Traincrest-logo
Traincrest-logo

Certified Ethical Hacker v13 (AI) Course Overview

The Certified Ethical Hacker v13 (AI) course by EC-Council equips cybersecurity professionals with essential skills to identify and address vulnerabilities in systems. This course is crucial for penetration testers, security analysts, and IT professionals seeking to enhance their expertise in ethical hacking practices, safeguarding organizations against cyber threats through advanced techniques and AI integration.


Course Introduction

Price:

USD 3,575

Duration:

40 Hrs.

  • Introduction to Ethical Hacking
    • Overview of Ethical Hacking
    • Types of Hackers
    • Legal and Ethical Issues
  • Footprinting and Reconnaissance
    • Information Gathering Techniques
    • Tools for Footprinting
    • DNS Interrogation and WHOIS
  • Scanning Networks
    • Network Scanning Techniques
    • Enumeration
    • Vulnerability Scanning
  • Gaining Access
    • System Hacking Phases
    • Password Cracking Techniques
    • Escalating Privileges
  • Maintaining Access
    • Backdoors and Rootkits
    • Trojans and Malware
    • Methods for Concealment
  • Covering Tracks
    • Log File Management
    • Anti-Forensics Techniques
    • Data Hiding Techniques
  • Enumeration
    • Enumeration Techniques and Tools
    • SNMP Enumeration
    • LDAP Enumeration
  • Vulnerability Analysis
    • Vulnerability Assessment Concepts
    • Tools for Vulnerability Analysis
    • Web Application Vulnerability Scanning
  • System Hacking
    • Hacking Windows and Linux
    • Password Cracking Techniques
    • Gaining and Maintaining Access
  • Web Application Hacking
    • Web Application Architecture
    • Injection Attacks
    • Cross-Site Scripting (XSS)
  • Wireless Network Hacking
    • Wireless Encryption Standards
    • Hacking WEP/WPA/WPA2
    • Wireless Eavesdropping Techniques
  • Mobile Platform Hacking
    • Mobile OS Architecture
    • Mobile Application Security Issues
    • Penetration Testing Mobile Applications
  • Cloud Computing and Security
    • Cloud Deployment Models
    • Cloud Security Challenges
    • Securing Cloud Environments
  • IoT Hacking
    • Internet of Things Overview
    • IoT Vulnerabilities
    • Penetration Testing IoT Devices
  • Cybersecurity Laws and Standards
    • Legal Framework for Ethical Hacking
    • Compliance and Regulatory Frameworks
    • Best Practices in Cybersecurity
  • Preparation for CEH Exam
    • Exam Objectives and Structure
    • Study Tips and Resources
    • Practice Tests and Review Sessions

Suggested Courses

Request More Information

Email:   Whatsapp:

Testimonials

What our Students Saysddd