Certified Ethical Hacker Powered by AI – Self-Paced (Incl. Exam Voucher)
Type
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R21 400,00
Price excluding VAT
Introduction
The Certified Ethical Hacker v13 program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. Ranked in the list of Top 10 Cybersecurity Certifications Globally. The CEH v13 not only provides extensive hands-on coverage but also integrates AI into all five phases of ethical hacking:
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Clearing Tasks
The Certified Ethical Hacker provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through a 4-Phase AI-Powered learning framework:
- Learn (where you gain skills)
- Certify (where you gain recognition)
- Engage (where you would gain experience)
- Compete (where you gain respect)
To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. As we put it, “To beat a hacker, you need to think like a hacker.” This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organisation must not be limited to the silos of a certain vendor, technologies, or pieces of equipment.
Here, you will be exposed to an entirely unique way of achieving optimal information security posture in their organisation; by hacking it! You will scan, test, hack and secure your own systems. CEH isn’t just keeping pace—it’s leading the charge, evolving with the latest operating systems, exploits, tools, and hacking techniques to ensure you’re always ahead of the curve. Dive deep into the future of cybersecurity with training that integrates AI into all five phases of ethical hacking, reconnaissance and scanning to gaining access, maintaining access, and covering tracks. You’ll harness the power of AI to supercharge your hacking techniques and disrupt AI systems—giving you 10x efficiency in your cybersecurity role.
Audience profile
This course would significantly benefit:
- System Administrators
- Network Administrators
- Engineers
- Web managers
- Security officers
- Auditors
- Security Professionals
- Site Administrators
- Anyone concerned about the integrity of their network infrastructure
Pre-requisites
The knowledge and skills that a learner must have before attending this course is as follows:
- Have successfully completed EC-Council’s Certified Cybersecurity Technician (CCT) OR
- Certified Network Defender (CND) course OR
- Have successfully completed a CompTIA’s Security+ course
There is a minimum age requirement that applies and attendance of the Ethical Hacking and Countermeasures training course or attempts at the relevant exam, is restricted to candidates who are at least 18 years old.
What is EC-Council iLearn?
iLearn is EC Council’s online, self-paced option which means that all of the same modules taught in the live course are recorded and presented in a streaming video format. A certification candidate can set their own learning pace by pausing the lectures and returning to their studies as their schedule permits! This all-inclusive training program provides the benefits of classroom training at your own pace.
What is included?
- Streaming video training modules – 1 year access
- Official EC-Council E-Courseware – 1 year access
- iLabs, Virtual Lab Platform – 6 months access
- One Certification exam voucher
- One Certificate of Attendance
How to Access the iLearn Portal?
All learning resources will be released directly to the delegate and a notification will be shared via email after your booking is complete.
You may then login anytime https://iclass.eccouncil.org/my-courses/
Course objectives
Upon completing this course, the learner will be able to:
- You’ll learn to leverage AI for automating threat detection, predicting security breaches, and responding swiftly to cyber incidents
- Gain the skills needed to secure AI-driven technologies against potential threats
- Key issues plaguing the information security world, incident management process, and penetration testing
- Hack AI Systems Based on OWASP’s Top 10 AI Attack Vulnerabilities and Threats
- Learn how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android)
- Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures
- Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures
- Learn different network scanning techniques and countermeasures
- Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures
- Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included
- Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks
- Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures
- Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks
- Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures
- Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections
- Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures
- Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures
- Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures
- Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures
- Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures
- Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks
- Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools
- Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures
- Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools
- Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools
Course content
Module 01: Introduction to Ethical Hacking |
Module 02: Footprinting and Reconnaissance |
Module 03: Scanning Networks |
Module 04: Enumeration |
Module 05: Vulnerability Analysis |
Module 06: System Hacking |
Module 07: Malware Threats |
Module 08: Sniffing |
Module 09: Social Engineering |
Module 10: Denial-of-Service |
Module 11: Session Hijacking |
Module 12: Evading IDS, Firewalls, and Honeypots |
Module 13: Hacking Web Servers |
Module 14: Hacking Web Applications |
Module 15: SQL Injections |
Module 16: Hacking Wireless Networks |
Module 17: Hacking Mobile Platforms |
Module 18: IoT Hacking |
Module 19: Cloud Computing |
Module 20: Cryptography |
Associated certifications and exam
Exam Details | CEHv13 (ANSI)/ (MCQ Exam) | CEHv13 (Practical) |
Exam Title | Certified Ethical Hacker (ANSI) | Certified Ethical Hacker (Practical) |
Number of Questions/Practical Challenges | 125 | 20 |
Test Duration | 4 Hours | 6 Hours |
Test Format | Multiple Choice Questions | iLabs Cyber Range |
Test Delivery | ECC EXAM, VUE | ASPEN iLabs |
Availability | ECC EXAM, VUE | ASPEN iLabs |
Exam Prefix | 312-50(ECC EXAM)
312-50(VUE) |
– |
Passing Score | 60%-85%
Please refer to http://cert.eccouncil.org/faq.html |
60%-85%
|
On successful completion of this course students will receive a Torque IT attendance certificate.
Note:
When you attend any authorised EC Council training course at Torque IT you will receive the associated examination voucher as part of your course material. Your certification examination voucher can be used to book and pay for your certification examination with an authorised Pearson VUE Test center. All EC-Council exams will have to be taken via (Remote Procuring Services).
EC-Council Overview
To beat a hacker, you need to think like one…
Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.
Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.
These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.