Etsi koulutusta 👉

Certified Ethical Hacker (CEH) - online classroom (exam included)

Kesto
90 päivää
Hinta
2 250 EUR (arvonlisäverotonta)
Seuraava toteutus
Programme start: every month (ask us for dates) katso lisätiedot
Toteutustapa
Etätoteutus
Koulutuskieli
englanti
Kesto
90 päivää
Hinta
2 250 EUR (arvonlisäverotonta)
Seuraava toteutus
Programme start: every month (ask us for dates) katso lisätiedot
Toteutustapa
Etätoteutus
Koulutuskieli
englanti
alkaen 2 250 EUR (arvonlisäverotonta) / osallistuja

Certified Ethical Hacker (CEH) - online classroom (exam included)

We offer shorter online classroom sessions; 16:30/18:30

Programme start: every month (ask us for dates)

The CEH certification can help you advance in your security career. With this certification, you will learn how to identify and fix vulnerabilities in systems and networks. With CEH certification, you will be able to advance in your career and take on more responsibilities.

Accredited by:

CEH Certification - Certified Ethical Hacking course

Master Cybersecurity with EC Council's CEH course and accredited trainers

  • Learn advanced AI-driven processes and tools with the CEH v13 AI Certification course, designed by EC-Council.
  • Explore AI-driven threat detection and countermeasures to elevate your cybersecurity defences.
  • Master network packet analysis and system penetration testing to improve your network security skills and prevent cyber attacks.
  • This CEH certification course includes e-course materials and an exam voucher from EC-Council.

Overview of courses

AVC's CEH ethical hacking course offers hands-on experience to help you master techniques used by hackers to breach networks while learning how to strengthen your defences. Aligned with CEH v13 from EC-Council, the course equips you with advanced tools and methods to improve your cybersecurity skills in a changing threat landscape.

Online classroom course

  • 90 days of flexible access to online classroom sessions; at flexible times
  • Lifetime access to high-quality recordings of live courses
  • 24x7 help and support for participants.

Key features of the CEH training

  • The official CEH v13 Exam Voucher included
  • 6 months free access to CEHv13 AI Labs
  • Coverage of 20 key security domains
  • Accredited training partner of EC-Council
  • Access to the latest eCourseware material from EC-Council
  • Covers 340 attack technologies
  • Improve your skills with over 150 practical practice demos
  • Access the official CEHv13 AI Labs, with more than 4,000 integrated tools
  • Master five phases of ethical hacking integrated with AI-powered techniques
  • Learn AI-enhanced hacking skills with CEH v13 Guaranteed to run live sessions on specified dates
  • 8X higher interaction in live online classes conducted by industry experts.

Skills covered

  • Trojans, backdoors and defence strategies
  • Innovations in mobile and web security
  • AIP-driven analysis of network traffic
  • AI in vulnerability scanning and exploitation
  • Phishing detection and prevention
  • Cloud security and monitoring solutions
  • Cyber threat intelligence and response
  • Advanced hacking techniques with intelligent tools
  • AI-enhanced intrusion detection and prevention
  • Log management and threat detection
  • Simulations of attacks with social engineering
  • Malware analysis and remediation
  • Protection of wireless networks
  • Ethical hacking reporting and documentation

This Certified Ethical Hacking certification verifies the skills required to thrive in the information security domain.Many IT departments have made CEH mandatory for security-related positions.

About the course

The CEH v13 training course is designed to equip you with the essential skills and knowledge to pass the CEH exam on your first attempt. The CEH certification is globally recognised and proves your expertise in ethical hacking, network defence and threat mitigation, positioning you as a leader in cybersecurity and furthering your career in roles such as IT security, penetration testing and risk management.

CEH Training Plan

Lesson 1: Introduction to Ethical Hacking

Learn the basics and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws and standard operating procedures.

Lesson 2: Footprinting and reconnaissance

Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical phase before the attack of ethical hacking.

Lesson 3: Network scanning

Learn various network scanning techniques and countermeasures to identify active devices, services and vulnerabilities.

Lesson 4: Enumeration

Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures.

Lesson 5: Vulnerability Analysis

Learn how to identify security gaps in a target organisation's network and end systems. Different types of vulnerability assessments and tools are also included.

Lesson 6: System hacking methodology

Learn about the different system hacking methods used to detect system and network vulnerabilities, including techniques such as steganography and steganalysis attacks, and how to cover traces

Lesson 7: Malware threats and analysis

Learn about different types of malware, including Trojans, viruses and worms, as well as malware analysis procedures and countermeasures.

Lesson 8: Sniffing

Learn about packet sniffing techniques and how they are used to detect network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

Lesson 9: Social engineering

Learn social engineering concepts and techniques, including how to identify theft attempts, review human-level vulnerabilities, and propose social engineering countermeasures.

Lesson 10: Denial of Service

Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) techniques, as well as the tools used to audit a target and design countermeasures and protections against DoS and DDoS.

Lesson 11: Session hijacking

Learn the different session hijacking techniques used to detect weaknesses in session management, authentication, authorisation, and network-level cryptography, as well as associated countermeasures.

Lesson 12: Avoiding IDS, firewalls and honeypots

Learn about techniques to avoid firewalls, intrusion detection systems (IDS), and honeypots - the tools used to audit a network perimeter to detect weaknesses and countermeasures.

Lesson 13: Hacking web servers

Learn about web server attacks, including a comprehensive attack methodology used to audit web server infrastructure vulnerabilities and countermeasures

Lesson 14: Hacking Web Application Attacks

Learn about web application attacks, including a comprehensive hacking methodology used to review web application vulnerabilities and countermeasures

Lesson 15: SQL Injection

Learn about SQL injection attack techniques, evasion techniques, and countermeasures against SQL injections.

Lesson 16: Hacking wireless networks

Learn about different types of encryption, threats, hacking methodology, hacking tools, security tools and countermeasures for wireless networks.

Lesson 17: Hacking mobile platform attacks

Learn about mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines and security tools.

Lesson 18: IOT hacking

Learn different types of Internet of Things (IoT) and Operational Technology (OT) attacks, hacking methodology, hacking tools and countermeasures.

Lesson 19: Cloud Computing

Learn different cloud computing concepts, such as container technology and serverless computing, different threats to cloud computing, attacks, hacking methods, and cloud security techniques and tools.

Lesson 20: Cryptography

Learn about encryption algorithms, cryptography tools, public key infrastructure (PKI), email encryption, disc encryption, cryptographic attacks and cryptanalysis tools.

Skills covered

  • Mastery of ethical hacking techniques:Gain advanced skills in ethical hacking, including AI-powered automation for vulnerability scanning and threat detection.
  • AI-enhanced vulnerability scanning:Master AI-powered tools to automate vulnerability assessments, improving scanning accuracy and efficiency.
  • AI-based threat detection:Leverage AI to detect and respond to advanced threats like malware, ransomware, and zero-day exploits by analysing patterns and anomalies in real-time.
  • AI-powered incident management:Gain skills to automate incident detection and response processes using AI, reducing the time to detect and mitigate security breaches.
  • AI in network trace analysis:Use AI tools to monitor network traces, identify suspicious activities, and prevent potential breaches before they escalate.
  • AI-enabled defence against phishing and social engineering:Acquire skills in using AI to detect phishing attempts and social engineering attacks through real-time communication analysis.
  • AI in behavioural analytics:Monitor and analyse user behaviour using AI to detect anomalies that may indicate insider threats or compromised accounts.
  • AI-powered malware detection and analysis:Learn how to detect, classify, and neutralise malware using AI tools that recognise malicious patterns and behaviours.
  • AI for analysing and managing logs:Master AI-powered log management tools for real-time threat hunting and anomaly detection in network and system logs.

These AI-related skills prepare professionals to deal with modern cybersecurity challenges more effectively and provide them with the necessary tools to automate and improve security measures.

Outcomes of the programme

  • Mastery of ethical hacking techniques:Gain advanced skills in ethical hacking, including AI-powered automation for vulnerability scanning and threat detection.
  • AI-enhanced threat detection and mitigation:Learn how to use AI and machine learning for real-time threat analysis, improve response times, and minimise the impact of cyberattacks.
  • Advanced network and system security:Learn how to secure networks, applications, and operating systems with AI-powered solutions that neutralise sophisticated cyber threats.
  • Cloud and IoT security expertise:Develop skills to protect cloud infrastructures and IoT devices by applying AI-powered security measures and anomaly detection techniques
  • Incident response automation:Master the use of AI to automate incident response workflows, ensuring faster and more effective intrusion mitigation.
  • Hands-on experience with AI tools:Gain practical experience using AI-enhanced cybersecurity tools such as AI-powered SIEMs, firewalls, and penetration testing platforms.
  • Comprehensive compliance knowledge:Learn how to ensure compliance with data protection regulations using AI for continuous monitoring and reporting.
  • Enhanced defence against social engineering:Use AI tools to improve detection and defence against phishing and social engineering attacks, protecting your organisation's human factor.

These results reflect AI's evolving role in cybersecurity, ensuring that CEH v13 certified professionals are equipped with the latest tools and strategies to defend against modern cyber threats.

Trends in industry

  • Integration of AI and Machine Learning:CEH v13 emphasises the use of AI to enhance cybersecurity operations and positions you to take on roles that require expertise in AI-driven threat detection and response.
  • IoT and Endpoint Protection Skills: With IoT and remote working as the norm, CEH v13 gives you advanced skills to secure devices and networks, opening doors to roles in endpoint protection and IoT security.
  • Cloud and hybrid security expertise:As organisations increasingly move to cloud environments, CEH v13 gives you the knowledge to secure critical infrastructure, making you a valuable asset to any business leveraging cloud technology.

While certification itself may not guarantee a job, it is a valuable credential that can significantly improve your chances in a competitive job market. Combined with relevant experience and strong problem-solving skills, the CEH certification can be an influential asset in your career journey.

Career prospects

  • Integration of AI and machine learning:CEH v13 emphasises using AI to improve cybersecurity operations, positioning you to take on roles that require expertise in AI-driven threat detection and response.
  • Cloud and Hybrid Security Expertise:As organisations increasingly transition to cloud environments, CEH v13 gives you the knowledge to secure critical infrastructure, making you a valuable asset to any company leveraging cloud technology.
  • IoT and Endpoint Protection Skills:As IoT and remote working become the norm, CEH v13 gives you advanced skills to secure devices and networks, opening doors to roles in endpoint protection and IoT security.

While a certification by itself may not guarantee a job, it is a valuable credential that can significantly improve your chances in a competitive job market. Combined with relevant experience and strong problem-solving skills, the CEH certification can be an influential asset in your career journey.

Who should enrol in this course?

  • IT security professionals:Strengthen your expertise in ethical hacking and AI-driven cybersecurity to protect networks, detect vulnerabilities, and prevent cyberattacks in line with CEH v13 standards.
  • Penetration Testers and Ethical Hackers: Validate and develop your skills in simulating cyber attacks and identifying security flaws using advanced tools and techniques from CEH v13.
  • Cybersecurity consultants:Expand your knowledge of network defence strategies, AI-enhanced threat analysis, and ethical hacking practices to advise organisations on security best practices.
  • Network administrators and security engineers:Master the skills to assess, secure, and defend networks with AI-powered solutions, focusing on penetration testing, vulnerability management, and firewall protection.
  • Incident handlers and security analysts:Gain expertise in real-time threat detection, AI-driven analysis, and cyber incident response using the latest ethical hacking techniques covered in CEH v13.
  • IT managers and system administrators:Develop leadership to oversee cybersecurity operations, implement AI-enhanced defence strategies, and manage security teams to ensure your systems are protected.

Seuraavat toteutukset

Tulossa 1 toteutus

Programme start: every month (ask us for dates)

  • Etätoteutus
  • Verkossa
  • englanti

Ota yhteyttä

Request information

To receive more information, please fill in the form below (use English):

reCAPTCHA logo Tämä sivusto on suojattu reCAPTCHA:lla, ja Googlen tietosuojakäytäntö ja käyttöehdot ovat voimassa.
Adding Value Consulting AB
Luna House
Mannerheimvägen 12 B
00100 Helsingfors

Adding Value Consulting AB (AVC)

Adding Value Consulting (AVC) is a leading ATO (Accredited Training Organisation). We have introduced a large number of ‘Best Practice’ methods in the Nordic countries. We are experts in training and certification. Over the years, AVC has acquired extensive knowledge...

Lue lisää kouluttajasta Adding Value Consulting AB ja katso koulutustarjonta täältä

Sponsoroitu