Certified Ethical Hacker (CEH) Training v13
| Commitment | 5 Days, 7-8 hours a day. |
| Language | English |
| User Ratings | Average User Rating 4.8 See what learners said |
| Price | REQUEST |
| Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
Prepare for the CEH certification and learn to think like a hacker while looking for system weaknesses and vulnerabilities.
Are you ready to earn your EC-Council Certified Ethical Hacker (CEH v13) certification, now powered by AI? This five-day intensive training boot camp provides in-depth training by integrating AI into all five phases of ethical hacking – from reconnaissance and scanning to gaining access, maintaining access, and covering tracks. Our comprehensive approach to AI in cybersecurity offers current and prospective professionals hands-on learning experiences. Get the knowledge you need to obtain certification and start making a significant impact in your career now.
This Certified Ethical Hacker (CEH) v12 course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.
WHAT'S INCLUDED?
- 5 days of Certified Ethical Hacker Training (CEH) v13 with an expert instructor
- Certified Ethical Hacker Training (CEH) v13 Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- Certified Ethical Hacker Training (CEH) – https://www.wiley.com/
- Certified Ethical Hacker Training (CEH) – https://www.packtpub.com/
- Certified Ethical Hacker Training (CEH) – https://store.logicaloperations.com/
- Certified Ethical Hacker Training (CEH) – https://us.artechhouse.com/
- Certified Ethical Hacker Training (CEH) v13 – https://www.amazon.com/
RELATED COURSES
- GIAC Certified Incident Handler (GCIH) Training
- GIAC Certified Intrusion Analyst (GCIA) Training
- GIAC Security Essentials Certification (GSEC) Training
- Computer Forensics Training
- Certified Powershell Hacker (CPSH) Training
- Cybersecurity Foundations Training
- Cyber Threats Detection and Mitigation Training
- Cyber Threats Hunting (CCTHP) Training
- Cyber Threat Intelligence Analysis Training
- Cybersecurity Investigations and Network Forensics Analysis
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Upon completing this Certified Ethical Hacker (CEH) Training v13 course, learners will be able to meet these objectives:
- Ethical hacking fundamentals, cyber kill chain concepts, an overview of information security and security measures with AI-enhanced threat detection and response.
- Concepts, methodologies, and tools of footprinting using AI for automated information gathering and reconnaissance.
- Concepts of vulnerability assessment, its categories and strategies, and AI-driven exposure to technologies used in the industry.
- Social engineering concepts and terminologies, including identity theft, impersonation, insider threats, social engineering techniques, and AI-based countermeasures.
- Operational Technology (OT) essentials, threats, attack methodologies, and AI-powered attack prevention.
- Recognizing vulnerabilities in IoT and ensuring the safety of IoT devices using AI-based security solutions.
- Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, cryptanalysis, and enhanced cryptographic defense.
- Cloud computing, threats and security, AI-driven container technology, and serverless computing security measures.
CUSTOMIZE IT
- We can adapt this Certified Ethical Hacker (CEH) Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Certified Ethical Hacker (CEH) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Certified Ethical Hacker (CEH) around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Ethical Hacker (CEH) course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Certified Ethical Hacker (CEH) course:
- Security Analysts
- Ethical Hackers
- System Administrators
- Network Administrators
- Network and Security Engineers
- Cyber Security Managers
- Information Security Auditors
- Security Professionals
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Certified Ethical Hacker (CEH) v13 are:
- Firm understanding of the Windows Operating System
- Exposure to the Linux Operating System or other Unix-based operating system
- Grasp of the TCP/IP protocols
- CompTIA Security+ Certification
COURSE SYLLABUS
Certified Ethical Hacker (CEH) Training v13
Day 1
The first half of day one focuses on learning the job duties required of a penetration tester. You will learn the ins and outs of the various penetration testing methodologies required in order for an ethical hack to be used in a business or government setting. You will also delve deep into technical material, learning how to perform network reconnaissance against modern infrastructure. Lectures include:
» Security testing methodologies
» The ethical hacking profession
» Planning and scoping an engagement
» Legal and compliance considerations
» Ethical hacking methodologies
» Tools of the trade
» Linux overview
» Passive intelligence gathering
» Abusing DNS and SNMP
» Security testing methodologies
LABS
» Linux fundamentals
» Passive intelligence gathering
» Understanding the Domain Naming System
» Enumerating DNS entries to develop a focused attack strategy
» Attacking the Domain Naming System
» Discovering SNMP vulnerabilities and flaws
» Enumerating SNMP information
» Brute forcing SNMP community strings
» Capture the Flag exercises
Day 2
Having learned how to gather information about several targets, we begin day two with narrowing our attack by finding potentially vulnerable systems/services. You will master the art of network scanning and service identification and gain a deeper understanding of how systems communicate using the TCP and UDP protocols. Lectures include:
» Understanding TCP packets and structures
» Passive network discovery and scanning
» TCP scanning
» Using differences in RFC implementations to your advantage
» Scanning through firewalls
» How to prevent the discovery of your reconnaissance activities
» Using zombies to mask network scanning
» Avoiding IDS/IPS detection
» Proper identification of services
» Vulnerability identification
LABS
» Packet analysis
» Obtaining authentication credentials via packet capture
» Network scanning
» Target scanning of potentially vulnerable targets
» Remaining undetected while performing a network scan
» Enumerating services and identifying vulnerabilities
» Capture the Flag exercises
Day 3
After gathering information about your target system, you will put all that hard work to use when you learn how to exploit those vulnerabilities. You will learn the skills to demonstrate a successful exploit of a vulnerability as well as how to gather additional credentials to exploit vulnerabilities in other systems. You will also learn useful social engineering techniques, including phishing, and methods of attacking physical security.
» Vulnerability life cycles
» Types of vulnerabilities
» Flaws in encryption
» Configuration errors
» Buffer overflows
» Stack overflows
» Vulnerability mapping
» Exploit utilization and delivery methods
» Client side exploits
» Server side exploits
» Password security
» Social engineering techniques
» Attacking physical controls
» Hashing
» Rainbow tables
» Attacking Windows password security
» Weaknesses in Windows authentication protocols
LABS:
» Gaining unauthorized access to systems
» Use of various payloads to increase privileges
» Keystroke logging
» DLL injection attack
» Exploit server-side applications
» Gather password hashes
» Exploit weaknesses in authentication protocols
» Capture the Flag exercises
Day 4
After compromising a target, you will extend your access to all vulnerable systems at your target organization and learn how to covertly exfiltrate data. The second half of day four covers attacking web-based applications and understanding SQL injection.
»Use of Trojans
» Redirecting ports to thwart firewall rules
» Avoiding anti-virus detection
» Lateral movement and persistence
» Use of keyloggers
» IDS operations and avoidance
» Encrypting your communications
» Protocol abuse for covert communications
» Creating custom encryption tunneling applications
» E-shoplifting
» XSS attacks
» Cross site forgery
» Circumventing authentication
» SQL injection discovery and exploitation
» SQL data extraction
LABS
» Use of Trojans
» IDS usage and avoidance
» Data transmission encryption techniques
» Creating a custom covert channel
» Web application parameter tampering
» Cross site scripting attacks
» SQL injection
» Chaining exploits
» Exploiting extended stored procedures
» Capture the Flag exercises
Day 5
Day five is dedicated toward wireless security, using basic scripts for ethical hacking, covering your tracks and post-engagement activities. You will master the ability to sniff data, clean up all traces of your activities and learn best practices for writing reports and recommending mitigation strategies.
» Sniffing in different environments
» Attack sniffers
» Man-in-the-middle attacks
» Wireless networking
» Shared key authentication weaknesses
» WEP/WPA/WPA2 cracking
» Anti-forensics
» Log modification/deletion
» Rootkits
» Introduction to scripting
» Common script components





