Certified Ethical Hacker (CEHv13) (Exam Included) update*

When

25/03/2025 - 28/03/2025    
9:30 am - 4:30 pm

Bookings

0.00
Book Now

Event Type

Certified Ethical Hacker (CEHv13) 
Powered by AI Capabilities
LEARN | CERTIFY | ENGAGE | COMPETE

What’s New in The CEH v13?

The C|EH v13 not only provides extensive hands-on coverage but also integrates AI into all fve phases of ethical hacking:

Master AI to Automate Ethical Hacking Tasks, to hack and defend against AI systems, and boost your task effciency by 40% in your job role.

Develop a Hacker’s Mindset: Master the 5 Phases of Ethical Hacking and Gain AI Skills to Automate Them
1. Reconnaissance
| Learn to gather essential information about your target
2. Vulnerability Scanning
| Gain the ability to identify weaknesses in the target system
3. Gaining Access
| Learn how to actively exploit identifed vulnerabilities
4. Maintaining Access
| Develop skills to maintain continued access to the target systems

Learn AI Tools:

• ShellGPT
• ChatGPT
• FraudGPT
• WormGPT
• DeepExploit
• Nebula
• Veed.io And many more!

The C|EH v13 is a specialized, one-of-a- kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.

This learning framework offers not only a comprehensive training program to prepare you for the certifcation exam but also the industry’s most robust, in-depth, hands- on lab and practice range experience.

Courseware Cyber Range
Gain Skills

Knowledge-Based Practical Exam
Gain Recognition

Live Cyber Range
Gain Experience

Global Ethical
Hacking Competition
Gain Respect

Beat Hackers in their Own Game with CEH v13! A Revolutionary
Way to Learn Ethical Hacking

1. Learn
– 20 modules
– 2500+ pages of student manual
– 2000 pages of lab manual
– Over 221 hands-on labs to practice attack vectors and hacking tools
– AI integrated skills in the 5 phases of the ethical hacking framework
– Hacking AI system, based on the Top 10 OWASP vulnerabilities
– Over 4000 hacking and security tools
– Learn how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android)
– More than 50% of training time is dedicated to labs
2. Certify
– Knowledge-Based Exam (ANAB ISO 17024 and US DoD 8140)
– 4 hours / 125 multiple-choice questions
– Practical Exam (ANAB ISO 17024 and US DoD 8140)
– 6 hours / 20 real scenario based questions

3. Engage
– 4000 hacking tools
– 550 attack techniques Conduct a real-world ethical hacking assignment

Apply the 5 phases

1. Reconnaissance
2. Scanning
3. Gaining access
4. Maintaining access
5. Covering your tracks

4. Compete

– New challenges every month
– 4-hour CTF competition
– Compete with your peers worldwide Hack your way to the top of the leaderboard Focus on new attack vectors

Exploit emerging vulnerabilities Challenges include:
– Ransomware
– Web app hardening
– Unpatched software
– System hacking
– Service exploitation
– Incident response
– Forensic analysis
– Web app hacking and pen testing
– Reverse engineering
– Cryptography
– Encryption
– Hacking cloud networks
– ICS/SCADA

Course Outline

20 Modules that help you master the foundations of Ethical Hacking and prepare to challenge the CEH certification exam.

Module 1: Introduction to Ethical Hacking
| Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Module 2: Foot Printing and Reconnaissance
| Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking
Module 3: Scanning Networks
|Learn different network scanning techniques and countermeasures.
Module 4: Enumeration
|Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures. 
Module 5: Vulnerability Analysis
| Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.
Module 6: System Hacking
| Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks
Module 7: Malware Threats
| Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fleless malware, malware analysis procedures, and malware countermeasures.
Module 8: Sniffing
| Learn about packet sniffng techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffng attacks.
Module 9: Social Engineering
| Learn social engineering concepts and techniques,
including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Module 10: Denial-of-Service
| Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Module 11: Session Highjacking
| Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Module 12: Evading IDS, Firewalls, and Honeypots
| Learn about frewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures. 
Module 13: Hacking Web Servers
| Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Module 14: Hacking Web Applications
| Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.
Module 15: SQL Injection
| Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Module 16: Hacking Wireless Networks
| Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Module 17: Hacking Mobile Platforms
| Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Module 18: IoT and OT Hacking
| Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures. 
Module 19: Cloud Computing
| Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools. 
Module 20: Cryptography
| Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools

Training Info

Duration : 5 Days
Language: Conduct in Thai
Time : 09.00-05.00 pm.
Training Date: Mar 25 – 28, 2025
Tel. 02 670 8980-3 ext. 304, 305, 303
Price: Please Call
Email. [email protected]


https://www.eccouncil.org/  

Bookings

Tickets

Registration Information

Booking Summary

1
x Standard Ticket
0.00
Total Price
0.00 Taxes included