Back

Certified Ethical Hacker V13 (CEH)

Course Description

The CEH v13 course covers 20 core modules that teach students advanced ethical hacking techniques. These modules include network scanning, system hacking, web application hacking, and mobile device hacking. Students will learn how to identify vulnerabilities, exploit them ethically, and implement countermeasures to secure systems.

The course also integrates AI-driven tools and techniques to enhance cybersecurity skills—most relevant skill to have today. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organisations and strengthen their security controls in order to minimise the risk of a malicious attack.

Download Brochure

    Recognitions

    WingsWay Training Institute, a globally recognised and trusted training centre, ensures you receive top-quality education and recognition for your efforts. Our commitment to delivering exceptional private education in Dubai has earned us the endorsement of the Knowledge and Human Development Authority (KHDA) and ISO 9001:2015 certification from the International Accreditation Forum (IAF).

    Furthermore, WingsWay Training Institute proudly received the title of ‘Best Training Institute’ twice and the ‘Outstanding Organisation Award.’ Our services and training quality have not only been recognised by students in over 80 countries but also by top international organisations.

    Course Content

    Unit 1 – Introduction to Ethical Hacking

    • Fundamentals of Information security
    • Basics of ethical hacking
    • Basics of laws
    • Standard procedures

    Unit 2 – Footprinting and Reconnaissance

    • Latest techniques and tools for footprinting and reconnaissance.

    Unit 3 – Scanning Networks

    • Network scanning techniques and countermeasures.

    Unit 4 – Enumeration

    • Enumeration techniques

    Unit 5 – Vulnerability Analysis

    • How to identify security loopholes in a target organisation’s network.
    • Communication infrastructure and end systems.
    • Vulnerability assessment and vulnerability assessment tools.

    Unit 6 – System Hacking

    • System hacking methodologies used to discover system.
    • Network vulnerabilities, attacks, and how to cover tracks.

    Unit 7 – Malware Threats

    • Different types of malwares
    • APT and fileless malware
    • Malware analysis procedures
    • Malware countermeasures

    Unit 8 – Sniffing

    • Packet sniffing techniques
    • Packet sniffing techniques to discover network vulnerabilities.
    • Countermeasures to defend against sniffing attacks.

    Unit 9 – Social Engineering

    • Social engineering concepts and techniques
    • How to identify theft attempts
    • Audit human-level vulnerabilities
    • Social engineering countermeasures

    Unit 10 – Denial-of-Service

    • Denial of Service (DoS) attack techniques.
    • Distributed DoS (DDoS)
    • How to audit a target and devise DoS and DDoS countermeasures and protections.

    Unit 11 – Session Hijacking

    • Session-hijacking techniques

    Unit 12 – Evading IDS, Firewalls, and Honeypots

    • Firewalls
    • Intrusion detection systems (IDS)
    • Honeypot evasion techniques

    Unit 13 – Hacking Web Servers

    • Web server attacks
    • Attack methodology

    Unit 14 – Hacking Web Applications

    • Web application attacks
    • Hacking methodology

    Unit 15 – SQL Injection

    • What is SQL injection?
    • SQL injection attack techniques
    • Evasion techniques
    • SQL injection countermeasures

    Unit 16 – Hacking Wireless Networks

    • Types of encryptions
    • Types of threats
    • Types of hacking methodologies and tools
    • Security tools
    • Countermeasures for wireless networks

    Unit 17 – Hacking Mobile Platforms

    • Mobile platform attack vectors
    • Android and iOS hacking
    • Mobile device management
    • Mobile security guidelines
    • Security tools

    Unit 18 – IoT Hacking

    • Types of Internet of Things (IoT)
    • Types of operational technology (OT) attacks
    • Hacking methodologies and tools

    Unit 19 – Cloud Computing

    • Cloud computing concepts
    • Cloud computing threats and attacks
    • Hacking methodologies
    • Cloud security techniques and tools.

    Unit 20 – Cryptography

    • Encryption algorithms
    • Cryptography tools
    • Public Key Infrastructure (PKI)
    • Email encryption
    • Disk encryption
    • Cryptography attacks
    • Cryptanalysis tools

    Entry Qualification

    To enroll in the Certified Ethical Hacker (CEH) v13 course, there are no strict entry qualifications. However, it is recommended that participants have a basic understanding of networking and information security concepts, such as:

    • Familiarity with TCP/IP, OSI model, and basic networking concepts.
    • Knowledge of Windows, Linux, and other operating systems.
    • Basic understanding of security principles, vulnerabilities, and threats.
    • While not mandatory, having some experience in IT or networking can be beneficial.

    Course Duration

    • 40 hours

    Learner’s Profile

    This course is suitable for:

    • IT Professionals
    • Security Enthusiasts
    • Professionals looking for a career switch
    • Those studying computer science, IT, or related fields.
    • Penetration Testers
    • Cybersecurity Consultants
    • Government and Defense Personnel in the cyber security department
    Certified Ethical Hacker

    Key Topics

    • AI for threat detection, predicting security breaches, and responding to cyber incidents.
    • Secure AI-driven technologies against potential threats.
    • Combining ethical hacking and AI capabilities.

    Career Opportunities

    • Ethical Hacker
    • Penetration Tester
    • Cybersecurity Analyst
    • Security Consultant
    • Security Engineer
    • Incident Response Specialist
    • Vulnerability Analyst
    • Computer Forensics Investigator
    • Network Security Engineer
    • Data Security Analyst

    Read More

    HRIS vs. Traditional HR

    HRIS vs. Traditional HR Systems: Why Certification Matters

    Imagine it’s the end of the month. You work in the HR team in your organisation and you need to process payroll for 500 employees....
    Read More »
    A man sitting in front of a laptop with digital contact cards popping out of the screen in front of him

    5 HR Trends You Can’t Ignore – Learn Them With the Best HRM Course

    The HR landscape of 2025 bears little resemblance to its administrative origins. What began as a function focused on recruitment and paperwork has transformed into...
    Read More »
    An AI robot managing boxes of orders in a supply chain warehouse.

    Artificial Intelligence in Supply Chain Management in 2025

    It’s Friday night. You’re hungry, craving a hot pizza, and you place an order online. On the app, you can see when your order is...
    Read More »