Pobierz kartę szkolenia

Certified Ethical Hacker CEH v.13 AI

kod szkolenia: CEHv13 Elite / ENG AA 5d

As per the latest ongoing trends in IT Industries and to meet the growing demand for new skills and knowledge about cybersecurity, EC-Council has developed the Certified Ethical Hacker training. An unconventional approach to thinking about the companies infrastructure from an intruders perspective is an extremely effective learning mechanism that opens the eyes to many often neglected areas of our work. Although it is an "entry-level" course, CEH contains a lot of material and practical exercises which also touches upon very technically advanced aspects of IT.

What’s new for version 13

  • AI-powered

The world’s first ethical hacking program to harness the power of AI.

  • Hands-on experience

Cybersecurity professionals can hone their skills in real-world scenarios through handson labs. Here, they’ll practice attack vectors and master advanced hacking tools.

  • 40% more efficient

Learn AI-driven techniques to boost 40% more efficiency in cyber defense while streamlining workflows.

  • Power-packed, updated curriculum

Master the latest advanced attack techniques, trends and countermeasures.

  • 2x productivity gains

Advanced threat detection, enhanced decision making, adaptive learning, enhanced reporting and automation of repetitive tasks.

  • Real-world skills, proven mastery

Participate in monthly global hacking competitions, compete with peers, and make it onto the leaderboard.

AI-powered framework

CEH’s exclusive learning framework, Learn | Certify | Engage | Compete, prepares learners for certification and provides in-depth, practical exercises that make it the most comprehensive cybersecurity program available.

W celu uzyskania informacji skontaktuj się z działem handlowym. W celu uzyskania informacji skontaktuj się z działem handlowym.
10 500,00 PLN 12 915,00 PLN brutto

Who CEH v13 is for:

  • Cybersecurity professionals

Those looking to drive their cybersecurity career forward with the power of AI.

  • Teams and organizations

Teams looking to turbocharge their AI knowledge in order to stay one step ahead of malicious actors.

  • Government and military

Government departments and defense bodies looking for a trusted and highly valued global certification partner.

The ethical hacker's goal is to identify the weaknesses of their organization and help find an effective method of defence against such attacks on corporate systems. Course participants make controlled intrusions into the "target" system and gain practical skills on how to effectively protect the network. While conventional security measures are essential, it is important to gain the perspective of the cybercriminals who could potentially compromise the systems.  During exercises, everyone will get acquainted with many tools used by security specialists.

Students will learn how to :

  • define and characterize the most important techniques of attacks used by hackers
  • carry out a reconnaissance about your own company or competition
  • scan, test and break system security
  • identify and analyse vulnerabilities in the organization
  • recognize and prevent authority escalation methods in systems
  • create better intrusion detection policies on IDS / IPS devices
  • recognize social engineering used by criminals
  • create viruses, hack mobile devices, smartphones
  • analyse malware
  • identify the potential of threats from the "Internet of Things" (IoT) and how to protect against them
  • identify challenges for industrial networks and the impact of cybersecurity on OT (Operational Technology) concepts
  • characterize the most important elements of container systems (Docker, Kubernetes)
  • verify the security of cloud solutions such as AWS
  • recognize subtle differences between backdoors, Trojans, and other threats
  • ultimately, they will be able to make company employees more aware of information security issues

CEH v13 will equip individuals and teams with:

  • In-depth knowledge of ethical hacking methodologies and practices, augmented with AI techniques
  • The skills to integrate AI across ethical hacking phases: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
  • AI techniques to automate tasks, boost efficiency, and detect sophisticated threats beyond traditional methods
  • Tools that will utilize AI for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks

Knowledge-Based Exam 312-50 (ECC Exam) can be taken at authorized EC-Council exam centers.

Title: Certified Ethical Hacker

Test Format: Multiple-choice questions

Number of Questions: 125

Duration: 4 hours

Note: When taking the CEH exam online with remote proctoring, there is an additional fee of $100 USD net. This cost covers hiring a proctor for the exam, and the purchase is made individually on the vendor's website: https://store.eccouncil.org/product/voucher-upgrade-rps-to-vue/

—————————————————————————————————————————–Additionally, when purchasing the Elite training package:

Practical Exam

Test Format: Scenario-based questions

Number of Questions: 20 scenarios

Duration: 6 hours.

Basic knowledge of Windows and Linux is required. Basic understanding of network essentials, core concepts including server and network components (basic knowledge of TCP/IP communication, services such as DNS/DHCP, the understanding concept of IP addressing). We recommend at least 2 years of experience in the IT industry. 

  • Training: English
  • Materials: English
  • 5 days with instructor training 
  • Trainer’s supervision

The table below lists the components that participants receive based on the version of the training they purchased.

Additional services require activation on the first day of training. The validity of the entire package is counted from the start date of the course, with the exception of laboratories, which have a validity period of 6 months.

  1. Introduction to Ethical Hacking
  2. Foot Printing and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial-of-Service
  11. Session Hijacking
  12. Evading IDS, Firewalls, and Honeypots
  13. Hacking Web Servers
  14. Hacking Web Applications
  15. SQL Injection
  16. Hacking Wireless Networks
  17. Hacking Mobile Platforms
  18. IoT Hacking
  19. Cloud Computing
  20. Session Hijacking