100% found this document useful (1 vote)
464 views29 pages

CEH V13ai Brochure

Uploaded by

elmerfilipe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
464 views29 pages

CEH V13ai Brochure

Uploaded by

elmerfilipe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

C|EH v13

BECOME A CERTIFIED
ETHICAL HACKER

Powered by AI Capabilities
LEARN | CERTIFY | ENGAGE | COMPETE

Certified Ethical Hacker


The AI Powered Certified Ethical Hacker

Build Your Career 01 The World’s #1 Ethical Hacking


Certification for 20+ years

with the Most


In-Demand 01 EC-Council Introduces the Industry’s
First AI Cybersecurity Courses

Ethical Hacking
Certification 12 C|EH Ranks 12th among the
Top 75 Highest-Paying IT
Certifications in the US and Globally

Ranked 1st in Ethical Hacking


97% Stated That the Skills They
Acquired in CEH Helped
Safeguard Their Organizations

Certifications by ZDNet
95% Chose C|EH for
Career Growth

Ranked in the List of Top 10


Cybersecurity Certifications 92% of Hiring Managers Prefer
Candidates with the C|EH for
Jobs That Require Ethical Hacking Skills

Ranked 4 Among
th 45+ Cybersecurity Job Roles Are
Mapped to the C|EH Certification in
2024, Compared to 20+ Roles in 2022
the Top 50 Leading
Cybersecurity Certifications
1 in every 2 Professionals Received
Promotions After Completing the C|EH

C|EH is the only Globally In-Demand


Ethical Hacking Certification that covers
Core Domains of Cybersecurity and has
Global Recognition and Accreditations
while offering a Higher Employability Rate

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Future Proof Your AI in Cybersecurity


Cybersecurity Threats
Career with AI
83% note tangible alterations in
attack methodologies amidst
The Demand for the AI revolution (EC-Council, 2024)

Cybersecurity Professionals
with AI Skills is on the Rise 66 % admit Being Unprepared
for AI Cyber Onslaughts
(EC-Council, 2024)

Countermeasures
AI Skills No Longer Optional;
They Are Essential Up to

90% of fraud costs can be reduced


by AI models in specific

42% of large enterprises actively scenarios where behavioral data analysis


use AI, and 59% of early is effectively applied (IBM, 2024)
adopters plan to increase investment and

AI
accelerate AI integration (IBM, 2024)
and automation slashed breach
impact by 30%, saving businesses

40% surge in demand for specialists in USD 850,000 and reducing breach
Artificial Intelligence and Machine lifecycles by 108 days (IBM, 2023)
Learning (World Economic Forum, 2023)

96% of security leaders deem AI


solutions essential for countering
AI-powered threats due to their speed
and effectiveness (Darktrace, 2024)

87% of business leaders expect at


least a quarter of their workforce
will need to upskill in AI (IBM, 2024)

*McAfee Report. ˜Darktance. †Forbes. ±Projected by Future of Jobs Report 2023.


ˆ 2023 Emerging Jobs Report, LinkedIn.

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Gain Cybersecurity Mastery for Real-world


Success with Certified Ethical Hacker v13
Why Should You Join the AI How C|EH v13 Powered by
Revolution with the Certified AI Redefines Your
Ethical Hacker Program? Cybersecurity Career
By joining the AI Revolution as a Certified Ethical | Experience the world’s first ethical
Hacker, you’ll gain the expertise to navigate hacking program powered by AI
the cutting-edge world of cybersecurity. | Master the five phases of ethical
hacking integrated with AI
Certified Ethical Hackers, trained in the latest | Achieve 40% efficiency and double your
version of CEH v13, are equipped with productivity with AI-driven skills
AI-powered tools and techniques to identify,
| Learn how to hack AI systems
exploit, and secure vulnerabilities in systems
| Become an AI expert with hands-
and networks. You’ll learn to leverage AI for
on labs for practicing AI skills
automating threat detection, predicting security
breaches, and responding swiftly to cyber | Master the latest advanced attack
incidents. Moreover, you’ll also gain the skills techniques, trends, and countermeasures
needed to secure AI-driven technologies against | Gain practical experience with 221 labs,
potential threats. This combination of ethical attack vectors, and hacking tools
hacking and AI capabilities will place you at | Experience with over 550 attack techniques
the forefront of cybersecurity, ready to defend
| Explore 4,000+ commercial-grade
organizations across industries from advanced
hacking and security tools
threats and adapt to evolving challenges.
| Follow a unique four-phase learning
framework: Learn, Certify, Engage, Compete
Amplify Your Edge as a Certified Ethical Hacker
| Practice hacking a real organization
Powered by AI Capabilities:
in a live cyber range
Advanced Knowledge: As an AI-powered Certified
Ethical Hacker, you’ll possess in-depth knowledge | Validate your skills in a 6-hour practical
of ethical hacking methodologies, enhanced with exam or 4-hour knowledge-based exam
cutting-edge AI techniques. | Compete with hackers in global CTF
AI Integration: You’ll effectively integrate AI competitions on the latest issues
across every phase of ethical hacking, from | Earn the globally recognized No.1
reconnaissance and scanning to gaining access, Ethical Hacking Certification
maintaining access, and covering your tracks.
| Gain a certification that is approved
Automation and Efficiency: You’ll leverage AI to
and accredited by U.S. DoD 8140,
automate tasks, boost efficiency, and detect
ANAB 17024, and NCSC
sophisticated threats that traditional methods
| Meet the rigorous standards of NICE
might overlook.
2.0 and the NIST Framework
Proactive Defense: With AI at your disposal,
you’ll be equipped for proactive threat hunting, | Get the opportunity to be employed by top
anomaly detection, and predictive analysis to organizations including Fortune 500 companies,
prevent cyber-attacks before they happen. government, and private sector firms

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

What’s New in
The CEH v13

The C|EH v13 not only provides extensive hands-on coverage


but also integrates AI into all five phases of ethical hacking:

1 Reconnaissance
cal Hacking
Ethi
of

AI
s

2
se

Scanning
5 Pha

Hacking
AI and
Using AI 3 Gaining Access

4 Maintaining Access

5 Clearing Tracks

Get C|EH Trained from Anywhere with our World-Class Instructors

1. Live-Online
2. Self-Paced Video Lectures
3. In-Person training
4. Masterclass

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Master AI to Automate Ethical Hacking


Tasks, to hack and defend against
AI systems,
and boost your task efficiency by 40% in your job role.

Develop a Hacker’s Mindset: Learn AI Tools:


Master the 5 Phases
of Ethical Hacking • ShellGPT
and Gain AI Skills to • ChatGPT
Automate Them
• FraudGPT
1. Reconnaissance
• WormGPT
| Learn to gather essential
information about your target • DeepExploit
• Nebula
2. Vulnerability Scanning
| Gain the ability to identify • Veed.io
weaknesses in the target system
And many more!
3. Gaining Access
| Learn how to actively exploit
identified vulnerabilities

4. Maintaining Access
| Develop skills to maintain continued
access to the target systems

5. Clearing Tracks
| Master the art of erasing any
trace of your activities

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Learn to Hack Prompt Injection

AI Systems Insecure Output Handling

Based on OWASP’s Training Data Poisoning

Top 10 AI Attack Model Denial of Service

Vulnerabilities Supply Chain Vulnerabilities

and Threats Sensitive Information Disclosure

Insecure Plugin Design


In C|EH v13, you will not only master AI-driven
cybersecurity but also learn to hack AI systems. Excessive Agency
This comprehensive training equips you with
cutting-edge AI-driven skills, enhancing Overreliance
your ability to execute cybersecurity tasks
with up to 40% greater efficiency, while Model Theft
significantly boosting your productivity.

C|EH v13 Gain Skills Drive 40% efficiency in


cybersecurity tasks
to Battle AI Against Double your productivity
AI Your Ultimate with AI-driven methods

Training Ground for Master the application of


AI in cybersecurity
Mastering AI-driven Learn to hack AI systems
Cybersecurity Skills Explore multiple AI and GPT tools

C|EH v13 equips professionals with advanced Automate repetitive tasks


skills to enhance their hacking techniques
Detect advanced threats
and leverage AI. Gain the expertise to:
Make informed decisions using
AI-enhanced analysis

Adapt to evolving threats


through AI-driven learning

Improve reporting with


AI-powered insights

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Learn
CEH v13: The
World's First
1
Courseware
Cyber Range
Ethical Hacking Gain Skills

Certification with
a 4-Phase
AI-Powered
Learning Certify
Framework
2
Knowledge-Based
The C|EH v13 is a specialized, one-of-a- Practical Exam
kind training program that helps you gain Gain Recognition
expertise in ethical hacking, AI, and machine
learning. With hands-on training labs,
knowledge-based and practical exams, a
mock ethical hacking engagement on live
networks, and a global hacking competition,
this program ensures you master the most
in-demand skills needed to excel and
stand out in the cybersecurity industry.
Engage

3
This learning framework offers not only a Live Cyber Range
comprehensive training program to prepare
Gain Experience
you for the certification exam but also the
industry’s most robust, in-depth, hands-
on lab and practice range experience.

Master Ethical Hacking and AI Skills


That Go Beyond Certification

Compete

4
Global Ethical
Hacking Competition
Gain Respect

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Beat Hackers in their Own Game


with CEH v13! A Revolutionary
Way to Learn Ethical Hacking
1. Learn 3. Engage
20 modules 4000 hacking tools

2500+ pages of student manual 550 attack techniques

2000 pages of lab manual Conduct a real-world ethical


hacking assignment
Over 221 hands-on labs to practice
attack vectors and hacking tools Apply the 5 phases

AI integrated skills in the 5 phases of 1. Reconnaissance 4. Maintaining access


the ethical hacking framework
2. Scanning 5. Covering
Hacking AI system, based on the your tracks
3. Gaining access
Top 10 OWASP vulnerabilities

Over 4000 hacking and security tools

Learn how to hack multiple operating 4. Compete


systems (Windows 11, Windows
New challenges every month
servers, Linux, Ubuntu, Android)
4-hour CTF competition
More than 50% of training time
is dedicated to labs Compete with your peers worldwide

Hack your way to the top of the leaderboard

Focus on new attack vectors


2. Certify Exploit emerging vulnerabilities
Knowledge-Based Exam Challenges include:
(ANAB ISO 17024 and US DoD 8140)
o Ransomware o Web app hacking
4 hours and pen testing
o Web app
125 multiple-choice questions hardening o Reverse
engineering
o Unpatched
Practical Exam software o Cryptography
(ANAB ISO 17024 and US DoD 8140)
o System hacking o Encryption
6 hours o Service exploitation o Hacking
20 real scenario based questions cloud networks
o Incident response
o ICS/SCADA
o Forensic analysis

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Learn

Learn ethical hacking with


the revolutionary C|EH
v13—a game-changer for
aspiring ethical hackers.
With 20 cutting-edge modules, you’ll gain the
core skills needed to dominate the cybersecurity
landscape. C|EH isn’t just keeping pace—it’s leading
the charge, evolving with the latest operating
systems, exploits, tools, and hacking techniques
to ensure you’re always ahead of the curve.

Dive deep into the future of cybersecurity


with training that integrates AI into all five
phases of ethical hacking, reconnaissance
and scanning to gaining access, maintaining
access, and covering tracks. You’ll harness
the power of AI to supercharge your hacking
techniques and disrupt AI systems—giving
you 10x efficiency in your cybersecurity role.

CEH v13 isn’t just a certification; it’s a fully


immersive experience. CEH combines
comprehensive knowledge-based training
with immersive hands-on labs to ensure a Course Outline
well-rounded learning experience. You’ll
engage with live targets, tools, and
vulnerable systems in a controlled Get the AI edge with
environment, building real-world skills that 20 Power-packed
empower you to confidently apply your
Modules of the CEH v13
expertise in any scenario. Get ready to
transform the way you hack and
protect the digital world!

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker Learn

Learn Course Outline

Learn the fundamentals and key issues in information


Module 01
security, including the basics of ethical hacking, information
Introduction to Ethical Hacking
security controls, relevant laws, and standard procedures.

Learn how to use the latest techniques and tools


Module 02
for footprinting and reconnaissance, a critical
Footprinting and Reconnaissance
pre-attack phase of ethical hacking

Module 03 Learn different network scanning techniques


Scanning Networks and countermeasures.

Learn various enumeration techniques, including Border


Module 04
Gateway Protocol (BGP) and Network File Sharing
Enumeration
(NFS) exploits and associated countermeasures.

Learn how to identify security loopholes in a target


Module 05 organization’s network, communication infrastructure,
Vulnerability Analysis and end systems. Different types of vulnerability assessment
and vulnerability assessment tools are also included.

Learn about the various system hacking methodologies used


Module 06
to discover system and network vulnerabilities, including
System Hacking
steganography, steganalysis attacks, and how to cover tracks.

Learn about different types of malware (Trojan, viruses,


Module 07
worms, etc.), APT and fileless malware, malware analysis
Malware Threats
procedures, and malware countermeasures.

Learn about packet sniffing techniques and their


Module 08
uses for discovering network vulnerabilities, plus
Sniffing
countermeasures to defend against sniffing attacks.

Learn social engineering concepts and techniques,


Module 09
including how to identify theft attempts, audit human-level
Social Engineering
vulnerabilities, and suggest social engineering countermeasures.

Learn about different Denial of Service (DoS) and Distributed DoS


Module 10
(DDoS) attack techniques, plus the tools used to audit a target
Denial-of-Service
and devise DoS and DDoS countermeasures and protections.

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker Learn

Learn Course Outline

Learn the various session-hijacking techniques used to discover


Module 11
network-level session management, authentication, authorization,
Session Hijacking
and cryptographic weaknesses and associated countermeasures.

Module 12 Learn about firewalls, intrusion detection systems (IDS),


Evading IDS, Firewalls, and honeypot evasion techniques; the tools used to audit a
and Honeypots network perimeter for weaknesses; and countermeasures.

Learn about web server attacks, including a comprehensive


Module 13
attack methodology used to audit vulnerabilities in
Hacking Web Servers
web server infrastructures and countermeasures.

Learn about web application attacks, including a


Module 14
comprehensive hacking methodology for auditing
Hacking Web Applications
vulnerabilities in web applications and countermeasures.

Module 15 Learn about SQL injection attack techniques, evasion


SQL Injection techniques, and SQL injection countermeasures.

Learn about different types of encryption, threats,


Module 16
hacking methodologies, hacking tools, security tools,
Hacking Wireless Networks
and countermeasures for wireless networks.

Learn mobile platform attack vectors, Android and


Module 17
iOS hacking, mobile device management, mobile
Hacking Mobile Platforms
security guidelines, and security tools.

Learn different types of Internet of Things (IoT)


Module 18
and operational technology (OT) attacks, hacking
IoT Hacking
methodologies, hacking tools, and countermeasures.

Learn different cloud computing concepts, such as


Module 19 container technologies and serverless computing,
Cloud Computing various cloud computing threats, attacks, hacking
methodologies, and cloud security techniques and tools.

Learn about encryption algorithms, cryptography tools,


Module 20
Public Key Infrastructure (PKI), email encryption, disk
Cryptography
encryption, cryptography attacks, and cryptanalysis tools.

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker Learn

Hands-On Lab Environment


Learning Labs
Cloud-Based
With 221 hands-on labs in our cutting-edge Cyber Range
cyber range, you’ll practice every skill on
live machines and real-world vulnerabilities.
Armed with over 4,000 powerful hacking tools What’s Covered
and a range of operating systems, you’ll gain
unrivaled, practical expertise with the most
100% virtualization for a complete
widely used security tools, current vulnerabilities,
learning experience
and industry-standard operating systems.

Full access to pre-configured targets, networks,


This revolutionary environment brings
and the attack tools necessary to exploit them:
the industry’s top security tools and the
latest vulnerabilities to your fingertips, all
in a web-accessible platform. No matter Pre-configured vulnerable websites
where you are, you can dive into the real-
world experience and emerge as a force
to be reckoned with in cybersecurity. Vulnerable, unpatched operating systems

Fully networked environments

4000+ hacking tools and so much more!

Wide range of target platforms to hone your skills

550 attack techniques covered

Objective-oriented flags for critical thinking


and applied knowledge assessment

Cloud-based cyber range

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Certify

Prove Your Skills and


Abilities with Online,
Practical Examinations

CEH Exams: 4-hour


Knowledge-Based
Exam and 6-hour
Practical Exam.
In the C|EH v13, a student has the option
to attempt both the exams: a knowledge-
based exam and a practical exam for
the C|EH Master certification. Both these
exams are approved by the U.S. DoD 8140
and accredited by ANAB ISO/IEC 17024.

Industry practitioners meticulously vet


certification domains to align with current
industry demands. Each exam undergoes
rigorous psychometric evaluation,
ensuring a fair and accurate assessment
Certification
of your ethical hacking expertise. Outline
Achieving the C|EH certification and passing
both the knowledge-based and practical Knowledge Exam
exams earns you the prestigious C|EH Master 4 Hours
certification. This advanced recognition Multiple-Choice Exam
demonstrates not only your theoretical
Skills Exam
understanding but also your mastery of real-
6 Hours
world ethical hacking skills, proving you’re
ready to excel in any cybersecurity role.
20 Practical Challenges

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker Certify

CEH Knowledge-Based Exam


The CEH knowledge-based exam is a four-hour exam with 125 multiple-choice questions.
It will test your skills in information security threats, attack vectors, attack detection,
attack prevention, procedures, methodologies, and more! This exam is recognized
worldwide as the original and most trusted tactical cybersecurity certification exam.

Access our Exam Blueprint for CEH (Download Now)

CEH Practical Exam


The CEH Practical exam is the world’s first ethical hacking practical
exam to have ANAB and US DoD approval. The CEH Practical is a 6-hour,
100% hands-on exam delivered in our Cyber Range that requires you to
demonstrate the skills and abilities of ethical hacking techniques such as:

Port scanning tools (e.g., Nmap, Hping)

Vulnerability detection

Attacks on a system (e.g., DoS, DDoS, session hijacking, web server


and web application attacks, SQL injection, and wireless threats)

SQL injection methodology and evasion techniques

Web application security tools (e.g., Acunetix WVS)

SQL injection detection tools (e.g., IBM Security AppScan)

Communication protocols

In the CEH Practical, you have a limited time to complete 20 challenges


that test your proficiency in a performance-based cyber range.
This exam is NOT a simulation and incorporates a live corporate network
of VMs and applications with solutions to uncover vulnerabilities.

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker Certify

CEH Master
Upon successfully completing both the C|EH Knowledge-based Exam and the C|EH Practical
Exam, the C|EH (Master) designation is awarded. A C|EH (Master) signifies a high level of
proficiency in ethical hacking knowledge, skills, and abilities, with a total of 6 hours of testing to
prove their competency. The top 10 performers in both the C|EH Knowledge-based Exam and
C|EH Practical Exam are featured on the C|EH Master Global Ethical Hacking Leader Board.

The CEH Exams at a Glance

Exam Details CEH Knowledge Exam CEH Practical Exam

Number of Questions/
125 Questions 20 Practical Challenges
Practical Challenges

Test Duration 4 Hours 6 Hours

Test Format MCQ iLabs Cyber Range

Test Availability ECC Exam, Vue ASPEN, iLabs

312-50 (ECC Exam),


Exam Prefix -
312-50 (VUE)

Passing Score 60% - 85% 60% - 85%

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Engage

The C|EH v13 program immerses you in real-world ethical hacking through
the dynamic C|EH practice environment. With C|EH Engage, you’ll sharpen
your skills and prove you have what it takes to thrive as an ethical hacker.

New to C|EH v13, learners will embark on their first emulated ethical hacking
engagement. This four-phase engagement requires students to think critically
and test the knowledge and skills gained by capturing a series of flags in
each phase. It demonstrates the live application of skills and abilities in a
consequence-free environment through EC-Council’s new “Cyber Range.”

As you complete your training and labs, C|EH Engage empowers you to put
theory into practice through a mock hacking engagement. You’ll navigate a
real-world, four-part engagement, targeting an emulated organization. Using a
capture-the-flag format, you’ll progress by answering critical “flag” questions,
gaining hands-on experience in a full-scale ethical hacking operation.

Your Mission:
Whether this is your first engagement or you’re honing your skills, get
ready to test your ethical hacking knowledge like never before! Once
you’ve practiced through the hands-on guided labs, it’s time to apply your
knowledge, take on the hacker’s persona, and find the vulnerabilities and
weaknesses in the ABCD organization (fictitious organization, but with real
live networks)—all built within our C|EH Engage (practice range).

Target Organization Characteristics


o ABCDorg is a nationwide IT/ services support ABCDorg Operations
ITES organization
o Real networks, real operating
o Realistic segmented networks systems, and real applications

o Demilitarized zones (DMZs) o Private, dedicated access


and private subnets stretch — no shared resources
across the infrastructure to
o Fully automated network deployment
support various business units
with EC-Council’s Cyber Range
o Various application servers and
o 24x7 browser-based access

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker Engage

Objectives

Armed with your attack platform (Parrot OS) and a plethora of tools used by ethical hackers,
you will embark on a 4-part engagement to assess ABCDorg’s security posture. Follow the
process, practice your TTP, and experience the real thing in a controlled environment with
no consequences. It’s the ultimate learning experience to support your career as an ethical
hacker! Each phase builds on the last as you progress through your ABCDorg engagement.

Phase 1 Phase 2
Vulnerability assessment: Gaining access:

Footpringing & Reconnaissance System Hacking Social Engineering


Scanning Malware Threats Denial-of-Service
Enumeration Sniffing
Vulnerability Analysis

Phase 4 Phase 3
Mobile, IoT, OT Exploitation: Perimeter and Web App Exploitation:

Hacking Wireless IoT Hacking Session Hijacking Hacking Web


Networks OT Hacking Evading IDS Servers
Hacking Mobile Cloud Computing Firewalls Hacking Web
Platforms Applications
Cryptography Honeypots
SQL Injection

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Compete

True progress thrives on competition—it’s


what drives you to reach your full potential
and become the best in the game!
The C|EH global challenges takes place monthly, providing capture-the-flag style
competitions that give learners exposure to various new technologies and platforms, from
web applications, OT, IoT, SCADA, and ICS systems to cloud and hybrid environments.

You will compete against other ethical hackers in a fast-paced, four-hour event as
you climb the leaderboard in curated CTFs designed around the ethical hacking
process. Each objective-based flag sharpens your current skills, tests your critical
thinking, and covers the latest vulnerabilities and exploits. Hosted entirely online in
EC-Council’s advanced Cyber Range, these scenario-based engagements are
set in fully developed network and application environments with real operating
systems, networks, tools, and vulnerabilities. You’ll have the opportunity to practice,
engage, compete, build and hone your hacking techniques as you engage with new
target organizations, all while racing against the clock to prove your mastery.

CEH Global Challenges


Each month will present a different theme and challenge, with capture-the-flag-style
competitions focusing on ethical hackers’ core skills and abilities. Gain exposure to
new tools, focus on new attack vectors, and try to exploit emerging vulnerabilities while

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker Compete

New Challenges Every Month


Month Skill Challenge

September '24 Off-The ShelfOff-The-Shelf CMS Exploitation

October '24 Windows Wreckage: Unravelling Code & Hunting Threats

November '24 Web Warriors: Defend Against the OWASP Menace

December '24 Operation ATT&CK Unveil: Decoding Cyber Tactics

January '25 RansomWar: Battle for Decryption

February '25 Supply Chain Siege: Unravel the Hidden Links

March '25 Operation Nexus: Breach the Grid

April '25 Identity Infiltration: Breach the Directory

May '25 API Apocalypse: Breach the Gateways

June '25 Data Fortress Breach: Cracking the Core

July ‘25 Operation Deep Breach: Hack, Escalate, Pivot

August ‘25 eCommerce Rampage: Defend the Digital Marketplace

Sept ‘25 Cloud Clash: Battle for Infrastructure Security

Hack Your Way to the Top – Become the Name Everyone Knows!

As an ethical hacker, you will battle to the top of the monthly Ethical Hacking Leaderboards as
you race against the clock in these four-hour CTF challenges. The challenge is open all month
long, so compete when you’re ready! Leaderboards” as you race against the clock in these 4-hour
CTF challenges. The challenge is open all month long, so compete when you’re ready!

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker Compete

Pre-Requisites
You need only an internet connection, and can compete through your browser.
We provide the attack platform, targets and all the required tools. You bring the skills to win!

Chance to Earn Prestigious CEH


Compete Badges Each Month

Compete Examples (A Preview of Challenges)


Topic: Ransomware/Malware Analysis

Brief: You have been called in by a reputable MNC that was recently hit with malware.
This malware locked up their services and infected a slew of customers who were using their
software. The incident response team managed to extract some of the code. Now, your job
is to reverse-engineer the malware and identify encryption algorithms used, plus identify any
trace of command-and-control servers that may be helpful to law enforcement agencies.

Topic: Application Hardening

Brief: Your employer, a large financial institution, has suffered a breach where hackers were
able to inject code into a web application, exposing sensitive customer data. Your company
has faced tremendous scrutiny from the public and must pay fines to its regulators.
You have to perform a series of manual and automated tests against the web application to
identify weaknesses and provide recommended countermeasures to the app security team.

(Become an AI Powered Certified Ethical Hacker)

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Stay Ahead of
Emerging Threats:

New Focus Areas Active Directory Attacks


and Trends
in C|EH v13 Ransomware Attacks and Mitigation

AI and Machine Learning in Cybersecurity


Trained to think outside the box with a
hacker’s mindset, individuals who pursue
the Certified Ethical Hacker (C|EH) v13
Critical Infrastructure Vulnerabilities
thoroughly explore top OWASP attacks,
active directory breaches, the vulnerability
of traditional encryption to quantum
Extended Detection and Response (XDR)
computing, the growing ransomware
threat, and other emerging risks, equipping
learners with strategies to implement zero
trust architecture and other cybersecurity Quantum Computing Risks and Attacks
measures. C|EH v13 is comprehensive
with the latest knowledge, providing
cybersecurity professionals with the skills, Post-Quantum Cryptography
tools, techniques, and strategies to defend
against trending, modern, and complex
cyber threats effectively and efficiently. Deepfake Threats

Zero Trust Architecture

Cloud Security

IoT Security Challenges

Critical Infrastructure Vulnerabilities

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

CEH Skills Mapped To 49


Cybersecurity Job Roles
1. Mid-Level Information Security Auditor 26. Cyber Delivery Manager

2. Cybersecurity Auditor 27. Application Security Risk

3. Security Administrator 28. Threat Modelling Specialist

4. IT Security Administrator 29. Web Application Penetration Testing

5. Information Security Analyst 1 30. SAP Vulnerability Management


- Solution Delivery Advisor
6. Infosec Security Administrator
31. Ethical Hacker
7. Cybersecurity Analyst
(Level 1, Level 2, & Level 3)
32. SIEM Threat Responder
8. Network Security Engineer
33. Product Security Engineer / Manager
9. SOC Security Analyst
34. Endpoint Security Engineer
10. Network Engineer
35. Cybersecurity Instructor
11. Senior Security Consultant
36. Red Team Specialist
12. Information Security Manager
37. Data Protection & Privacy Officer
13. Senior SOC Analyst
38. SOAR Engineer
14. Solution Architect
39. AI Security Engineer
15. Cybersecurity Consultant
40. Sr. IAM Engineer
16. Cyber Defense Analyst
41. PCI Security Advisor
17. Vulnerability Assessment Analyst
42. Exploitation Analyst (EA)
18. Warning Analyst
43. Zero Trust Solutions Engineer / Analyst
19. All-Source Analyst
44. Cryptographic Engineer
20. Cyber Defense Incident Responder

21. Research & Development Specialist 45. AI/ML Security Engineer

22. Senior Cloud Security Analyst 46. Machine Learning Security Specialist

23. Third Party Risk Management: 47. AI Penetration Tester

24. Threat Hunting Analyst 48. AI/ ML Security Consultant

25. Penetration Ttester 49. Crypto Security Consultant

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

CEH v13 Training Information


Training: 5 days
Duration: 40 Hours

Training Options

iLearn (Self-Study)
This solution is an asynchronous, self-study
environment in a video-streaming format.

iWeek (Live Online)


This solution is an online, live training
course led by an instructor.

Master Class
This solution offers the opportunity
to learn from world-class instructors
and collaborate with top information
security professionals.

Training Partner (In Person)


This solution offers in-person
training so that you can benefit from
collaborating with your peers.

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

CEH Employed by Government


and Top Fortune 500
Companies Across the Globe
Why Top Cybersecurity Professionals Love CEH?

“Skills from the “Knowledge I gained “Helping organization


CEH program from CEH gave me the investigating
have evolved and confidence I needed SolarWinds hack,
are valuable.” to step into a role as a wouldn’t have
security engineer and been possible
penetration tester.” without CEH.”

Mauricio Fernandes Roy Davis Giulio Astori


Systems Architect, Security Engineer, Cyber Security Architect,
Cisco, USA Zoom, USA Microsoft, USA

“CEH was my first “CEH made me an “CEH helped me be


confidence booster authoritive expert on able to understand
and helped land security discussions exactly what I was
me a job on a with our clients.” doing once I finally
Red Team in the landed a role in the
government sector.” cybersecurity field.”

Farzan Karimi Kojo Donkor Lawan Cancer II


IT Security Manager, Security Architect, Security Analyst,
Google, USA Cisco, USA Morgan Stanley, USA

“CEH has helped me “While other “CEH develops a


to work on mobile certifications talk the “think outside the
devices and AppSec talk, CEH walks the box” approach that
- Pen testing and walk and is recognized you cannot get
reverse engineering.” by the department from other skills.”
of defense.”

John Packiaraj Michael Turner Felipe Munoz


Security Architect, Chief Security Engineer, IT Security Director,
Visa, USA Lockheed Martin, USA Oracle, USA

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

CEH v13 Recognition/


Endorsement/Mapping

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

Discover Why Organizations Worldwide


Trust the C|EH Certification
For 20 years, EC-Council’s cybersecurity Over 1 In Every 2 Professionals
programs have empowered cybersecurity Received Promotions After CEH
professionals around the world to exercise their
training and expertise to combat cyberattacks.
The CEH Hall of Fame celebrates those individuals 97% Stated That the Skills They Acquired In
who have excelled, achieved, and fostered a CEH Helped Safeguard Their Organizations
spirit of leadership among their colleagues
and peers within the cyber community.
97% Found That CEH Labs Accurately
Key Findings Reported by Thousands Mimic Real-World Cyber Threats
of Cybersecurity Professionals from
the CEH Hall of Fame Report:
95% Chose CEH For Career Growth

93% Said That CEH Skills Improved


Download CEH Their Organizational Security
Hall of Fame Report
92% Of Hiring Managers Prefer Candidates With
CEH For Jobs That Require Ethical Hacking Skills

92% Reported That CEH Boosted


Their Self-Confidence

88% Considered CEH Is the Most Comprehensive


Ethical Hacking Program in the Industry

85% Credited CEH With Helping Them Give


Back to The Cybersecurity Community

80% Started Their Cybersecurity


Careers with CEH

Certified Ethical Hacker v13 Brochure


The AI Powered Certified Ethical Hacker

About EC-Council
EC-Council’s sole purpose is to build and redefine
the cybersecurity profession globally.

We help individuals, organizations, educators, builds individual and organization-wide cyber


and governments address global workforce capabilities through our other programs as well,
problems by developing and curating world- including Certified Secure Computer User (CSCU),
class cybersecurity education programs and Computer Hacking Forensic Investigator (CHFI),
their corresponding certifications. We also Certified Security Analyst, Certified Network
provide cybersecurity services to some of the Defender (CND), Certified SOC Analyst (CSA),
largest businesses globally. Trusted by 7 of the Certified Threat Intelligence Analyst (CTIA),
Fortune 10, 47 of the Fortune 100, the Department Certified Incident Handler (ECIH), and the Certified
of Defense, the intelligence community, NATO, Chief Information Security Officer (CCISO). We are
and over 2,000 of the best universities, colleges, an ANAB ISO/IEC 17024 accredited organization
and training companies, our programs have and have earned recognition by the DoD under
certified people in over 140 countries, and set Directive 8140/8570 in the UK by the GCHQ,
the bar in the field of cybersecurity education. CREST, and various other authoritative bodies.
Best known for the Certified Ethical Hacker Founded in 2001, EC-Council employs over 400
(CEH) program, we are dedicated to equipping individuals worldwide, with ten global offices
over 380,000 information-age soldiers with the in the U.S., UK, Malaysia, Singapore, India, and
knowledge, skills, and abilities required to fight Indonesia. Our U.S. offices are in Albuquerque,
and win against cyber adversaries. EC-Council NM, and Tampa, FL. Learn more at eccouncil.org.

Certified Ethical Hacker v13 Brochure


WE DON’T JUST TEACH
ETHICAL HACKING

WE BUILD CYBER CAREERS

Attain the World’s No.1


Credential in Ethical Hacking,

Now Powered by AI

Visit: www.eccouncil.org/ceh

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy