C|EH v13 Ai: Become a Certified Ethical Hacker

5-Days

20 - Lessons

Join our globally recognized EC-Council Certified Ethical Hacker program! Gain hands-on experience and tackle real-world challenges.

Course Overview:

This course is a globally recognized cybersecurity certification by the EC-Council, covering 20 modules on ethical hacking, AI-powered security, cloud security, malware analysis, and penetration testing. With 4000+ tools, 221 labs, and real-world CTF challenges, it provides hands-on experience in cyberattack simulations. The program includes a knowledge-based exam and a practical exam leading to CEH Master certification.

Available in self-paced, instructor-led, and hybrid formats.

Course Outline:

🔹 Module 1: Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Hacking Methodologies and Frameworks
  • Information Security Controls
  • Information Security Laws and Standards

🔹 Module 2: Footprinting and Reconnaissance

  • Footprinting Techniques (Search Engines, Social Networks, Whois, DNS, etc.)
  • Network and Email Footprinting
  • Social Engineering Footprinting
  • Advanced Footprinting Tools with AI
  • Footprinting Countermeasures

🔹 Module 3: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery, Port & Service Discovery
  • OS Fingerprinting
  • Evading IDS/Firewall Scanning
  • Network Scanning Countermeasures

🔹 Module 4: Enumeration

  • NetBIOS, SNMP, LDAP, NTP, SMTP, DNS Enumeration
  • Enumeration Countermeasures

🔹 Module 5: Vulnerability Analysis

  • Concepts, Tools, and Reports
  • AI-Powered Vulnerability Assessment

🔹 Module 6: System Hacking

  • Gaining Access (Password Cracking, Exploitation)
  • Privilege Escalation
  • Maintaining Access
  • Clearing Tracks

🔹 Module 7: Malware Threats

  • Types of Malwares (Trojan, Virus, Worms, Fileless, APTs)
  • Malware Analysis
  • Malware Countermeasures

🔹 Module 8: Sniffing

  • Sniffing Techniques (MAC Attacks, ARP Poisoning, DNS Poisoning)
  • Sniffing Tools (Wireshark, TCP Stream Analysis)
  • Countermeasures

🔹 Module 9: Social Engineering

  • Human, Computer, and Mobile-based Social Engineering Techniques
  • Deepfake & Voice Cloning Attacks using AI
  • Phishing Countermeasures

🔹 Module 10: Denial-of-Service (DoS/DDoS)

  • Attack Techniques and Botnets
  • DoS/DDoS Countermeasures

🔹 Module 11: Session Hijacking

  • Application & Network-Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures

🔹 Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS/IPS and Firewall Concepts
  • Evading Techniques
  • Honeypot Detection and Countermeasures

🔹 Module 13: Hacking Web Servers

  • Web Server Attack Methodology
  • Countermeasures and Patch Management

🔹 Module 14: Hacking Web Applications

  • Web Application Threats and Exploits
  • OWASP Top 10
  • Web API and Webhooks
  • Web Application Security

🔹 Module 15: SQL Injection

  • SQL Injection Concepts and Methodology
  • Evasion Techniques
  • Countermeasures

🔹 Module 16: Hacking Wireless Networks

  • Wireless Encryption and Threats
  • Hacking Methodologies and Tools
  • Security Countermeasures

🔹 Module 17: Hacking Mobile Platforms

  • Android and iOS Hacking
  • Mobile Security Guidelines and Tools

🔹 Module 18: IoT and OT Hacking

  • IoT & Operational Technology Hacking
  • Attack Methodologies and Countermeasures

🔹 Module 19: Cloud Computing

  • Cloud Security Threats and Attacks
  • Hacking AWS, Azure, Google Cloud
  • Container & Serverless Computing Security

🔹 Module 20: Cryptography

  • Encryption Algorithms
  • Cryptanalysis and Attacks
  • Cryptographic Security Measures

What You’ll Gain:

Upon completing the Certified Ethical Hacker v13 (CEHv13) course, students gain:

  • Globally Recognized CEH certification, with an option to earn the CEH Master title after passing the practical exam.
  • Hands-on Cybersecurity Skills using 4000+ hacking tools and AI-powered security techniques.
  • Advanced Ethical Hacking Knowledge on network security, penetration testing, malware analysis, and cloud security.
  • Practical Experience comprising of 221 labs, live cyberattack simulations, and Capture-the-Flag (CTF) challenges.
  • Pathway to advanced cybersecurity roles such as Red Teaming, SOC Analyst, Penetration Tester, and Incident Response roles.
  • Recognition on the Global Ethical Hacking Leaderboard through monthly cybersecurity competitions.

Who Should Enroll:

  • Cybersecurity Professionals – Penetration testers, SOC analysts, Red Team members, security engineers.
  • IT Professionals & Network Administrators – Those looking to upskill in ethical hacking and security.
  • Ethical Hackers & Bug Bounty Hunters – Individuals aiming to develop offensive security skills.
  • Government & Military Personnel – Those working in cyber defense, intelligence, and security operations.
  • Students & Security Enthusiasts – Aspiring cybersecurity professionals wanting hands-on hacking experience.

Course Details:

  • Date: 16 – 20 June 2025
  • Pricing: MUR 130,000
  • F&B: Lunch and Cofee Breaks Included

Get In Touch!

"*" indicates required fields

By proceeding, you confirm to our Data Protection Notice

Your information will be processed in line with our Data Protection Notice .

You may unsubscribe or change your preferences by contacting us. Please let us know if you would like us to communicate to you through our:

Marketing consent*
We’d love to send you the latest news and exclusive offers from Rogers Capital Technology and other brands within its group. Don’t worry, if you change your mind, you can always update your choice. Please consult our Privacy Policy
This field is hidden when viewing the form
Untitled