Certified Ethical Hacker v13
This AI enhanced Ethical Hacking course prepares cybersecurity professionals to earn the EC-Council Certified Ethical Hacker (CEH) v13 certification in just five days.
Training duration: 40 academic hours, all of which are theoretical and practical work (5 days).
Target audience: This course is ideal for:
- Cybersecurity, network security, and cloud security professionals
- Information security analysts, managers, and officers
- IT auditors, system administrators, and engineers
- Risk, threat, and vulnerability analysts
- Professionals pursuing CEH certification or roles in penetration testing
Prerequisites: Participants should be familiar with:
- Windows and Linux/Unix operating systems
- Networking fundamentals and cybersecurity concepts
- Basic understanding of information security protocols
Training objective
The objective of this Ethical Hacking courseis to prepare cybersecurity professionals to earn the EC-Council Certified Ethical Hacker (CEH) v13 certification.
Contents of this training
This AI enhanced Ethical Hacking course prepares cybersecurity professionals to earn the EC-Council Certified Ethical Hacker (CEH) v13 certification in just five days. It provides real-world insights into the ethical hacking process, enabling learners to identify and address vulnerabilities across systems, networks, applications, and cloud environments.
With a curriculum structured around 20 advanced modules, learners will explore attack techniques and commercial-grade hacking tools. Delivered by EC-Council-accredited instructors, the course includes hands-on labs, real-time simulations, and certification preparation, helping learners master both the theory and practice of ethical hacking.
Hands-on learning: Participants will gain hands-on experience through:
- Over 100 guided labs in a cloud-based Cyber Range
- Live environments featuring real-world vulnerabilities and unpatched systems
- Pre-configured tools and target networks to practice attacks and defences
- AI-integrated ethical hacking simulations and practical challenges
Outline
Ethical hacking foundations
- Introduction to ethical hacking and the legal landscape
- Understanding security controls and compliance standards
Reconnaissance and information gathering
- Foot printing techniques and reconnaissance tools
- Scanning networks and identifying live hosts
Network and system exploitation
- Enumeration techniques and tools
- System hacking methodologies including steganography and privilege escalation
Threat detection and malware analysis
- Analysing malware threats (Trojans, viruses, worms, fileless malware)
- Sniffing attacks and defensive strategies
Social engineering and denial-of-service
- Common social engineering tactics and mitigation
- Tools and countermeasures for DoS and DDoS
Advanced exploitation techniques
- Session hijacking techniques
- Evading IDS, firewalls, and honeypots
Web application and database attacks
- Hacking web servers and web applications
- Performing SQL injection and implementing prevention techniques
Wireless, mobile, and IoT security
- Exploiting wireless networks and mobile platforms
- Assessing and securing IoT and OT infrastructures
Cloud and cryptography
- Threats and attack vectors in cloud environments
- Implementing encryption, cryptographic tools, and PKI
Hands-on hacking and AI integration
- Applying the 5-phase hacking framework: reconnaissance, scanning, gaining access, maintaining access, covering tracks
- Conducting AI-enabled penetration tests
- Working with OWASP top 10 vulnerabilities
Exams and assessments
This course includes two EC-Council certification assessments, taken post class:
- CEH Knowledge Exam: 125 multiple-choice questions (4 hours)
- CEH Practical Exam: 20 scenario-based tasks (6 hours)
Participants also benefit from knowledge checks, scenario walkthroughs, and one CEH Knowledge exam retake included in the course package.
The training is held in cooperation with our partner QA 
Intended outcome
Learning objectives:
By the end of this course, learners will be able to:
- Understand ethical hacking principles and information security frameworks
- Perform reconnaissance and vulnerability assessments
- Execute system, network, application, and mobile exploitation
- Analyse malware and identify attack vectors such as Trojans, worms, and APTs
- Conduct penetration testing across web servers, wireless networks, and cloud environments
- Apply countermeasures to threats including DDoS, SQL injection, and social engineering
- Evade firewalls, intrusion detection systems, and honeypots
- Use cryptography and secure communications protocols effectively
- Prepare for the CEH Knowledge and Practical Exams
The price includes:
- virtual training;
- course materials;
- exams.
Continuing Education Curriculum Group: Database and Network Design and Administration
Trainer
-
QA official trainer


