{"course":{"productid":3226,"modality":1,"active":true,"language":"en","title":"EC-Council Certified Ethical Hacking","productcode":"CEH","vendorcode":"EC","vendorname":"EC-Council","fullproductcode":"EC-CEH","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/ec-ceh","objective":"<p>Amplify Your Edge as a Certified Ethical Hacker Powered by AI Capabilities:<\/p>\n<p>Advanced Knowledge: As an AI-powered Certified Ethical Hacker, you&rsquo;ll possess in-depth knowledge of ethical hacking methodologies, enhanced with cutting-edge AI techniques.<br\/>\nAI Integration: You&rsquo;ll effectively integrate AI across every phase of ethical hacking, from reconnaissance and scanning to gaining access, maintaining access, and covering your tracks.<br\/>\nAutomation and Efficiency: You&rsquo;ll leverage AI to automate tasks, boost efficiency, and detect sophisticated threats that traditional methods might overlook.<br\/>\nProactive Defense: With AI at your disposal, you&rsquo;ll be equipped for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks before they happen.<\/p>\n<h5>How C|EH v13 Powered by AI Redefines Your Cybersecurity Career<\/h5><ul>\n<li>Experience the world&rsquo;s first ethical hacking program powered by AI<\/li><li>Master the five phases of ethical hacking integrated with AI<\/li><li>Achieve 40% efficiency and double your productivity with AI-driven skills<\/li><li>Learn how to hack AI systems<\/li><li>Become an AI expert with hands-on labs for practicing AI skills<\/li><li>Master the latest advanced attack techniques, trends, and countermeasures<\/li><li>Gain practical experience with 221 labs, attack vectors, and hacking tools<\/li><li>Experience with over 550 attack techniques<\/li><li>Explore 4,000+ commercial-grade hacking and security tools<\/li><li>Follow a unique four-phase learning framework: Learn, Certify, Engage, Compete<\/li><li>Practice hacking a real organization in a live cyber range<\/li><li>Validate your skills in a 6-hour practical exam or 4-hour knowledge-based exam<\/li><li>Compete with hackers in global CTF competitions on the latest issues<\/li><li>Earn the globally recognized No.1 Ethical Hacking Certification<\/li><li>Gain a certification that is approved and accredited by U.S. DoD 8140, ANAB 17024, and NCSC<\/li><li>Meet the rigorous standards of NICE 2.0 and the NIST Framework<\/li><li>Get the opportunity to be employed by top organizations including Fortune 500 companies, government, and private sector firms<\/li><\/ul>","essentials":"<p>To be eligible to challenge the EC-Council CEH certification examination, the candidate has two options:<\/p>\n<p>Attend Official Network Security Training by EC-Council:<\/p>\n<p>If a candidate has completed an official EC-Council training either at an Accredited Training Center, via the iClass platform, or at an approved academic institution, the candidate is eligible to challenge the relevant EC-Council exam without going through the application process.<\/p>\n<p>Attempt the Exam without Official EC-Council Training:<\/p>\n<p>In order to be considered for the EC-Council CEH exam without attending official network security training, the candidate must have at least 2 years of work experience in the Information Security domain. If the candidate has the required work experience, they can submit an eligibility application form along with <span class=\"price\">US&#8239;$&#8239;100.&mdash;<\/span>, a non-refundable fee<\/p>","audience":"<ul>\n<li>Mid-Level Information Security Auditor<\/li><li>Cybersecurity Auditor<\/li><li>Security Administrator<\/li><li>IT Security Administrator<\/li><li>Information Security Analyst 1<\/li><li>Infosec Security Administrator<\/li><li>Cybersecurity Analyst (Level 1, Level 2, &amp; Level 3)<\/li><li>Network Security Engineer<\/li><li>SOC Security Analyst<\/li><li>Network Engineer<\/li><li>Senior Security Consultant<\/li><li>Information Security Manager<\/li><li>Senior SOC Analyst<\/li><li>Solution Architect<\/li><li>Cybersecurity Consultant<\/li><li>Cyber Defense Analyst<\/li><li>Vulnerability Assessment Analyst<\/li><li>Warning Analyst<\/li><li>All-Source Analyst<\/li><li>Cyber Defense Incident Responder<\/li><li>Research &amp; Development Specialist<\/li><li>Senior Cloud Security Analyst<\/li><li>Third Party Risk Management:<\/li><li>Threat Hunting Analyst<\/li><li>Penetration Ttester<\/li><li>Cybersecurity Instructor<\/li><li>Red Team Specialist<\/li><li>Data Protection &amp; Privacy Officer<\/li><li>SOAR Engineer<\/li><li>AI Security Engineer<\/li><li>Sr. IAM Engineer<\/li><li>PCI Security Advisor<\/li><li>Exploitation Analyst (EA)<\/li><li>Zero Trust Solutions Engineer \/ Analyst<\/li><li>Cryptographic Engineer<\/li><li>AI\/ML Security Engineer<\/li><li>Machine Learning Security Specialist<\/li><li>AI Penetration Tester<\/li><li>AI\/ ML Security Consultant<\/li><li>Crypto Security Consultant<\/li><\/ul>","contents":"<p>With 20 cutting-edge modules, you&rsquo;ll gain the core skills needed to dominate the cybersecurity landscape. C|EH isn&rsquo;t just keeping pace&mdash;it&rsquo;s leading the charge, evolving with the latest operating systems, exploits, tools, and hacking techniques to ensure you&rsquo;re always ahead of the curve.<\/p>\n<p>Dive deep into the future of cybersecurity with training that integrates AI into all five phases of ethical hacking, reconnaissance and scanning to gaining access, maintaining access, and covering tracks. You&rsquo;ll harness the power of AI to supercharge your hacking techniques and disrupt AI systems&mdash;giving you 10x efficiency in your cybersecurity role.<\/p>\n<p>CEH v13 isn&rsquo;t just a certification; it&rsquo;s a fully immersive experience. CEH combines comprehensive knowledge-based training with immersive hands-on labs to ensure a well-rounded learning experience. You&rsquo;ll engage with live targets, tools, and vulnerable systems in a controlled environment, building real-world skills that empower you to confidently apply your expertise in any scenario. Get ready to transform the way you hack and protect the digital world!<\/p>\n<h5>Introduction to Ethical Hacking<\/h5><p>Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.<\/p>\n<h5>Footprinting and Reconnaissance<\/h5><p>Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking<\/p>\n<h5>Scanning Networks<\/h5><p>Learn different network scanning techniques and countermeasures.<\/p>\n<h5>Enumeration<\/h5><p>Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.<\/p>\n<h5>Vulnerability Analysis<\/h5><p>Learn how to identify security loopholes in a target organization&rsquo;s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.<\/p>\n<h5>System Hacking<\/h5><p>Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.<\/p>\n<h5>Malware Threats<\/h5><p>Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.<\/p>\n<h5>Sniffing<\/h5><p>Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.<\/p>\n<h5>Social Engineering<\/h5><p>Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.<\/p>\n<h5>Denial-of-Service<\/h5><p>Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.<\/p>\n<h5>Session Hijacking<\/h5><p>Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.<\/p>\n<h5>Evading IDS, Firewalls, and Honeypots<\/h5><p>Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.<\/p>\n<h5>Hacking Web Servers<\/h5><p>Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.<\/p>\n<h5>Hacking Web Applications<\/h5><p>Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.<\/p>\n<h5>SQL Injection<\/h5><p>Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.<\/p>\n<h5>Hacking Wireless Networks<\/h5><p>Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.<\/p>\n<h5>Hacking Mobile Platforms<\/h5><p>Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.<\/p>\n<h5>IoT Hacking<\/h5><p>Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.<\/p>\n<h5>Cloud Computing<\/h5><p>Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.<\/p>\n<h5>Cryptography<\/h5><p>Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.<\/p>","summary":"<h5>CEH v13 Update: AI Powered Certified Ethical Hacker<\/h5><p>By joining the AI Revolution as a Certified Ethical Hacker, you&rsquo;ll gain the expertise to navigate the cutting-edge world of cybersecurity. Certified Ethical Hackers, trained in the latest version of CEH v13, are equipped with AI-powered tools and techniques to identify, exploit, and secure vulnerabilities in systems and networks. You&rsquo;ll learn to leverage AI for automating threat detection, predicting security breaches, and responding swiftly to cyber incidents. Moreover, you&rsquo;ll also gain the skills needed to secure AI-driven technologies against potential threats. This combination of ethical hacking and AI capabilities will place you at the forefront of cybersecurity, ready to defend organizations across industries from advanced threats and adapt to evolving challenges.<\/p>\n<h5>CEH Elite Package<\/h5><p>With your course booking, we will send you the CEH Elite Package with the following features and additional learning materials:<\/p>\n<ul>\n<li>eCourseware<\/li><li>Exam Voucher<\/li><li>Discounted Retake Voucher<\/li><li>Next Version eCourseware<\/li><li>6 Months of Official Labs<\/li><li>C|EH Engage<\/li><li>Global C|EH Challenges<\/li><li>Exam Preparation<\/li><li>C|EH Practical Exam<\/li><li>Ethical Hacking Video Library (10)<\/li><\/ul>","objective_plain":"Amplify Your Edge as a Certified Ethical Hacker Powered by AI Capabilities:\n\nAdvanced Knowledge: As an AI-powered Certified Ethical Hacker, you\u2019ll possess in-depth knowledge of ethical hacking methodologies, enhanced with cutting-edge AI techniques.\n\nAI Integration: You\u2019ll effectively integrate AI across every phase of ethical hacking, from reconnaissance and scanning to gaining access, maintaining access, and covering your tracks.\n\nAutomation and Efficiency: You\u2019ll leverage AI to automate tasks, boost efficiency, and detect sophisticated threats that traditional methods might overlook.\n\nProactive Defense: With AI at your disposal, you\u2019ll be equipped for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks before they happen.\n\nHow C|EH v13 Powered by AI Redefines Your Cybersecurity Career\n\n\n- Experience the world\u2019s first ethical hacking program powered by AI\n- Master the five phases of ethical hacking integrated with AI\n- Achieve 40% efficiency and double your productivity with AI-driven skills\n- Learn how to hack AI systems\n- Become an AI expert with hands-on labs for practicing AI skills\n- Master the latest advanced attack techniques, trends, and countermeasures\n- Gain practical experience with 221 labs, attack vectors, and hacking tools\n- Experience with over 550 attack techniques\n- Explore 4,000+ commercial-grade hacking and security tools\n- Follow a unique four-phase learning framework: Learn, Certify, Engage, Compete\n- Practice hacking a real organization in a live cyber range\n- Validate your skills in a 6-hour practical exam or 4-hour knowledge-based exam\n- Compete with hackers in global CTF competitions on the latest issues\n- Earn the globally recognized No.1 Ethical Hacking Certification\n- Gain a certification that is approved and accredited by U.S. DoD 8140, ANAB 17024, and NCSC\n- Meet the rigorous standards of NICE 2.0 and the NIST Framework\n- Get the opportunity to be employed by top organizations including Fortune 500 companies, government, and private sector firms","essentials_plain":"To be eligible to challenge the EC-Council CEH certification examination, the candidate has two options:\n\nAttend Official Network Security Training by EC-Council:\n\nIf a candidate has completed an official EC-Council training either at an Accredited Training Center, via the iClass platform, or at an approved academic institution, the candidate is eligible to challenge the relevant EC-Council exam without going through the application process.\n\nAttempt the Exam without Official EC-Council Training:\n\nIn order to be considered for the EC-Council CEH exam without attending official network security training, the candidate must have at least 2 years of work experience in the Information Security domain. If the candidate has the required work experience, they can submit an eligibility application form along with US $ 100.\u2014, a non-refundable fee","audience_plain":"- Mid-Level Information Security Auditor\n- Cybersecurity Auditor\n- Security Administrator\n- IT Security Administrator\n- Information Security Analyst 1\n- Infosec Security Administrator\n- Cybersecurity Analyst (Level 1, Level 2, & Level 3)\n- Network Security Engineer\n- SOC Security Analyst\n- Network Engineer\n- Senior Security Consultant\n- Information Security Manager\n- Senior SOC Analyst\n- Solution Architect\n- Cybersecurity Consultant\n- Cyber Defense Analyst\n- Vulnerability Assessment Analyst\n- Warning Analyst\n- All-Source Analyst\n- Cyber Defense Incident Responder\n- Research & Development Specialist\n- Senior Cloud Security Analyst\n- Third Party Risk Management:\n- Threat Hunting Analyst\n- Penetration Ttester\n- Cybersecurity Instructor\n- Red Team Specialist\n- Data Protection & Privacy Officer\n- SOAR Engineer\n- AI Security Engineer\n- Sr. IAM Engineer\n- PCI Security Advisor\n- Exploitation Analyst (EA)\n- Zero Trust Solutions Engineer \/ Analyst\n- Cryptographic Engineer\n- AI\/ML Security Engineer\n- Machine Learning Security Specialist\n- AI Penetration Tester\n- AI\/ ML Security Consultant\n- Crypto Security Consultant","contents_plain":"With 20 cutting-edge modules, you\u2019ll gain the core skills needed to dominate the cybersecurity landscape. C|EH isn\u2019t just keeping pace\u2014it\u2019s leading the charge, evolving with the latest operating systems, exploits, tools, and hacking techniques to ensure you\u2019re always ahead of the curve.\n\nDive deep into the future of cybersecurity with training that integrates AI into all five phases of ethical hacking, reconnaissance and scanning to gaining access, maintaining access, and covering tracks. You\u2019ll harness the power of AI to supercharge your hacking techniques and disrupt AI systems\u2014giving you 10x efficiency in your cybersecurity role.\n\nCEH v13 isn\u2019t just a certification; it\u2019s a fully immersive experience. CEH combines comprehensive knowledge-based training with immersive hands-on labs to ensure a well-rounded learning experience. You\u2019ll engage with live targets, tools, and vulnerable systems in a controlled environment, building real-world skills that empower you to confidently apply your expertise in any scenario. Get ready to transform the way you hack and protect the digital world!\n\nIntroduction to Ethical Hacking\n\nLearn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.\n\nFootprinting and Reconnaissance\n\nLearn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking\n\nScanning Networks\n\nLearn different network scanning techniques and countermeasures.\n\nEnumeration\n\nLearn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.\n\nVulnerability Analysis\n\nLearn how to identify security loopholes in a target organization\u2019s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.\n\nSystem Hacking\n\nLearn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.\n\nMalware Threats\n\nLearn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.\n\nSniffing\n\nLearn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.\n\nSocial Engineering\n\nLearn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.\n\nDenial-of-Service\n\nLearn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.\n\nSession Hijacking\n\nLearn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.\n\nEvading IDS, Firewalls, and Honeypots\n\nLearn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.\n\nHacking Web Servers\n\nLearn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.\n\nHacking Web Applications\n\nLearn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.\n\nSQL Injection\n\nLearn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.\n\nHacking Wireless Networks\n\nLearn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.\n\nHacking Mobile Platforms\n\nLearn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.\n\nIoT Hacking\n\nLearn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.\n\nCloud Computing\n\nLearn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.\n\nCryptography\n\nLearn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.","summary_plain":"CEH v13 Update: AI Powered Certified Ethical Hacker\n\nBy joining the AI Revolution as a Certified Ethical Hacker, you\u2019ll gain the expertise to navigate the cutting-edge world of cybersecurity. Certified Ethical Hackers, trained in the latest version of CEH v13, are equipped with AI-powered tools and techniques to identify, exploit, and secure vulnerabilities in systems and networks. You\u2019ll learn to leverage AI for automating threat detection, predicting security breaches, and responding swiftly to cyber incidents. Moreover, you\u2019ll also gain the skills needed to secure AI-driven technologies against potential threats. This combination of ethical hacking and AI capabilities will place you at the forefront of cybersecurity, ready to defend organizations across industries from advanced threats and adapt to evolving challenges.\n\nCEH Elite Package\n\nWith your course booking, we will send you the CEH Elite Package with the following features and additional learning materials:\n\n\n- eCourseware\n- Exam Voucher\n- Discounted Retake Voucher\n- Next Version eCourseware\n- 6 Months of Official Labs\n- C|EH Engage\n- Global C|EH Challenges\n- Exam Preparation\n- C|EH Practical Exam\n- Ethical Hacking Video Library (10)","skill_level":"Intermediate","version":"13","duration":{"unit":"d","value":5,"formatted":"5 days"},"pricelist":{"List Price":{"CN":{"country":"CN","currency":"CNY","taxrate":17,"price":11000},"TW":{"country":"TW","currency":"TWD","taxrate":5,"price":55000},"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":3950},"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":3950},"AT":{"country":"AT","currency":"EUR","taxrate":20,"price":3950},"NL":{"country":"NL","currency":"EUR","taxrate":21,"price":3950},"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":5500},"PL":{"country":"PL","currency":"EUR","taxrate":23,"price":3950},"IL":{"country":"IL","currency":"ILS","taxrate":17,"price":13700},"GR":{"country":"GR","currency":"EUR","taxrate":null,"price":3950},"MK":{"country":"MK","currency":"EUR","taxrate":null,"price":3950},"HU":{"country":"HU","currency":"EUR","taxrate":20,"price":3950}}},"lastchanged":"2025-12-19T15:32:11+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/en\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course-schedule\/3226","source_lang":"en","source":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course\/ec-ceh"}}