CEHv13 – Certified Ethical Hacker v13 (AI) CEH
This Course Includes
Videos & Lectures
Quizzes & Assessments
Mobile access
Certificate of Completion
Introduction
The Certified Ethical Hacker v13 (AI) course is your gateway to mastering ethical hacking. This course is powered by AI capabilities and covers 20 comprehensive modules. You’ll learn the fundamentals of information security, including footprinting, network scanning, system hacking, and malware analysis. Modules also include social engineering, Denial-of-Service (DoS) attacks, hacking web servers and applications, and cryptoanalysis. Practical applications involve real-world vulnerability assessments and network penetration testing. By the end of this course, you’ll gain hands-on experience in identifying and mitigating security threats, preparing you to become a skilled Certified Ethical Hacker.
Audience Profile
Certified Ethical Hacker v13 (CEH) offers advanced training in ethical hacking powered by AI capabilities, targeting IT professionals aiming to enhance their cybersecurity skills.
- Ethical Hackers
- Penetration Testers
- Network Security Specialists
- Information Security Analysts
- Cybersecurity Consultants
- IT Auditors
- Site Administrators
- System Administrators
- IT Managers
- Aspiring Cybersecurity Professionals
Outcomes
The Certified Ethical Hacker (CEH) v13 course equips students with the essential skills to identify, counter, and prevent cyber threats using the latest AI-powered techniques and tools. The training encompasses a wide array of security domains, from social engineering to cloud computing.
- Introduction to Ethical Hacking: Understand the fundamentals of ethical hacking, information security controls, relevant laws, and standard procedures.
- Footprinting and Reconnaissance: Learn techniques and tools for gathering information during the pre-attack phase.
- Scanning Networks: Master network scanning techniques and countermeasures.
- Enumeration: Discover various techniques including BGP and NFS exploits, and identify countermeasures.
- Vulnerability Analysis: Identify security loopholes and learn about different vulnerability assessment tools and types.
- System Hacking: Explore methodologies like steganography and steganalysis for identifying system and network vulnerabilities.
- Malware Threats: Understand different types of malware, procedures for malware analysis, and countermeasures.
- Social Engineering: Learn techniques for identifying theft attempts and auditing human-level vulnerabilities.
- **Denial-of-Service (DoS
Prerequisites
To ensure you have the best learning experience in our Certified Ethical Hacker v13 (AI) course, it’s recommended that you meet the following minimum prerequisites:
- Basic Networking Knowledge: Understanding of basic networking concepts and protocols such as TCP/IP, DNS, and OSI model.
- Fundamental Cybersecurity Concepts: Familiarity with basic cybersecurity principles and practices, including understanding of common threats and vulnerabilities.
- Experience with Operating Systems: Practical experience with different operating systems, particularly Windows and Linux, as you’ll need to navigate and perform tasks in these environments.
- Basic Knowledge of Programming: Some understanding of programming or scripting languages can be beneficial but is not mandatory.
- Prior IT Experience: Having 1-2 years of experience in IT, particularly in network support, systems administration, or security roles, will be advantageous.
While these prerequisites help, they are not strict requirements. Enthusiasm and a willingness to learn can also pave the way for your success in this course. If you are passionate about cybersecurity and ethical hacking, our comprehensive training will equip you with the skills and knowledge you need.
Module 1: Introduction to Ethical Hacking
- Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Module 2: Footprinting and Reconnaissance
- Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking
Module 3: Scanning Networks
- Learn different network scanning techniques and countermeasures.
Module 4: Enumeration
- Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Module 5: Vulnerability Analysis
- Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems.
- Different types of vulnerability assessment and vulnerability assessment tools are also included.
Module 6: System Hacking
- Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Module 7: Malware Threats
- Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Module 8: Sniffing
- Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Module 9: Social Engineering
- Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Module 10: Denial-of-Service
- Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Module 11: Session Hijacking
- Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Module 12: Evading IDS, Firewalls, and Honeypots
- Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Module 13: Hacking Web Servers
- Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Module 14: Hacking Web Applications
- Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.
Module 15: SQL Injection
- Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Module 16: Hacking Wireless Networks
- Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Module 17: Hacking Mobile Platforms
- Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Module 18: IoT and OT Hacking
- Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Module 19: Cloud Computing
- Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Module 20: Cryptography
- Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools

Requirements
- English Knowledge
- Understands Basics
Send us your question now
You can reach us through our contact form, by email, or by phone. We will get back to you within 1 business day.
Pro Trainers Hub empowers instructors with resources, support, and a platform to share knowledge.
Company Info
Courses
Contact Info
- No 15, Crestwood 1,Thalawatugoda 10116
- +94 77 276 6824
- info@protrainershub.com
© 2025 All Rights Reserved. | Reg : PV00328463