EC-Council Certified Ethical Hacker v13 (CEH)
Cybersecurity, ICT Security
The CEH v13 training program includes 20 modules covering various technologies, tactics,and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 13th version of the CEH continues to evolve to keep up with the latest OS, exploits, tools, and techniques. The concepts covered in the training program are split 50/50 between knowledge-based training and hands-on application. Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through EC-Council lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge. The course also includes the globally recognized CEH certification exam, in which students demonstrate mastery of the ethical hacking techniques taught in the course.
This course is guaranteed by NH Prague Knowledge Centers, an EC-Council Accredited Training Center.
Course will help you:
Get a complete overview of hacking techniques
Learn the strategies, techniques and tools commonly used in real hacking and penetration testing
Learn how to test web servers and applications, SQL Injection or hacking mobile platforms
Get the CEH certification exam
Course is intended for:
Cybersecurity Auditor
IT Security Administrator
Vulnerability Assessment Analyst
Infosec Security Administrator
Senior Security Consultant
Senior SOC Analyst
Cybersecurity Consultant
Information Security Analyst or Manager
Network Security Engineer
Network Engineer
Certified Ethical Hacker (CEH) v13 PRO Bundle:
This PRO version course comes with the Certified Ethical Hacker (CEH) v13 PRO Bundle.
This special bundle includes:
eCourseware including the next version of eCourseware - 3000+ pages of student manual, 1900+ pages of lab materials, 20 refreshed modules.
Access to official CEH labs - Access to EC-Council labs for 6 months. Participant can complete the course and prepare for the exam if needed. In the basic version you do not have access to the labs.
Exam voucher - Voucher for CEH exam.
Exam Retakes - Did you fail the exam the first time? With the PRO version you have 3 attempts to pass the exam, but only one in the basic version of the course.
CEH Engage - More than 3500 hacking tools, 519 attack techniques and 220 hands-on exercises are available to you. You'll try hacking on real exercises, go through all 5 phases of ethical hacking and gain new experience.
Ethical Hacking Video Library - Educate yourself through videos too. The PRO version of the Ethical Hacking Video Library offers 5 video courses, while the basic version offers only 2 video courses.
Location, current course term
The course:
Hide detail
-
Introduction to Ethical Hacking
-
Information Security Overview
-
Cyber Kill Chain Concepts
-
Hacking Concepts
-
Ethical Hacking Concepts
-
Information Security Controls
-
Information Security Laws and Standards
-
Foot-printing and Reconnaissance
-
Footprinting Concepts
-
Footprinting through Search Engines
-
Footprinting through Web Services
-
Footprinting through Social Networking Sites
-
Website Footprinting
-
Email Footprinting
-
Who is Footprinting
-
DNS Footprinting
-
Network Footprinting
-
Footprinting through Social Engineering
-
Footprinting Tools
-
Footprinting Countermeasures
-
Scanning Networks
-
Network Scanning Concepts
-
Scanning Tools
-
Host Discovery
-
Port and Service Discovery
-
OS Discovery (Banner Grabbing/OS Fingerprinting)
-
Scanning Beyond IDS and Firewall
-
Draw Network Diagrams
-
Enumeration
-
Enumeration Concepts
-
NetBIOS Enumeration
-
SNMP Enumeration
-
LDAP Enumeration
-
NTP and NFS Enumeration
-
SMTP and DNS Enumeration
-
Other Enumeration Techniques
-
Enumeration Countermeasures
-
Vulnerability Analysis
-
Vulnerability Assessment Concepts
-
Vulnerability Classification and Assessment Types
-
Vulnerability Assessment Solutions and Tools
-
Vulnerability Assessment Reports
-
System Hacking
-
System Hacking Concepts
-
Gaining Access
-
Escalating Privileges
-
Maintaining Access
-
Clearing Logs
-
Malware Threats
-
Malware Concepts
-
APT Concepts
-
Trojan Concepts
-
Virus and Worm Concepts
-
Fileless Malware Concepts
-
Malware Analysis
-
Countermeasures
-
Anti-Malware Software
-
Sniffing
-
Sniffing Concepts
-
Sniffing Technique: MAC Attacks
-
Sniffing Technique: DHCP Attacks
-
Sniffing Technique: ARP Poisoning
-
Sniffing Technique: Spoofing Attacks
-
Sniffing Technique: DNS Poisoning
-
Sniffing Tools
-
Countermeasures
-
Sniffing Detection Techniques
-
Social Engineering
-
Social Engineering Concepts
-
Social Engineering Techniques
-
Insider Threats
-
Impersonation on Social Networking Sites
-
Identity Theft
-
Countermeasures
-
Denial-of-Service
-
DoS/DDoS Concepts
-
DoS/DDoS Attack Techniques
-
BotnetsDDoS Case Study
-
DoS/DDoS Attack Tools
-
Countermeasures
-
DoS/DDoS Protection Tools
-
Session Hijacking
-
Session Hijacking Concepts
-
Application Level Session Hijacking
-
Network Level Session Hijacking
-
Session Hijacking Tools
-
Countermeasures
-
Evading IDS, Firewalls, and Honeypots
-
IDS, IPS, Firewall, and Honeypot Concepts
-
IDS, IPS, Firewall, and Honeypot Solutions
-
Evading IDS
-
Evading Firewalls
-
IDS/Firewall Evading Tools
-
Detecting Honeypots
-
IDS/Firewall Evasion Countermeasures
-
Hacking Web Servers
-
Web Server Concepts
-
Web Server Attacks
-
Web Server Attack Methodology
-
Web Server Attack Tools
-
Countermeasures
-
Patch Management
-
Web Server Security Tools
-
Hacking Web Applications
-
Web Application Concepts
-
Web Application Threats
-
Web Application Hacking Methodology
-
Web API, Webhooks, and Web Shell
-
Web Application Security
-
SQL Injection
-
SQL Injection Concepts
-
Types of SQL Injection
-
SQL Injection Methodology
-
SQL Injection Tools
-
Evasion Techniques
-
Countermeasures
-
Hacking Wireless Networks
-
Wireless Concepts
-
Wireless Encryption
-
Wireless Threats
-
Wireless Hacking Methodology
-
Wireless Hacking Tools
-
Bluetooth Hacking
-
Countermeasures
-
Wireless Security Tools
-
Hacking Mobile Platforms
-
Mobile Platform Attack Vectors
-
Hacking Android OS
-
Hacking iOS
-
Mobile Device Management
-
Mobile Security Guidelines and Tools
-
IoT and OT Hacking
-
IoT Hacking
-
IoT Concepts
-
IoT Attacks
-
IoT Hacking Methodology
-
IoT Hacking Tools
-
Countermeasures
-
OT Hacking
-
OT Concepts
-
OT Attacks
-
OT Hacking Methodology
-
OT Hacking Tools
-
Countermeasures
-
Cloud Computing
-
Cloud Computing Concepts
-
Container Technology
-
Serverless Computing
-
Cloud Computing Threats
-
Cloud Hacking
-
Cloud Security
-
Cryptography
-
Cryptography Concepts
-
Encryption Algorithms
-
Cryptography Tools
-
Public Key Infrastructure (PKI)
-
Email Encryption
-
Disk Encryption
-
Cryptanalysis
-
Countermeasures
-
Recommended previous course:
-
CompTIA Security+ (ComSec)
-
Schedule:
-
5 days (9:00 AM - 5:00 PM )
-
Course price:
-
2 596.00 € (3 141.16 € incl. 21% VAT)
-
Education Partner:
-
NH Prague Knowledge Centers
-
Language:
-
What is new in CEH v13?
Features:
New Learning Methodology: Learn – Certify – Engage – Compete
Compete: new challenges every month to test your job-ready skills!
100% Compliance to NICE 2.0 Framework
Based on a comprehensive industry-wide job-task analysis
Hands-on learning labs
Practice Range
Global CEH community competition
Cheat Sheet
Coverage of the latest malware
Lab-intensive program (Every learning objective is demonstrated using labs)
Hands-on program (50%+ of training time is dedicated to labs)
Lab environment simulates a real-time environment
Covers the latest hacking tools (Based on Windows, macOS, and Linux)
Latest OS covered and a patched testing environment
All the tool screenshots are replaced with the latest version
All the tool listing slides are updated with the latest toolsv
All the countermeasure slides are updated
Technology Updates:
MITRE ATTACK Framework
Diamond Model of Intrusion Analysis
Techniques for Establishing Persistence
Evading NAC and Endpoint Security
Fog Computing
Edge Computing
Grid Computing
Updated OS:
Windows 11
Windows Server 2022
Windows Server 2019
Parrot Security
Android
Ubuntu Linux