Are you interested in being part of the wider roll out for Spark, our new AI-powered, learning chatbot? Register your interest here.
Home Specialist skills Security Certified Ethical Hacker
Certified Ethical Hacker
-
Bypass security controls, evade detection mechanisms, and escalate privileges to gain deeper access into systems
-
Document findings, write comprehensive penetration testing reports, and communicate vulnerabilities effectively to stakeholders
-
Identify compliance gaps, and improve your organisation’s overall security effectiveness
-
Build tools, script exploits, and customize your approach to gain deeper access into networks
-
Use pivoting and double pivoting to access hidden network segments
-
Use attack automation using scripts and other tools
-
Uncover vulnerabilities in software using advanced binary exploitation techniques.
Overview
Off the shelf (OTS)
Learn to hack and achieve your CEH v13 Certification in just five days with the AI enabled EC-Council Certified Ethical Hacker v13 course. This comprehensive course takes you through the real-life ethical hacking process including tools and techniques that cybercriminals use to hack organisations and shows you how to protect your business from these attack vectors.
CEH v13 now comes with added AI capabilities, structured across 20 learning modules covering over 550 attack techniques. You'll learn the latest real-world, commercial-grade hacking tools, techniques, and methodologies that hackers and information security professionals use to lawfully hack companies. This will help you protect your business from a wide range of vulnerabilities in web applications and threats, including:
• Trojans, viruses, and worms
• SQL injection
• Direct-Denial-of-Service (DDoS) attacks
At the end of this course, you will take the official CEH exam and become certified.
Before attending this course, you should be familiar with Windows and Linux/Unix operating systems.
This course is ideal for:
• Cybersecurity, cloud security, and network security professionals
• Information security analysts, administrators, managers, and officers
• Information systems security engineers and managers
• Information assurance (IA) security officers
• Risk, threat, and vulnerability analysts
• Network administrators or engineers
• IT auditors
Delivery method
Face to face
Virtual
Course duration
35 hours
Competency level
Working

Delivery method
-
Face to face
-
Virtual
Course duration
35 hours
Competency level
-
Working
