Certified Ethical Hacker (CEH)

ONLINE

Level: Intermediate

Advance your cybersecurity career in the AI era.

The Certified Ethical Hacker (CEH) v13 is a globally-recognized, comprehensive offensive security certification, now with added AI capabilities.

This program will fully prepare students to take EC-Council’s Certified Ethical Hacker (CEH) v13 exam. They will develop a hacker’s mindset to identify and address vulnerabilities before they can be exploited.

Prerequisites: HS Diploma, G.E.D or equivalent

Required materials: All required materials are included with tuition

  • The CEH exam consists of 125 multiple-choice questions over 4 hours. The passing score varies by exam form and typically ranges from 60% to 85%. CEH is ANSI/ISO/IEC 17024 accredited. Candidates may also take the optional CEH Practical exam to earn the CEH Master designation.

    • Mid-Level Information Security Auditor

    • Cybersecurity Auditor

    • Security Administrator

    • IT Security Administrator

    • Cyber Defense Analyst

    • Vulnerability Assessment Analyst

    • Warning Analyst

    • Information Security Analyst 1

    • Security Analyst L1

    • Infosec Security Administrator

    • Cybersecurity Analyst level 1, level 2, & level 3

    • Network Security Engineer

    • SOC Security Analyst

    • Security Analyst

    • Network Engineer

    • Senior Security Consultant

    • Information Security Manager

    • Senior SOC Analyst

    • Solution Architect

    • Cybersecurity Consultant

Delivery: Online

Format: Instructor-led

Duration: 6 weeks

  • One 4-hour live session per week

  • 40 hours of self-study

Tuition: $3,199

REGISTER
CLASS SCHEDULE

What’s Included?

  • Exam voucher - CEHv13 practical exam

  • Virtual labs

  • Practice exam

Instructor Support

  • Certified instructor

  • Weekly virtual classes

  • Direct access to instructor via email

Curriculum Breakdown

Topics Covered

  • Introduction to Ethical Hacking

  • Foot Printing and Reconnaissance

  • Scanning Networks

  • EnumeraCon

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT and OT Hacking

  • Cloud Computing

  • Cryptography