logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Certified Ethical Hacker

SS Course: GK3617

Course Overview

TOP

With CEH v13, you ll gain access to the world s first ethical hacking certification powered by AI. By integrating AI into all five phases of ethical hacking, CEH v13 enables you to achieve 40% greater efficiency and double your productivity in cybersecurity tasks.

EC Council s unique Learn, Certify, Engage, and Compete framework guides you toward ethical hacking mastery. You ll acquire hands-on experience through 220+ labs, 550+ attack techniques, and 4,000+ tools, while also testing your skills in global Capture the Flag (CTF) competitions. Validate your expertise with a 6-hour practical or 4-hour knowledge-based exam.

Earn a top certification recognized by U.S. DoD 8140, ANAB 17024, and NCSC, adhering to NICE 2.0 and NIST standards.

Open doors to opportunities with top employers by earning a certification trusted worldwide!

This course includes both a knowledge exam voucher and practical exam voucher, subscription to CEH challenges, and over 4000 hacking tools and attack techniques.

                                                                  

Scheduled Classes

TOP
12/15/25 - GVT - Virtual Classroom - Virtual Instructor-Led
01/26/26 - GVT - Virtual Classroom - Virtual Instructor-Led
02/23/26 - GVT - Virtual Classroom - Virtual Instructor-Led
03/16/26 - GVT - Virtual Classroom - Virtual Instructor-Led
03/23/26 - GVT - Virtual Classroom - Virtual Instructor-Led
04/27/26 - GVT - Virtual Classroom - Virtual Instructor-Led
05/04/26 - GVT - Virtual Classroom - Virtual Instructor-Led
06/01/26 - GVT - Virtual Classroom - Virtual Instructor-Led
07/06/26 - GVT - Virtual Classroom - Virtual Instructor-Led
07/27/26 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP
  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

    Prerequisites

    TOP
    • At least two years of IT security experience
    • A strong working knowledge of TCP/IP

      Who Should Attend

      TOP

      Cybersecurity professionals - Those looking to drive their cybersecurity career forward with the power of AI.

      Teams and organizations - Teams looking to turbocharge their AI knowledge in order to stay one step ahead of malicious actors.

      Government and military - Government departments and defense bodies looking for a trusted and highly valued global certification partner.

      • Security officers
      • Auditors
      • Security professionals
      • Site administrators
      • Penetration testers
      • Individuals concerned about the integrity of network infrastructure