Skip to main content

Home Specialist skills Security Certified Ethical Hacker

Certified Ethical Hacker

  • bullet point
    Bypass security controls, evade detection mechanisms, and escalate privileges to gain deeper access into systems
  • bullet point
    Document findings, write comprehensive penetration testing reports, and communicate vulnerabilities effectively to stakeholders
  • bullet point
    Identify compliance gaps, and improve your organisation’s overall security effectiveness
  • bullet point
    Build tools, script exploits, and customize your approach to gain deeper access into networks
  • bullet point
    Use pivoting and double pivoting to access hidden network segments
  • bullet point
    Use attack automation using scripts and other tools
  • bullet point
    Uncover vulnerabilities in software using advanced binary exploitation techniques.

Overview

Off the shelf (OTS)

Learn to hack and achieve your CEH v13 Certification in just five days with the AI enabled EC-Council Certified Ethical Hacker v13 course. This comprehensive course takes you through the real-life ethical hacking process including tools and techniques that cybercriminals use to hack organisations and shows you how to protect your business from these attack vectors.

CEH v13 now comes with added AI capabilities, structured across 20 learning modules covering over 550 attack techniques. You'll learn the latest real-world, commercial-grade hacking tools, techniques, and methodologies that hackers and information security professionals use to lawfully hack companies. This will help you protect your business from a wide range of vulnerabilities in web applications and threats, including:
• Trojans, viruses, and worms
• SQL injection
• Direct-Denial-of-Service (DDoS) attacks

At the end of this course, you will take the official CEH exam and become certified.

Before attending this course, you should be familiar with Windows and Linux/Unix operating systems.

This course is ideal for:
• Cybersecurity, cloud security, and network security professionals
• Information security analysts, administrators, managers, and officers
• Information systems security engineers and managers
• Information assurance (IA) security officers
• Risk, threat, and vulnerability analysts
• Network administrators or engineers
• IT auditors

Delivery method
Face to face icon

Face to face

Virtual icon

Virtual

Course duration
Duration icon

35 hours

Competency level
Working icon

Working

Pink building representing strand 4 of the campus map
Delivery method
  • face to face icon

    Face to face

  • Virtual icon

    Virtual

Course duration
Duration icon

35 hours

Competency level
  • Working icon

    Working

chatbotSpark login