Celebrate holidays with 10% off for all courses with "AVCFOREVER10" code. Secure now before 2025 price changes!

Certified Ethical Hacker Training (CEHv13) Cybersecurity course (exam included)

2.250,00 EUR

Blended Learning
Live Virtual Classroom
eLearning

AVC's CEH ethical hacking course offers hands-on experience to help you master techniques used by hackers to breach networks while learning how to strengthen your defences. Aligned with CEH v13 from EC-Council, the course equips you with advanced tools and methods to improve your cybersecurity skills in a changing threat landscape. The CEH certification can help you advance in your security career. With this certification, you will learn how to identify and fix vulnerabilities in systems and networks. With CEH certification, you will be able to advance in your career and take on more responsibilities.

Programme start every month

ask us for dates!

We offer shorter online classroom sessions

The CEH v13 training course is designed to equip you with the essential skills and knowledge to pass the CEH exam on your first attempt. The CEH certification is globally recognised and proves your expertise in ethical hacking, network defence and threat mitigation, positioning you as a leader in cybersecurity and furthering your career in roles such as IT security, penetration testing and risk management.

This Certified Ethical Hacking certification verifies the skills required to thrive in the information security domain. Many IT departments have made CEH mandatory for security-related positions.

Master Cybersecurity with EC Council's CEH course and accredited trainers

  • Learn advanced AI-driven processes and tools with the CEH v13 AI Certification course, designed by EC-Council.
  • Explore AI-driven threat detection and countermeasures to elevate your cybersecurity defences.
  • Master network packet analysis and system penetration testing to improve your network security skills and prevent cyber attacks.
  • This CEH certification course includes e-course materials and an exam voucher from EC-Council.

Key Features

Language

Course and material in English

Live virtual classroom

90 days of flexible access to online classroom sessions; at flexible times.

Support

24x7 help and support for participants.

Exam Included

The official CEH v13 Exam Voucher included

CEHv13 AI Labs

6 months free access to CEHv13 AI Labs with more than 4,000 integrated tools

Accredited training partner of EC-Council

Access to the latest eCourseware material from EC-Council

Covers 340 attack technologies

Improve your skills with over 150 practical practice demos

Hero

Learning Outcomes

This ethical hacking course will help you:

Mastery of ethical hacking techniques

Gain advanced skills in ethical hacking, including AI-powered automation for vulnerability scanning and threat detection.

AI-enhanced threat detection and mitigation

Learn how to use AI and machine learning for real-time threat analysis, improve response times, and minimise the impact of cyberattacks.

Advanced network and system security

Learn how to secure networks, applications, and operating systems with AI-powered solutions that neutralise sophisticated cyber threats.

Cloud and IoT security expertise

Develop skills to protect cloud infrastructures and IoT devices by applying AI-powered security measures and anomaly detection techniques

Incident response automation

Master the use of AI to automate incident response workflows, ensuring faster and more effective intrusion mitigation.

Hands-on experience with AI tools

Gain practical experience using AI-enhanced cybersecurity tools such as AI-powered SIEMs, firewalls, and penetration testing platforms.

Comprehensive compliance knowledge

Learn how to ensure compliance with data protection regulations using AI for continuous monitoring and reporting.

Enhanced defence against social engineering

Use AI tools to improve detection and defence against phishing and social engineering attacks, protecting your organisation's human factor.

Course timeline

Hero
  1. Introduction to Ethical Hacking

    Lesson 01

    Lesson 01 - Information Security Overview

    Lesson 02 - Information Security Threats and Attack Vectors

    Lesson 06 - Penetration Testing Concepts

    Lesson 03 - Hacking Concepts

    Lesson 04 - Ethical Hacking Concepts

    Lesson 05 - Information Security Controls

    Lesson 07 - Information Security Laws and Standards

  2. Footprinting and Reconnaissance

    Lesson 02

    Lesson 01 - Footprinting Concepts

    Lesson 02 - Footprinting through Search Engines

    Lesson 03 - Footprinting through Web Services

    Lesson 04 - Footprinting through Social Networking Sites

    Lesson 05 - Website Footprinting

    Lesson 06 - Email Footprinting

    Lesson 07 - Competitive Intelligence

    Lesson 08 - Whois Footprinting

    Lesson 09 - DNS Footprinting

    Lesson 10- Network Footprinting

    Lesson 11- Footprinting through Social Engineering

    Lesson 12 - Footprinting Tools

    Lesson 13 - Countermeasures

    Lesson 14 - Footprinting Pen Testing

  3. Scanning Networks

    Lesson 03

    Lesson 01 - Network Scanning Concepts

    Lesson 02 - Scanning Tools

    Lesson 03 - Scanning Techniques

    Lesson 04 - Scanning Beyond IDS and Firewall

    Lesson 05 - Banner Grabbing

    Lesson 06 - Draw Network Diagrams

    Lesson 07 - Scanning Pen Testing

  4. Enumeration

    Lesson 04

    Lesson 01 - Enumeration Concepts

    Lesson 02 - NetBIOS Enumeration

    Lesson 03 - SNMP Enumeration

    Lesson 04 - LDAP Enumeration

    Lesson 05 - NTP Enumeration

    Lesson 06 - SMTP Enumeration and DNS Enumeration

    Lesson 07 - Enumeration Countermeasures

    Lesson 08 - Other Enumeration Techniques

    Lesson 09 - Enumeration Pen Testing

  5. Vulnerability Analysis

    Lesson 05

    Lesson 01 - Vulnerability Assessment Concepts

    Lesson 02 - Vulnerability Assessment Solutions

    Lesson 03 - Vulnerability Scoring Systems

    Lesson 04 - Vulnerability Assessment Tools

    Lesson 05 - Vulnerability Assessment Reports

  6. System Hacking

    Lesson 06

    Lesson 01 - System Hacking Concepts

    Lesson 02 - Cracking Passwords

    Lesson 03 - Escalating Privileges

    Lesson 04 - Executing Applications

    Lesson 05 - Hiding Files

    Lesson 06 - Covering Tracks

    Lesson 07 - Penetration Testing

  7. Malware Threats

    Lesson 07

    Lesson 01 - Malware Concepts

    Lesson 02 - Trojan Concepts

    Lesson 03 - Virus and Worm Concepts

    Lesson 04 - Malware Analysis

    Lesson 05 - Countermeasures

    Lesson 06 - Anti-Malware Software

    Lesson 07 - Malware Penetration Testing

  8. Sniffing

    Lesson 08

    Lesson 01 - Sniffing Concepts

    Lesson 02 - Sniffing Technique: MAC Attacks

    Lesson 03 - Sniffing Technique: DHCP Attacks

    Lesson 04 - Sniffing Technique: ARP Poisoning

    Lesson 05 - Sniffing Technique: Spoofing Attacks

    Lesson 06 - Sniffing Technique: DNS Poisoning

    Lesson 07 - Sniffing Tools

    Lesson 08 - Countermeasures

    Lesson 09 - Sniffing Detection Techniques

    Lesson 10 - Sniffing Pen Testing

  9. Social Engineering

    Lesson 09

    Lesson 01 - Social Engineering Concepts

    Lesson 02 - Social Engineering Techniques

    Lesson 03 - Insider Threats

    Lesson 04 - Impersonation on Social Networking Sites

    Lesson 05 - Identity Theft

    Lesson 06 - Countermeasures

    Lesson 07 - Social Engineering Penetration Testing

  10. Denial-of-Service

    Lesson 10

    Lesson 01 - DoS/DDoS Concepts

    Lesson 02 - DoS/DDoS Attack Techniques

    Lesson 03 - Botnets

    Lesson 04 - DDoS Case Study

    Lesson 05 - DoS/DDoS Attack Tools

    Lesson 06 - Countermeasures

    Lesson 07 - DoS/DDoS Protection Tools

    Lesson 08 - DoS/DDoS Attack Penetration Testing

  11. Session Hijacking

    Lesson 11

    Lesson 01- Session Hijacking Concepts

    Lesson 02- Application Level Session Hijacking

    Lesson 03- Network Level Session Hijacking

    Lesson 04- Session Hijacking Tools

    Lesson 05- Countermeasures

    Lesson 06- Penetration Testing

  12. Evading IDS, Firewalls, and Honeypots

    Lesson 12

    Lesson 01- IDS, Firewall, and Honeypot Concepts

    Lesson 02- IDS, Firewall, and Honeypot Solutions

    Lesson 03- Evading IDS

    Lesson 04- Evading Firewalls

    Lesson 05- IDS/Firewall Evading Tools

    Lesson 06- Detecting Honeypots

    Lesson 07- IDS/Firewall Evasion Countermeasures

    Lesson 08- Penetration Testing

  13. Hacking Web Servers

    Lesson 13

    Lesson 01- Web Server Concepts

    Lesson 02- Web Server Attacks

    Lesson 03- Web Server Attack Methodology

    Lesson 04- Web Server Attack Tools

    Lesson 05- Countermeasures

    Lesson 06- Patch Management

    Lesson 07- Web Server Security Tools

    Lesson 08- Web Server Pen Testing

  14. Hacking Web Applications

    Lesson 14

    Lesson 01 - Web App Concepts

    Lesson 02 - Web App Threats

    Lesson 03 - Hacking Methodology

    Lesson 04 - Web Application Hacking Tools

    Lesson 05 - Countermeasures

    Lesson 06 - Web App Security Testing Tools

    Lesson 07 - Web App Pen Testing

  15. SQL Injection

    Lesson 15

    Lesson 01 - SQL Injection Concepts

    Lesson 02 - Types of SQL Injection

    Lesson 03 - SQL Injection Methodology

    Lesson 04 - SQL Injection Tools

    Lesson 05 - Evasion Techniques

    Lesson 06 - Countermeasures

  16. Hacking Wireless Networks

    Lesson 16

    Lesson 01 - Wireless Concepts

    Lesson 02 - Wireless Encryption

    Lesson 03 - Wireless Threats

    Lesson 04 - Wireless Hacking Methodology

    Lesson 05 - Wireless Hacking Tools

    Lesson 06 - Bluetooth Hacking

    Lesson 07 - Countermeasures

    Lesson 08 - Wireless Security Tools

    Lesson 09 - Wi-Fi Pen Testing

  17. Hacking Mobile Platforms

    Lesson 17

    Lesson 01- Mobile Platform Attack Vectors

    Lesson 02- Hacking Android OS

    Lesson 03- Hacking iOS

    Lesson 04- Mobile Spyware

    Lesson 05- Mobile Device Management

    Lesson 06- Mobile Security Guidelines and Tools

    Lesson 07- Mobile Pen Testing

  18. IoT Hacking

    Lesson 18

    Lesson 01 - IoT Concepts

    Lesson 02 - IoT Attacks

    Lesson 03 - IoT Hacking Methodology

    Lesson 04 - IoT Hacking Tools

    Lesson 05 - Countermeasures

    Lesson 06 - IoT Pen Testing

  19. Cloud Computing

    Lesson 19

    Lesson 01 - Cloud Computing Concepts

    Lesson 02 - Cloud Computing Threats

    Lesson 03 - Cloud Computing Attacks

    Lesson 04 - Cloud Security

    Lesson 05 - Cloud Security Tools

    Lesson 06 - Cloud Penetration Testing

  20. Cryptography

    Lesson 20

    Lesson 01 - Cryptography Concepts

    Lesson 02 - Encryption Algorithms

    Lesson 03 - Cryptography Tools

    Lesson 04 - Public Key Infrastructure (PKI)

    Lesson 05 - Email Encryption

    Lesson 06 - Disk Encryption

    Lesson 07 - Cryptanalysis

    Lesson 08 - Countermeasures

Skills Covered

  • Trojans, backdoors and defence strategies
  • Innovations in mobile and web security
  • AIP-driven analysis of network traffic
  • AI in vulnerability scanning and exploitation
  • Phishing detection and prevention
  • Cloud security and monitoring solutions
  • Cyber threat intelligence and response
  • Advanced hacking techniques with intelligent tools
  • AI-enhanced intrusion detection and prevention
  • Log management and threat detection
  • Simulations of attacks with social engineering
  • Malware analysis and remediation
  • Protection of wireless networks
  • Ethical hacking reporting and documentation
Certified etchical hacker course

Who Should Enroll in this Program?

There are no specific eligibility criteria for Certified Ethical Hacker (CEH) training and certification, but we recommend a basic knowledge of TCP/IP.

Network security officers and practitioners

Site administrators

IS/IT security specialist, analyst, architect, administrator or manager

IS/IT auditor or consultant

IT security officer, auditor, or engineer

IT operation manager

Network specialist, analyst, manager

Technical support engineer

System analyst or administrator

Start course now

Trends in industry

  • Integration of AI and Machine Learning: CEH v13 emphasises the use of AI to enhance cybersecurity operations and positions you to take on roles that require expertise in AI-driven threat detection and response.
  • IoT and Endpoint Protection Skills: With IoT and remote working as the norm, CEH v13 gives you advanced skills to secure devices and networks, opening doors to roles in endpoint protection and IoT security.
  • Cloud and hybrid security expertise: As organisations increasingly move to cloud environments, CEH v13 gives you the knowledge to secure critical infrastructure, making you a valuable asset to any business leveraging cloud technology.

While certification itself may not guarantee a job, it is a valuable credential that can significantly improve your chances in a competitive job market. Combined with relevant experience and strong problem-solving skills, the CEH certification can be an influential asset in your career journey.

Frequently Asked Questions

certification training

Need corporate solutions or LMS integration?

Didn't find the course or program which would work for your business? Need LMS integration? Write us, we will solve everything!

;