- Information Security Overview
- Hacking Concepts
- Ethical Hacking Concepts
- Hacking Methodologies and Frameworks
- Information Security Controls
- Information Security Laws and Standards
Certified Ethical Hacker v13 AI Certification Training
Ace EC-Council’s Certified Ethical Hacker (CEH) certification exam with Infosec Train’s CEH v13 AI Certification ...Read more
Online
Quick Facts
particular | details | |||
---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Course overview
The CEH v13 AI Certification Training from EC-Council provides you with a deep understanding of core security essentials. It helps you get recognised as a certified penetration tester and ethical hacker with the most sought-after security skills globally. This globally valued security certification training validates your acumen in identifying vulnerabilities in an organisation’s network infrastructure and effectively combat cyber-attacks.
The CEH v13 AI Certification Training features 40 hours of instructor-led training and access to all recorded sessions if you miss one. Moreover, you can also choose between one-to-one personal training and online training methods. All the lectures are delivered by CEI certified trainers, ensuring maximum value for you.
By the end of the CEH v13 AI Certification Training programme by infosec train, you will be well-versed with an in-depth understanding of cutting-edge commercial hacking tools, methodologies, and practices used by real-world hackers. Also, Infosec Train is an EC-Council authorised partner and has a record of 98% passing rate.
The highlights
- 40 hours of instructor-led training
- 98% passing rate
- Access to recorded sessions
- EC-Council Authorised partner
- CEI certified instructors
- Online training
- One-to-one training
Program offerings
- 40 hours of instructor-led training
- 98% passing rate
- Access to recorded sessions
- Ec-council authorised partner
- Cei certified instructors
- Online training
- One-to-one training.
Course and certificate fees
certificate availability
Yes
certificate providing authority
EC-Council
Who it is for
The CEH v13 AI Certification Training course is ideal for:
- Ethical hackers
- Network Administrators
- System Administrators
- Engineers
- Auditors
- Web managers
- Security Professionals
Eligibility criteria
To get the most out of the CEH v13 AI Certification Training, it’s recommended to have a basic understanding of network essentials, specifically server and network components. Also, to sit for the CEH v11 exam, you are required to have at least two years of work experience in a security-related field.
What you will learn
By the end of the CEH v13 AI Certification training syllabus, you will be familiar with:
- Concepts of vulnerability assessment, its types, and its solutions
- Performing host and port discovery and network scans by utilising different scanning tools
- Attacking techniques to escalate, maintain, and obtain access on victim along with covering tracks
- Phases of system hacking
- Hijacking, SQL injection, and evasion techniques
- wireless hacking, Wireless encryption, and Bluetooth hacking-related concepts
- Threats and security, Cloud computing, and essentials of serverless computing and container technology
- Operational Technology (OT) essentials, attack methodologies, threats, and attack prevention.
- Public Key Infrastructure (PKI), Encryption algorithms, cryptographic attacks, and cryptanalysis
The syllabus
Module 1: Introduction to Ethical Hacking
Module 2: Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Internet Research Services
- Footprinting through Social Networking Sites
- Whois Footprinting
- DNS Footprinting
- Network and Email Footprinting
- Footprinting through Social Engineering
- Footprinting Tasks using Advanced Tools and AI
- Footprinting Countermeasures
Module 3: Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Host Discovery
- Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Source Port Manipulation
- Network Scanning Countermeasures
Module 4: Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
Module 5: Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Scoring Systems and Databases
- Vulnerability-Management Life Cycle
- Vulnerability Research
- Vulnerability Scanning and Analysis
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
Module 6: System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
Module 7: Malware Threats
- Malware Concepts
- APT Concepts
- Trojan Concepts
- Viruses and Worms
- Fileless Malware Concepts
- AI-based Malware Concepts
- Malware Countermeasures
- Anti-Malware Software
Module 8: Sniffing
- Sniffing Concepts
- Sniffing Technique
- Sniffing Tools
- Sniffing Countermeasures
Module 9: Social Engineering
- Social Engineering Concepts
- Human-based Social Engineering Techniques
- Computer-based Social Engineering Techniques
- Mobile-based Social Engineering Techniques
- Social Engineering Countermeasures
Module 10: Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Countermeasures
Module 11: Session Hijacking
- Session Hijacking Concepts
- Application-Level Session Hijacking
- Network-Level Session Hijacking
- Session Hijacking Tools
- Session Hijacking Countermeasures
Module 12: Evading IDS, Firewalls, and Honeypots
- Intrusion Detection/Prevention System (IDS/IPS) Concepts
- Firewall Concepts
- IDS, IPS, and Firewall Solutions
- Evading IDS/Firewalls
- Evading NAC and Endpoint Security
- IDS/Firewall Evading Tools
- Honeypot Concepts
- IDS/Firewall Evasion Countermeasures
Module 13: Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Countermeasures
- Patch Management
Module 14: Hacking Web Applications
- Web Application Concepts
- Web Application Threats
- Web Application Hacking Methodology
- Web API and Webhooks
- Web Application Security
Module 15: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- Evasion Techniques
- SQL Injection Countermeasures
Module 16: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Attack Countermeasures
Module 17: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines
- Mobile Security Tools
Module 18: IoT Hacking
- IoT Hacking
- IoT Concepts and Attacks
- IoT Hacking Methodology
- OT Hacking
Module 19: Cloud Computing
- Cloud Computing Concepts
- Container Technology
- Serverless Computing
- Cloud Hacking
- Cloud Hacking Methodology
- AWS Hacking
- Microsoft Azure Hacking
- Google Cloud Hacking
- Container Hacking
- Cloud Security
Module 20: Cryptography
- Cryptography Concepts and Encryption Algorithms
- Applications of Cryptography
- Cryptanalysis
- Cryptography Attack Countermeasures
Admission details
- Visit the official CEH v11 certification training online course page: https://www.infosectrain.com/courses/certified-ethical-hacker-ceh-training/
- Scroll down to the “Choose Your Preferred Learning Mode” section. Select a mode according to your preference and click on ‘Enroll Now’ or ‘Get Started’ option.
- A small form will pop up. Fill in the necessary details and click on submit now.
- A programme counselor from Infosec Train will get in touch with you shortly.
Filling the form
You have to fill a short signup form when applying to the CEH v13 AI Certification Training. While filling this short form, you have to fill in details such as your name, phone number, email ID, and country name. If you’re applying for corporate training, you also have to enter the name of your company and the number of employees working in your organisation.
Evaluation process
The EC-Council Certified Ethical Hacker (CEH) certification is a 4-hour, MCQ-based exam that houses 125 questions. You’ll have to solve different question banks that have varying difficulties. The cut-off scores usually range from 60% to 85%.
How it helps
By enrolling in the CEH v13 AI Certification Training, you get access to top-quality study material, which will help you ace the EC-Council Certified Ethical Hacker (CEH) certification exam effortlessly.
Moreover, by cracking the exam, you’ll get a certificate that will testify to your ethical hacking skills and help you take on better network security roles to improve your organisation’s defenses against cyberattacks. Furthermore, with this certification, you will also be able to land better, more lucrative jobs.
Instructors
FAQs
What is the validity of an approved application?
If approved, your application will be valid for three months from the date of approval.
Can I retake the EC-Council Certified Ethical Hacker (CEH) certification exam?
If you fail the exam, you can send the retake exam request to feedback@eccouncil.org.
What is the passing rate among students who complete this online CEH v11 Certification training?
98% of the students who complete the CEH v13 AI Certification Training have passed the EC-Council Certified Ethical Hacker (CEH) certification exam.
Infosec Train offers how many learning modes?
You can choose between three learning modes – online training, corporate training, and one-to-one learning.