EC-Council CEH: Certified Ethical Hacker v13

The EC-Council CEH: Certified Ethical Hacker v13 is a globally recognized certification program that equips professionals with advanced ethical hacking skills, now enhanced with AI-powered tools. It covers all five phases of ethical hacking, from reconnaissance to maintaining access, and integrates cutting-edge AI technologies to automate tasks and detect advanced threats.
Course Details

Price:

$3,550.00

Days:

1

Location:

Virtual

Course Overview

The EC-Council CEH: Certified Ethical Hacker v13 is a globally recognized certification program that equips professionals with advanced ethical hacking skills, now enhanced with AI-powered tools. It covers all five phases of ethical hacking, from reconnaissance to maintaining access, and integrates cutting-edge AI technologies to automate tasks and detect advanced threats.

– • Learn to gather essential information about your target
– • Gain the ability to identify weaknesses in the target system
– • Learn how to actively exploit identified vulnerabilities
– • Develop skills to maintain continued access to the target systems
– • Master the art of erasing any trace of your activities

• A minimum of 2 years of experience in IT security is strongly recommended before attempting CEH.
• Candidates should understand the basic functions of IT systems before attempting to hack them.
• CEH training involves testing systems and using them for purposes not originally intended.

• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• IoT Hacking
• IoT Hacking
• IoT Hacking
• IoT Hacking
• IoT Hacking
• IoT Hacking
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cryptography
• Cryptography
• Cryptography
• Cryptography
• Cryptography
• Cryptography

Class Dates & Times
Filters Sort results
Reset Apply
6/9/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,550.00
7/7/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,550.00
8/11/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,550.00
9/8/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,550.00
10/6/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,550.00
11/3/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,550.00
12/8/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,550.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.