Certified Ethical Hacker
Certified Ethical Hackers, trained in the latest version of CEH v13, are equipped with AI-powered tools and techniques to identify, exploit, and secure vulnerabilities in systems and networks. You’ll learn to leverage AI for automating threat detection, predicting security breaches, and responding swiftly to cyber incidents.



Ideal For
There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.
There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.
There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.
What to Expect
SKILL LEVEL
Beginner
DURATION
5 days (Live Training) + Practice Lab + Examination
CERTIFICATION
After Completion
LANGUAGE
English
Skills You Will Learn
Introduction to Ethical Hacking
Foot Printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Introduction to Ethical Hacking
Foot Printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Introduction to Ethical Hacking
Foot Printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Session Hijacking
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Session Hijacking
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Session Hijacking
Module
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Course Outcome
New challenges every month
4-hour capture-the-flag (CTF)
Compete with your peers all over the world
Hack your way to the top of the leaderboard
Conduct a real-world ethical hacking assignment
100% virtualization for a complete learning experience
Over 3,500 hacking tools
519 attack techniques covered
Apply the 5 phases of ethical hacking
• Reconnaissance
• Scanning
• Gaining access
• Maintaining access
• Covering your tracks
New challenges every month
4-hour capture-the-flag (CTF)
Compete with your peers all over the world
Hack your way to the top of the leaderboard
Conduct a real-world ethical hacking assignment
100% virtualization for a complete learning experience
Over 3,500 hacking tools
519 attack techniques covered
Apply the 5 phases of ethical hacking
• Reconnaissance
• Scanning
• Gaining access
• Maintaining access
• Covering your tracks
New challenges every month
4-hour capture-the-flag (CTF)
Compete with your peers all over the world
Hack your way to the top of the leaderboard
Conduct a real-world ethical hacking assignment
100% virtualization for a complete learning experience
Over 3,500 hacking tools
519 attack techniques covered
Apply the 5 phases of ethical hacking
• Reconnaissance
• Scanning
• Gaining access
• Maintaining access
• Covering your tracks
Course Intake
4 March 2025 → 20 May 2025
2 days | Tuesday and Thursday | 8PM → 10PM
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Module
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2