New Year Learning Carnival: Get Free Courses and Up to 50% off on Career Booster Combos!
D H M S

CEH v13 Online Certification Training in Chennai
Read Reviews

The Certified Ethical Hacker (CEH v13) training from EC-Council proves your understanding of core security essentials. It benefits you get recognized as a Certified Ethical Hacker (CEH v13 Training in Chennai) and Penetration Tester with the most sought-after security credentials globally. This internationally valued security training validates your ability to identify the vulnerabilities in the organization’s network infrastructure and effectively combat cyber-attacks.

Watch Intro Video

CEH V13 Course Highlights

  • 40-Hour LIVE Instructor-led Training
  • EC-Council Authorized Partner
  • Highly Interactive and Dynamic Sessions
  • Practical Training on Latest Tools
  • 98% Exam Pass Rate
  • Learn from CEI Certified Trainers
  • Career Guidance and Mentorship
  • Extended Post- Training Support
  • Access to Recorded Sessions

Accredited By

CEH V13 TRAINING CALENDAR

Choose your Preferred Learning Mode

ON DEMAND TRAINING

Learn on Your Own Time
1-to-1 learning
Customized Solutions

Contact US

ONLINE TRAINING

Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

Classes starting from

5th Sep: Weekend

15th Sep: Weekday

ENROLL NOW Preferred

CORPORATE TRAINING

Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Contact US For Business

you were looking for your convenient time & date

REQUEST A BATCH

CEH V13 Course Description

The Certified Ethical Hacker (CEH v13) training program is designed to equip professionals with the essential skills to become proficient in ethical hacking and cybersecurity. The v13 version introduces a robust integration of AI-powered technologies and advanced techniques to enhance the learning experience and effectiveness of ethical hacking strategies.

Through hands-on labs, real-world simulations, and cutting-edge AI-driven tools, participants will become proficient in ethical hacking techniques and critical cybersecurity practices for defending against traditional and modern AI-powered threats.

 

Differences Between CEH v12 and CEH v13

CEH v12 CEH v13
Total Number of Modules 20 20
Total Number of Labs 220 91 Core Labs + 130 Self-study Labs*
Attack Techniques 519 550
New Technology Added MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, Techniques for Establishing Persistence, Evading NAC and Endpoint Security, Fog Computing, Edge Computing, and Grid Computing AI-Driven Ethical Hacking, Active Directory Attacks, Ransomware Attacks and Mitigation, AI and Machine Learning in Cybersecurity, IoT Security Challenges, Critical Infrastructure Vulnerabilities, Deepfake Threats

Target Audience

This course is ideal for:

  • Security Analysts
  • Ethical Hackers
  • System Administrators
  • Network Administrators
  • Network and Security Engineers
  • Cyber Security Managers
  • Information Security Auditors
  • Security Professionals

Pre-Requisite

  • Basic understanding of network essentials and core concepts, including server and network components.

Exam Information

Certification Name C|EH v13 (MCQ Exam) C|EH v13 (Practical Exam)
Exam Format Multiple Choice Questions iLabs Cyber Range
Number of Questions 125 Questions 20 Questions
Exam Duration 240 Minutes 360 Minutes
Passing Score 60-80% 70%
Exam Delivery VUE / ECCEXAM

GET A FREE DEMO CLASS

For
Captcha*
2 + 4 =
loader-infosectrain

CEH V13 Course Objectives

  • Ethical hacking fundamentals, cyber kill chain concepts, an overview of information security and security measures with AI-enhanced threat detection and response.
  • Concepts, methodologies, and tools of footprinting using AI for automated information gathering and reconnaissance.
  • Concepts of vulnerability assessment, its categories and strategies, and AI-driven exposure to technologies used in the industry.
  • Social engineering concepts and terminologies, including identity theft, impersonation, insider threats, social engineering techniques, and AI-based countermeasures.
  • Operational Technology (OT) essentials, threats, attack methodologies, and AI-powered attack prevention.
  • Recognizing vulnerabilities in IoT and ensuring the safety of IoT devices using AI-based security solutions.
  • Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, cryptanalysis, and enhanced cryptographic defense.
  • Cloud computing, threats and security, AI-driven container technology, and serverless computing security measures.

CEH V13 Course Content

Module 1: Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Hacking Methodologies and Frameworks
  • Information Security Controls
  • Information Security Laws and Standards

 

Module 2: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Internet Research Services
  • Footprinting through Social Networking Sites
  • Whois Footprinting
  • DNS Footprinting
  • Network and Email Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tasks using Advanced Tools and AI
  • Footprinting Countermeasures

 

Module 3: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Source Port Manipulation
  • Network Scanning Countermeasures

 

Module 4: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures

 

Module 5: Vulnerability Analysis 

  • Vulnerability Assessment Concepts
  • Vulnerability Scoring Systems and Databases
  • Vulnerability-Management Life Cycle
  • Vulnerability Research
  • Vulnerability Scanning and Analysis
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

 

Module 6: System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs

 

Module 7: Malware Threats

  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Viruses and Worms
  • Fileless Malware Concepts
  • AI-based Malware Concepts
  • Malware Countermeasures
  • Anti-Malware Software

 

Module 8: Sniffing

  • Sniffing Concepts
  • Sniffing Technique
  • Sniffing Tools
  • Sniffing Countermeasures

 

Module 9: Social Engineering

  • Social Engineering Concepts
  • Human-based Social Engineering Techniques
  • Computer-based Social Engineering Techniques
  • Mobile-based Social Engineering Techniques
  • Social Engineering Countermeasures

 

Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Countermeasures

 

Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures

 

Module 12: Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection/Prevention System (IDS/IPS) Concepts
  • Firewall Concepts
  • IDS, IPS, and Firewall Solutions
  • Evading IDS/Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Honeypot Concepts
  • IDS/Firewall Evasion Countermeasures

 

Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Patch Management

 

Module 14: Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API and Webhooks
  • Web Application Security

 

Module 15: SQL Injections 

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • Evasion Techniques
  • SQL Injection Countermeasures

 

Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Attack Countermeasures

 

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines
  • Mobile Security Tools

 

Module 18: IoT Hacking & OT Hacking

  • IoT Hacking
  • IoT Concepts and Attacks
  • IoT Hacking Methodology
  • OT Hacking

 

Module 19: Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Hacking
  • Cloud Hacking Methodology
  • AWS Hacking
  • Microsoft Azure Hacking
  • Google Cloud Hacking
  • Container Hacking
  • Cloud Security

 

Module 20: Cryptography

  • Cryptography Concepts and Encryption Algorithms
  • Applications of Cryptography
  • Cryptanalysis
  • Cryptography Attack Countermeasures

 

Need customized curriculum Talk to Advisor

Here What people are saying about InfosecTrain

Why InfosecTrain

Guaranteed* to run Courses

4 hrs/day in Weekday/Weekend

Customized Training

Technical Support Post Training

Access to the recorded session

Accredited Instructors

CEH V13 FAQs

1. Is it mandatory to attend EC-Council’s authorized training to attempt this exam?

No, it is not mandatory to attend EC-Council’s authorized training to attempt this exam. If a candidate has

  • 2 years of work experience in a security-related field
  • Submitted CEH exam eligibility application and obtained an authorization from EC-Council, he/she can attempt the exam.
2. Isnt’s it risky to make such knowledge easily available to the public?

EC council is completely aware about its social responsibility and therefore, has set a minimum eligibility criteria of 2 years of security related work experience for the course.

  • All candidates are made to sign an agreement where they agree to respect the knowledge acquired and never to misuse it.
  • All candidates have to abide by all legal laws of their respective countries of residence in the use while using the acquired knowledge.
  • Besides all these, the candidates need to have in-depth knowledge of the course to get through this difficult exam and earn this certification.
3. Are the trainers reformed hackers?
The quality of instructor is never compromised for the training of this course. Security professionals with significant years of teaching experience in the industry and a security background to efficiently deal with security related courses are promoted to be the trainers.
4. How is this course training at Infosectrain different from the other courses available in the market?
The course is focused on hacking techniques and technologies from an offensive perspective. It is an advanced security course and we regularly update it to reflect the latest developments in the domain, like new hacking techniques, exploits, automated programs as well as defensive recommendations as suggested by the EC Council.
5. What is the value of CEH certification compared to other educational offerings in the field of information security?
While other certification trains a candidate about proper configuration, firewalls, or rather preemptive security, CEH course trains them to adopt defence by attacking the systems. Thus, this course focuses on offensive tactics in synchronisation with defensive countermeasures. Therefore, the candidates are fed with holistic approach towards organisation’s security.
6. What are the eligibility criteria to apply for the CEH (ANSI) exam?

Eligibility criteria to apply to sit for the CEH (ANSI) Exam are:

  • A candidate must either hold a CEH certification of previous versions or
  • Have a minimum of 2 years work experience in InfoSec domain ( non refundable USD100 is application fee), Or Have attended an official EC-Council training ($100 application fee is included in the training fee)
7. Is the $100 application fee refundable?
No, the $100 application fee is not refundable
8. What is the validity of the approved application?
The validity of the application process 3 months from the date of approval.
9. Is the application form compulsory for all the candidates?
Yes, the application form is compulsory for all the candidates who want to take the exam directly without undergoing training.
10. What is the validity period for the exam voucher code?
After the approval of the application, candidates have to purchase their exam voucher either from EC-Council Online Store or from one of their authorized training channels and the validity period of this voucher is 1 year from the date of purchase.
11. Is the exam proctored? What are the proctoring options available?

The exam is proctored by a proctor authorised at the testing centre for the candidates sitting for the exam at a physical testing centre (ETC). Those candidates who wish to attempt the exam remotely (ECC/ ProctorU), it will be proctored remotely by an authorised proctor.

12. Is there any passing criteria for the exam?
No, there is no fixed passing score/ percentage for the exam, the number of items that candidates have to answer correctly varies depending on the difficulty of the questions delivered during the exam.
For more details on passing score please visit: https://cert.eccouncil.org/faq.html
13. Is it possible to retake the exam?

Retake exam requests can only be purchased by writing to feedback@eccouncil.org, should a candidate fail the exam.

TOP
whatsapp