CEH: Certified Ethical Hacker v13 - english - virtual



Kursarrangør: Glasspaper AS
Sted: Nettkurs / Nettstudie
Hele landet
Type:Nettkurs og nettstudie
Studie / yrkesutdanning
Undervisningstid: kl 09:00 - 18:00
Varighet: 5 days
Pris: 40.000
Neste kurs: 11.08.2025 | Vis alle kursdatoer

We provide virtual course about CEH: Certified Ethical Hacker v13 in english. The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.

Course description:
The CEH v13 is a specialized and one-of-a-kind training program to teach you everything you need to know about ethical hacking and provide you the knowledge and skills needed to drive your career forward in the age of AI. With CEH you'll learn how to think like a hacker and uncover any hidden vulnerabilities before hackers do. Stay on top of the game with the most in-demand skills required to succeed in the field of cybersecurity.

The CEH v13 will equip you to:
Find and fix weaknesses:
• Discover how hackers exploit systems and learn how to keep your data safe

Become a security expert:
• Master the top tools and techniques needed to strengthen your organization's security

Protect your reputation:
• Learn to proactively prevent data breaches and safeguard your customers' trust

Master ethical hacking with AI:
• Leverage AI-driven techniques to enhance your ethical hacking skills and stay ahead of cyber threats

The CEH v13 not only provides extensive hands-on coverage but also integrates AI into all five phases of ethical hacking:
• Reconnaissance - Learn to gather essential information about your target
• Vulnerability Scanning - Gain the ability to identify weaknesses in the target systems
• Gaining Access - Learn how to actively exploit identified vulnerabilities
• Maintaining Access - Develop skills to maintain continued access to the target systems
• Clearing Tracks - Master the the art of erasing any trace of your activities
• Learn AI tools such as: ShellGPT, ChatGPT, FraudGPT, WormGPT, DeepExploit, Nebula, Veed.io and many more

Course outline:
The CEH v13 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that spans five days, the 12th version of the CEH continues to evolve to keep up with the latest OS, exploits, tools, and techniques.

The concepts covered in the training program are split 50/50 between knowledge-based training and hands-on application through our cyber range. Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.

Modules:
Module 1 - Introduction to Ethical Hacking:
• Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Module 2 - Foot printing and Reconnaissance:
• Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking.

Module 3 - Scanning Networks:
• Learn different network scanning techniques and countermeasures

Module 4 - Enumeration:
• Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Module 5 - Vulnerability Analysis:
• Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.

Module 6 - System Hacking:
• Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Module 7 - Malware Threats:
• Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Module 8 - Sniffing:
• Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Module 9 - Social Engineering:
• Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Module 10 - Denial-of-Service:
• Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Module 11 - Session Hijacking:
• Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Module 12 - Evading IDS, Firewalls, and Honeypots:
• Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Module 13 - Hacking Web Servers:
• Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Module 14 - Hacking Web Applications:
• Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.

Module 15 - SQL Injection:
• Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures

Module 16 - Hacking Wireless Networks:
• Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Module 17 - Hacking Mobile Platforms:
• Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Module 18 - IoT and OT Hacking:
• Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Module 19 - Cloud Computing:
• Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Module 20 - Cryptography:
• Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

What is included in the course:
• 5 days of training
• 20 modules
• 2.500 + pages of student manual
• 2.000 + pages of lab manual
• Over 221 hands-on labs to practice attack vectors and hacking tools
• AI integrated skills in the 5 phases of the ethical hacking framework
• Hacking AI system, based on the Top 10 OWASP vulnerabilities
• Over 4.000 hacking and security tools
• Learn how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android)
• More than 50% of training time is dedicated to labs

Target audience:
• Information Security Analysts / Administrators
• Information Assurance (IA) Security Officers
• Information Security Managers / Specialists
• Information Systems Security Engineers / Managers
• Information Security Professionals / Officers
• Information Security / IT Auditors
• Risk / Threat / Vulnerability Analysts
• System Administrators
• Network Administrators and Engineers

Prerequisites:
• CEH is a great place to start your career in Cyber Security. There are no specific prerequisites for the CEH program. However, we strongly recommend that candidates possess a minimum of 2 years IT security experience before attempting the CEH.

Language:
• English course material, english speaking instructor

Course material:
Digital course documentation and hands-on labs

Certification:
• This course, leads directly towards the knowledge based exam: EC-Council Certified Ethical Hacker, exam 312-50
• Voucher for 1 exam and 1 retake is included in the course price. NOTE! The exam voucher can only be used for exam taken at Glasspaper`s test centre in Oslo or Bergen.
• You book date and time for your exam at Glasspaper`s test centres: www.glasspaper.no/bestill-test
• If you would like to take exam 312-50 online, you may upgrade your exam voucher to Remote Proctoring Exam (RPE) voucher for 75 EUR extra.
• The exam consists of 125 multiple choice questions. You have 4 hours to complete the exam.
• If you need another re-take, the exam must be ordered at www.pearsonvue.com, and the price is 1199 Euros.
• Read more about eligibility, passing score and other FAQ at cert.eccouncil.org/faq