Certified Ethical Hacker v13

This AI enhanced Ethical Hacking course prepares cybersecurity professionals to earn the EC-Council Certified Ethical Hacker (CEH) v13 certification in just five days.

Training duration: 40 academic hours, all of which are theoretical and practical work (5 days).

Target audience: This course is ideal for:

  • Cybersecurity, network security, and cloud security professionals
  • Information security analysts, managers, and officers
  • IT auditors, system administrators, and engineers
  • Risk, threat, and vulnerability analysts
  • Professionals pursuing CEH certification or roles in penetration testing

Prerequisites: Participants should be familiar with:

  • Windows and Linux/Unix operating systems
  • Networking fundamentals and cybersecurity concepts
  • Basic understanding of information security protocols

Training objective

The objective of this Ethical Hacking courseis to prepare cybersecurity professionals to earn the EC-Council Certified Ethical Hacker (CEH) v13 certification.

Contents of this training

Outline

Ethical hacking foundations

  • Introduction to ethical hacking and the legal landscape
  • Understanding security controls and compliance standards

Reconnaissance and information gathering

  • Foot printing techniques and reconnaissance tools
  • Scanning networks and identifying live hosts

Network and system exploitation

  • Enumeration techniques and tools
  • System hacking methodologies including steganography and privilege escalation

Threat detection and malware analysis

  • Analysing malware threats (Trojans, viruses, worms, fileless malware)
  • Sniffing attacks and defensive strategies

Social engineering and denial-of-service

  • Common social engineering tactics and mitigation
  • Tools and countermeasures for DoS and DDoS

Advanced exploitation techniques

  • Session hijacking techniques
  • Evading IDS, firewalls, and honeypots

Web application and database attacks

  • Hacking web servers and web applications
  • Performing SQL injection and implementing prevention techniques

Wireless, mobile, and IoT security

  • Exploiting wireless networks and mobile platforms
  • Assessing and securing IoT and OT infrastructures

Cloud and cryptography

  • Threats and attack vectors in cloud environments
  • Implementing encryption, cryptographic tools, and PKI

Hands-on hacking and AI integration

  • Applying the 5-phase hacking framework: reconnaissance, scanning, gaining access, maintaining access, covering tracks
  • Conducting AI-enabled penetration tests
  • Working with OWASP top 10 vulnerabilities

Exams and assessments

This course includes two EC-Council certification assessments, taken post class:

  • CEH Knowledge Exam: 125 multiple-choice questions (4 hours)
  • CEH Practical Exam: 20 scenario-based tasks (6 hours)

Participants also benefit from knowledge checks, scenario walkthroughs, and one CEH Knowledge exam retake included in the course package.

The training is held in cooperation with our partner QA

Intended outcome

Learning objectives:

By the end of this course, learners will be able to:

  • Understand ethical hacking principles and information security frameworks
  • Perform reconnaissance and vulnerability assessments
  • Execute system, network, application, and mobile exploitation
  • Analyse malware and identify attack vectors such as Trojans, worms, and APTs
  • Conduct penetration testing across web servers, wireless networks, and cloud environments
  • Apply countermeasures to threats including DDoS, SQL injection, and social engineering
  • Evade firewalls, intrusion detection systems, and honeypots
  • Use cryptography and secure communications protocols effectively
  • Prepare for the CEH Knowledge and Practical Exams

The price includes:

  • virtual training;
  • course materials;
  • exams.

Continuing Education Curriculum Group: Database and Network Design and Administration

Book Event

Attend training
Available seats: Unlimited
The Attend training ticket is sold out. You can try another ticket or another date.
NORDIC TRAINING
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.