 Footprinting through Social Networking Sites
2.5 Whois Footprinting
2.6 DNS Footprinting
2.7 Network and Email Footprinting
2.8 Footprinting through Social Engineering
2.9 Footprinting Tasks using Advanced Tools and AI
2.10 Footprinting Countermeasures
Module 3.0: Scanning Networks
3.1 Network Scanning Concepts
3.2 Scanning Tools
3.3 Host Discovery
3.4 Port and Service Discovery
3.5 OS Discovery (Banner Grabbing/OS Fingerprinting)
3.6 Scanning Beyond IDS and Firewall
3.7 Source Port Manipulation
3.8 Network Scanning Countermeasures
Module 4.0: Enumeration
4.1 Enumeration Concepts
4.2 NetBIOS Enumeration
4.3 SNMP Enumeration
4.4 LDAP Enumeration
4.5 NTP and NFS Enumeration
4.6 SMTP and DNS Enumeration
4.7 Other Enumeration Techniques
4.8 Enumeration Countermeasures
Module 5.0: Vulnerability Analysis
5.1 Vulnerability Assessment Concepts
5.2 Vulnerability Scoring Systems and Databases
5.3 Vulnerability-Management Life Cycle
5.4 Vulnerability Research
5.5 Vulnerability Scanning and Analysis
5.6 Vulnerability Assessment Tools
5.7 Vulnerability Assessment Reports
Module 6.0: System Hacking
6.1 Gaining Access
6.2 Escalating Privileges
6.3 Maintaining Access
6.4 Clearing Logs
Module 7.0: Malware Threats
7.1 Malware Concepts
7.2 APT Concepts
7.3 Trojan Concepts
7.4 Viruses and Worms
7.5 Fileless Malware Concepts
7.6 AI-based Malware Concepts
7.7 Malware Countermeasures
7.8 Anti-Malware Software
Module 8.0: Sniffing
8.1 Sniffing Concepts
8.2 Sniffing Techniques
8.3 Sniffing Tools
8.4 Sniffing Countermeasures
Module 9.0: Social Engineering
9.1 Social Engineering Concepts
9.2 Human-based Social Engineering Techniques
9.3 Computer-based Social Engineering Techniques
9.4 Mobile-based Social Engineering Techniques
9.5 Social Engineering Countermeasures
Module 10.0: Denial-of-Service
10.1 DoS/DDoS Concepts
10.2 Botnets
10.3 DDoS Case Study
10.4 DoS/DDoS Attack Techniques
10.5 DoS/DDoS Attack Countermeasures
Module 11.0: Session Hijacking
11.1 Session Hijacking Concepts
11.2 Application-Level Session Hijacking
11.3 Network-Level Session Hijacking
11.4 Session Hijacking Tools
11.5 Session Hijacking Countermeasures
Module 12.0: Evading IDS, Firewalls, and Honeypots
12.1 Intrusion Detection/Prevention System (IDS/IPS) Concepts
12.2 Firewall Concepts
12.3 IDS, IPS, and Firewall Solutions
12.4 Evading IDS/Firewalls
12.5 Evading NAC and Endpoint Security
12.6 IDS/Firewall Evading Tools
12.7 Honeypot Concepts
12.8 IDS/Firewall Evasion Countermeasures
Module 13.0: Hacking Web Servers
13.1 Web Server Concepts
13.2 Web Server Attacks
13.3 Web Server Attack Methodology
13.4 Web Server Attack Countermeasures
13.5 Patch Management
Module 14.0: Hacking Web Applications
14.1 Web Application Concepts
14.2 Web Application Threats
14.3 Web Application Hacking Methodology
14.4 Web API and Webhooks
14.5 Web Application Security
Module 15.0: SQL Injections
15.1 SQL Injection Concepts
15.2 Types of SQL Injection
15.3 SQL Injection Methodology
15.4 Evasion Techniques
15.5 SQL Injection Countermeasures
Module 16.0: Hacking Wireless Networks
16.1 Wireless Concepts
16.2 Wireless Encryption
16.3 Wireless Threats
16.4 Wireless Hacking Methodology
16.5 Wireless Attack Countermeasures
Module 17.0: Hacking Mobile Platforms
17.1 Mobile Platform Attack Vectors
17.2 Hacking Android OS
17.3 Hacking iOS
17.4 Mobile Device Management
17.5 Mobile Security Guidelines
17.6 Mobile Security Tools
Module 18.0: IoT Hacking & OT Hacking
18.1 IoT Hacking
18.2 IoT Concepts and Attacks
18.3 IoT Hacking Methodology
18.4 OT Hacking
Module 19.0: Cloud Computing
19.1 Cloud Computing Concepts
19.2 Container Technology
19.3 Serverless Computing
19.4 Cloud Hacking
19.5 Cloud Hacking Methodology
19.6 AWS Hacking
19.7 Microsoft Azure Hacking
19.8 Google Cloud Hacking
19.9 Container Hacking
19.10 Cloud Security
Module 20.0: Cryptography
20.1 Cryptography Concepts and Encryption Algorithms
20.2 Applications of Cryptography
20.3 Cryptanalysis
20.4 Cryptography Attack Countermeasures
20.5 Cryptography Tools
Tools
Footprinting Tools
1.1 Maltego
1.2 Foca
1.3 Recon-ng
1.4 Google Dorks
1.5 Whois
1.6 theHarvester
1.7 Shodan
1.8 Dnsrecon
1.9 Grecon
1.10 Photon
1.11 Sherlock
1.12 Spiderfoot
1.13 holehe
Scanning Tools
2.1 Nmap
2.2 Rustscan
2.3 sx-Tool
2.4 Colasoft Packet Builder
2.5 Nessus
2.6 OpenVAS
2.7 QualysGuard
2.8 Nikto
2.9 Angry IP Scanner
2.10 Hping3
Enumeration Tools
3.1 Netcat
3.2 SNMPCheck
3.3 SNMPEnum
3.4 Enum4Linux
3.5 NbtScan
3.6 SuperEnum
3.7 RPCScan
3.8 Dnsrecon
Vulnerability Assessment Tools
4.1 Nessus
4.2 OpenVAS
4.3 QualysGuard
4.4 Nikto
4.5 Burp Suite
4.6 W3af
System Hacking Tools
5.1 Metasploit Framework
5.2 Msfvenom
5.3 Cain & Abel
5.4 John the Ripper
5.5 Hydra
5.6 Medussa
5.7 Hashcat
5.8 RainbowCrack
5.9 Havoc
5.10 PowerSploit
5.11 Reverse-shell-generator
5.12 L0pthCrack
5.13 Winrtgen
5.14 pwdump7
5.15 Tanium Endpoint Management
Sniffing Tools
6.1 Wireshark
6.2 Tcpdump
6.3 Ettercap
6.4 Dsniff
6.5 MITM
6.6 Cain & Abel
6.7 Macchanger
Social Engineering Tools
7.1 Social-Engineer Toolkit (SET)
7.2 Dark-Phish
7.3 Shellphish
Denial of Service Tools
8.1 Slowloris
8.2 LOIC
8.3 HOIC
8.4 UltraDDoS
8.5 pyDDoS
8.6 PyFlooder
Session Hijacking Tools
9.1 CAIDO
9.2 Hetty
9.3 OWASP ZAP
Evading IDS, Firewall, and Honeypots Tools
10.1 Nmap
10.2 Tcpreplay
10.3 Snort
10.4 Hping3
10.5 Pfsense
Hacking Web Server Tools
11.1 Ghost_eye
11.2 Impacket
11.3 Ncat
11.4 NMAP
11.5 Httprecon
11.6 ID Serve
Web Application Hacking Tools
12.1 OWASP ZAP
12.2 Burp Suite
12.3 SQLmap
12.4 Wapiti
12.5 Nikto
12.6 DirBuster
12.7 Wpscan
12.8 Skipfish
12.9 PwnXSS
12.10 Dirsearch
12.11 ClickjackPOC
SQL Injection Tools
13.1 DSSS
13.2 ghauri
13.3 SQLmap
Target Audience
This course is ideal for:
- Security Analysts
- Ethical Hackers
- System Administrators
- Network Administrators
- Network and Security Engineers
- Cyber Security Managers
- Information Security Auditors
- Security Professionals
Pre-requisites
- Basic understanding of network essentials and core concepts, including server and network components.
Exam Information
Certification Name C|EH v13 (MCQ Exam) C|EH v13 (Practical Exam) Exam Format Multiple Choice Questions iLabs Cyber Range Number of Questions 125 Questions 20 Questions Exam Duration 240 Minutes 360 Minutes Passing Score 60-80% 70% Exam Delivery VUE / ECCEXAM –
Course Objectives
- Ethical hacking fundamentals, cyber kill chain concepts, an overview of information security and security measures with AI-enhanced threat detection and response.
- Concepts, methodologies, and tools of footprinting using AI for automated information gathering and reconnaissance.
- Concepts of vulnerability assessment, its categories and strategies, and AI-driven exposure to technologies used in the industry.
- Social engineering concepts and terminologies, including identity theft, impersonation, insider threats, social engineering techniques, and AI-based countermeasures.
- Operational Technology (OT) essentials, threats, attack methodologies, and AI-powered attack prevention.
- Recognizing vulnerabilities in IoT and ensuring the safety of IoT devices using AI-based security solutions.
- Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, cryptanalysis, and enhanced cryptographic defense.
- Cloud computing, threats and security, AI-driven container technology, and serverless computing security measures.
Skills Covered
- Advanced log management
- IDS, firewalls, and honeypots
- Advanced hacking
- Network packet analysis
- Countermeasures, Trojans, & backdoors
- Web & Mobile technologies
What Our Students Are Saying
EXCELLENTBased on 80 reviewsTrustindex verifies that the original source of the review is Google.Chirag YadavAugust 15, 2024I had an excellent experience with FireShark Institute for cyber security and ethical hacking internship ... highly recommendedTrustindex verifies that the original source of the review is Google.Aman yadavJuly 22, 2024Felt like a very good experience. The instructor trained very wellTrustindex verifies that the original source of the review is Google.chandra shekhar PandeyApril 13, 2024Exceptional Instructors, Cutting-Edge Labs. Highly recommended for networking enthusiasts.Trustindex verifies that the original source of the review is Google.Kimaya ChaudhariApril 4, 2024I recently completed a CEH training with FireShark. The experience was amazing, the trainer was extremely knowledgeable and supportive and showed great interest in helping me with tips to clear the exam.Trustindex verifies that the original source of the review is Google.Shubhangi BacchanMarch 26, 2024Best for for cyber security and ethical hacking internship ... highly recommendedTrustindex verifies that the original source of the review is Google.Pallavi TahilMarch 24, 2024My experience with this company was nice !