C|EH v13 Ai: Become a Certified Ethical Hacker

5-Days

20 - Lessons

Join our globally recognized EC-Council Certified Ethical Hacker program! Gain hands-on experience and tackle real-world challenges.

Course Overview:

This course is a globally recognized cybersecurity certification by the EC-Council, covering 20 modules on ethical hacking, AI-powered security, cloud security, malware analysis, and penetration testing. With 4000+ tools, 221 labs, and real-world CTF challenges, it provides hands-on experience in cyberattack simulations. The program includes a knowledge-based exam and a practical exam leading to CEH Master certification.

Available in self-paced, instructor-led, and hybrid formats.

Course Outline:

๐Ÿ”น Module 1: Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Hacking Methodologies and Frameworks
  • Information Security Controls
  • Information Security Laws and Standards

๐Ÿ”น Module 2: Footprinting and Reconnaissance

  • Footprinting Techniques (Search Engines, Social Networks, Whois, DNS, etc.)
  • Network and Email Footprinting
  • Social Engineering Footprinting
  • Advanced Footprinting Tools with AI
  • Footprinting Countermeasures

๐Ÿ”น Module 3: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery, Port & Service Discovery
  • OS Fingerprinting
  • Evading IDS/Firewall Scanning
  • Network Scanning Countermeasures

๐Ÿ”น Module 4: Enumeration

  • NetBIOS, SNMP, LDAP, NTP, SMTP, DNS Enumeration
  • Enumeration Countermeasures

๐Ÿ”น Module 5: Vulnerability Analysis

  • Concepts, Tools, and Reports
  • AI-Powered Vulnerability Assessment

๐Ÿ”น Module 6: System Hacking

  • Gaining Access (Password Cracking, Exploitation)
  • Privilege Escalation
  • Maintaining Access
  • Clearing Tracks

๐Ÿ”น Module 7: Malware Threats

  • Types of Malwares (Trojan, Virus, Worms, Fileless, APTs)
  • Malware Analysis
  • Malware Countermeasures

๐Ÿ”น Module 8: Sniffing

  • Sniffing Techniques (MAC Attacks, ARP Poisoning, DNS Poisoning)
  • Sniffing Tools (Wireshark, TCP Stream Analysis)
  • Countermeasures

๐Ÿ”น Module 9: Social Engineering

  • Human, Computer, and Mobile-based Social Engineering Techniques
  • Deepfake & Voice Cloning Attacks using AI
  • Phishing Countermeasures

๐Ÿ”น Module 10: Denial-of-Service (DoS/DDoS)

  • Attack Techniques and Botnets
  • DoS/DDoS Countermeasures

๐Ÿ”น Module 11: Session Hijacking

  • Application & Network-Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures

๐Ÿ”น Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS/IPS and Firewall Concepts
  • Evading Techniques
  • Honeypot Detection and Countermeasures

๐Ÿ”น Module 13: Hacking Web Servers

  • Web Server Attack Methodology
  • Countermeasures and Patch Management

๐Ÿ”น Module 14: Hacking Web Applications

  • Web Application Threats and Exploits
  • OWASP Top 10
  • Web API and Webhooks
  • Web Application Security

๐Ÿ”น Module 15: SQL Injection

  • SQL Injection Concepts and Methodology
  • Evasion Techniques
  • Countermeasures

๐Ÿ”น Module 16: Hacking Wireless Networks

  • Wireless Encryption and Threats
  • Hacking Methodologies and Tools
  • Security Countermeasures

๐Ÿ”น Module 17: Hacking Mobile Platforms

  • Android and iOS Hacking
  • Mobile Security Guidelines and Tools

๐Ÿ”น Module 18: IoT and OT Hacking

  • IoT & Operational Technology Hacking
  • Attack Methodologies and Countermeasures

๐Ÿ”น Module 19: Cloud Computing

  • Cloud Security Threats and Attacks
  • Hacking AWS, Azure, Google Cloud
  • Container & Serverless Computing Security

๐Ÿ”น Module 20: Cryptography

  • Encryption Algorithms
  • Cryptanalysis and Attacks
  • Cryptographic Security Measures

What Youโ€™ll Gain:

Upon completing the Certified Ethical Hacker v13 (CEHv13) course, students gain:

  • Globally Recognized CEH certification, with an option to earn the CEH Master title after passing the practical exam.
  • Hands-on Cybersecurity Skills using 4000+ hacking tools and AI-powered security techniques.
  • Advanced Ethical Hacking Knowledge on network security, penetration testing, malware analysis, and cloud security.
  • Practical Experience comprising of 221 labs, live cyberattack simulations, and Capture-the-Flag (CTF) challenges.
  • Pathway to advanced cybersecurity roles such as Red Teaming, SOC Analyst, Penetration Tester, and Incident Response roles.
  • Recognition on the Global Ethical Hacking Leaderboard through monthly cybersecurity competitions.

Who Should Enroll:

  • Cybersecurity Professionals โ€“ Penetration testers, SOC analysts, Red Team members, security engineers.
  • IT Professionals & Network Administrators โ€“ Those looking to upskill in ethical hacking and security.
  • Ethical Hackers & Bug Bounty Hunters โ€“ Individuals aiming to develop offensive security skills.
  • Government & Military Personnel โ€“ Those working in cyber defense, intelligence, and security operations.
  • Students & Security Enthusiasts โ€“ Aspiring cybersecurity professionals wanting hands-on hacking experience.

Course Details:

  • Date: 16 – 20 June 2025
  • Pricing: MUR 130,000
  • F&B: Lunch and Cofee Breaks Included

Get In Touch!

"*" indicates required fields

By proceeding, you confirm to our Data Protection Notice

Your information will be processed in line with our Data Protection Notice .

You may unsubscribe or change your preferences by contacting us. Please let us know if you would like us to communicate to you through our:

Marketing consent*
Weโ€™d love to send you the latest news and exclusive offers from Rogers Capital Technology and other brands within its group. Donโ€™t worry, if you change your mind, you can always update your choice. Please consult our Privacy Policy
This field is hidden when viewing the form
Untitled