Course Overview:
This course is a globally recognized cybersecurity certification by the EC-Council, covering 20 modules on ethical hacking, AI-powered security, cloud security, malware analysis, and penetration testing. With 4000+ tools, 221 labs, and real-world CTF challenges, it provides hands-on experience in cyberattack simulations. The program includes a knowledge-based exam and a practical exam leading to CEH Master certification.
Available in self-paced, instructor-led, and hybrid formats.
Course Outline:
๐น Module 1: Introduction to Ethical Hacking
- Information Security Overview
- Hacking Concepts
- Ethical Hacking Concepts
- Hacking Methodologies and Frameworks
- Information Security Controls
- Information Security Laws and Standards
๐น Module 2: Footprinting and Reconnaissance
- Footprinting Techniques (Search Engines, Social Networks, Whois, DNS, etc.)
- Network and Email Footprinting
- Social Engineering Footprinting
- Advanced Footprinting Tools with AI
- Footprinting Countermeasures
๐น Module 3: Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Host Discovery, Port & Service Discovery
- OS Fingerprinting
- Evading IDS/Firewall Scanning
- Network Scanning Countermeasures
๐น Module 4: Enumeration
- NetBIOS, SNMP, LDAP, NTP, SMTP, DNS Enumeration
- Enumeration Countermeasures
๐น Module 5: Vulnerability Analysis
- Concepts, Tools, and Reports
- AI-Powered Vulnerability Assessment
๐น Module 6: System Hacking
- Gaining Access (Password Cracking, Exploitation)
- Privilege Escalation
- Maintaining Access
- Clearing Tracks
๐น Module 7: Malware Threats
- Types of Malwares (Trojan, Virus, Worms, Fileless, APTs)
- Malware Analysis
- Malware Countermeasures
๐น Module 8: Sniffing
- Sniffing Techniques (MAC Attacks, ARP Poisoning, DNS Poisoning)
- Sniffing Tools (Wireshark, TCP Stream Analysis)
- Countermeasures
๐น Module 9: Social Engineering
- Human, Computer, and Mobile-based Social Engineering Techniques
- Deepfake & Voice Cloning Attacks using AI
- Phishing Countermeasures
๐น Module 10: Denial-of-Service (DoS/DDoS)
- Attack Techniques and Botnets
- DoS/DDoS Countermeasures
๐น Module 11: Session Hijacking
- Application & Network-Level Session Hijacking
- Session Hijacking Tools
- Countermeasures
๐น Module 12: Evading IDS, Firewalls, and Honeypots
- IDS/IPS and Firewall Concepts
- Evading Techniques
- Honeypot Detection and Countermeasures
๐น Module 13: Hacking Web Servers
- Web Server Attack Methodology
- Countermeasures and Patch Management
๐น Module 14: Hacking Web Applications
- Web Application Threats and Exploits
- OWASP Top 10
- Web API and Webhooks
- Web Application Security
๐น Module 15: SQL Injection
- SQL Injection Concepts and Methodology
- Evasion Techniques
- Countermeasures
๐น Module 16: Hacking Wireless Networks
- Wireless Encryption and Threats
- Hacking Methodologies and Tools
- Security Countermeasures
๐น Module 17: Hacking Mobile Platforms
- Android and iOS Hacking
- Mobile Security Guidelines and Tools
๐น Module 18: IoT and OT Hacking
- IoT & Operational Technology Hacking
- Attack Methodologies and Countermeasures
๐น Module 19: Cloud Computing
- Cloud Security Threats and Attacks
- Hacking AWS, Azure, Google Cloud
- Container & Serverless Computing Security
๐น Module 20: Cryptography
- Encryption Algorithms
- Cryptanalysis and Attacks
- Cryptographic Security Measures
What Youโll Gain:
Upon completing the Certified Ethical Hacker v13 (CEHv13) course, students gain:
- Globally Recognized CEH certification, with an option to earn the CEH Master title after passing the practical exam.
- Hands-on Cybersecurity Skills using 4000+ hacking tools and AI-powered security techniques.
- Advanced Ethical Hacking Knowledge on network security, penetration testing, malware analysis, and cloud security.
- Practical Experience comprising of 221 labs, live cyberattack simulations, and Capture-the-Flag (CTF) challenges.
- Pathway to advanced cybersecurity roles such as Red Teaming, SOC Analyst, Penetration Tester, and Incident Response roles.
- Recognition on the Global Ethical Hacking Leaderboard through monthly cybersecurity competitions.