Certified Ethical Hacker V13 (CEH)
Course Description
The CEH v13 course covers 20 core modules that teach students advanced ethical hacking techniques. These modules include network scanning, system hacking, web application hacking, and mobile device hacking. Students will learn how to identify vulnerabilities, exploit them ethically, and implement countermeasures to secure systems.
The course also integrates AI-driven tools and techniques to enhance cybersecurity skills—most relevant skill to have today. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organisations and strengthen their security controls in order to minimise the risk of a malicious attack.
Download Brochure
Recognitions
WingsWay Training Institute, a globally recognised and trusted training centre, ensures you receive top-quality education and recognition for your efforts. Our commitment to delivering exceptional private education in Dubai has earned us the endorsement of the Knowledge and Human Development Authority (KHDA) and ISO 9001:2015 certification from the International Accreditation Forum (IAF).
Furthermore, WingsWay Training Institute proudly received the title of ‘Best Training Institute’ twice and the ‘Outstanding Organisation Award.’ Our services and training quality have not only been recognised by students in over 80 countries but also by top international organisations.
Course Content
Unit 1 – Introduction to Ethical Hacking
- Fundamentals of Information security
- Basics of ethical hacking
- Basics of laws
- Standard procedures
Unit 2 – Footprinting and Reconnaissance
- Latest techniques and tools for footprinting and reconnaissance.
Unit 3 – Scanning Networks
- Network scanning techniques and countermeasures.
Unit 4 – Enumeration
- Enumeration techniques
Unit 5 – Vulnerability Analysis
- How to identify security loopholes in a target organisation’s network.
- Communication infrastructure and end systems.
- Vulnerability assessment and vulnerability assessment tools.
Unit 6 – System Hacking
- System hacking methodologies used to discover system.
- Network vulnerabilities, attacks, and how to cover tracks.
Unit 7 – Malware Threats
- Different types of malwares
- APT and fileless malware
- Malware analysis procedures
- Malware countermeasures
Unit 8 – Sniffing
- Packet sniffing techniques
- Packet sniffing techniques to discover network vulnerabilities.
- Countermeasures to defend against sniffing attacks.
Unit 9 – Social Engineering
- Social engineering concepts and techniques
- How to identify theft attempts
- Audit human-level vulnerabilities
- Social engineering countermeasures
Unit 10 – Denial-of-Service
- Denial of Service (DoS) attack techniques.
- Distributed DoS (DDoS)
- How to audit a target and devise DoS and DDoS countermeasures and protections.
Unit 11 – Session Hijacking
- Session-hijacking techniques
Unit 12 – Evading IDS, Firewalls, and Honeypots
- Firewalls
- Intrusion detection systems (IDS)
- Honeypot evasion techniques
Unit 13 – Hacking Web Servers
- Web server attacks
- Attack methodology
Unit 14 – Hacking Web Applications
- Web application attacks
- Hacking methodology
Unit 15 – SQL Injection
- What is SQL injection?
- SQL injection attack techniques
- Evasion techniques
- SQL injection countermeasures
Unit 16 – Hacking Wireless Networks
- Types of encryptions
- Types of threats
- Types of hacking methodologies and tools
- Security tools
- Countermeasures for wireless networks
Unit 17 – Hacking Mobile Platforms
- Mobile platform attack vectors
- Android and iOS hacking
- Mobile device management
- Mobile security guidelines
- Security tools
Unit 18 – IoT Hacking
- Types of Internet of Things (IoT)
- Types of operational technology (OT) attacks
- Hacking methodologies and tools
Unit 19 – Cloud Computing
- Cloud computing concepts
- Cloud computing threats and attacks
- Hacking methodologies
- Cloud security techniques and tools.
Unit 20 – Cryptography
- Encryption algorithms
- Cryptography tools
- Public Key Infrastructure (PKI)
- Email encryption
- Disk encryption
- Cryptography attacks
- Cryptanalysis tools
Entry Qualification
To enroll in the Certified Ethical Hacker (CEH) v13 course, there are no strict entry qualifications. However, it is recommended that participants have a basic understanding of networking and information security concepts, such as:
- Familiarity with TCP/IP, OSI model, and basic networking concepts.
- Knowledge of Windows, Linux, and other operating systems.
- Basic understanding of security principles, vulnerabilities, and threats.
- While not mandatory, having some experience in IT or networking can be beneficial.
Course Duration
- 40 hours
Learner’s Profile
This course is suitable for:
- IT Professionals
- Security Enthusiasts
- Professionals looking for a career switch
- Those studying computer science, IT, or related fields.
- Penetration Testers
- Cybersecurity Consultants
- Government and Defense Personnel in the cyber security department
Key Topics
- AI for threat detection, predicting security breaches, and responding to cyber incidents.
- Secure AI-driven technologies against potential threats.
- Combining ethical hacking and AI capabilities.
Career Opportunities
- Ethical Hacker
- Penetration Tester
- Cybersecurity Analyst
- Security Consultant
- Security Engineer
- Incident Response Specialist
- Vulnerability Analyst
- Computer Forensics Investigator
- Network Security Engineer
- Data Security Analyst