Certified Ethical Hacker Training (CEHv13) Cybersecurity (exam included)
2.250,00 EUR
- 180 hours
AVC's CEH ethical hacking course offers hands-on experience to help you master techniques used by hackers to breach networks while learning how to strengthen your defences. Aligned with CEH v13 from EC-Council, the course equips you with advanced tools and methods to improve your cybersecurity skills in a changing threat landscape. The CEH certification can help you advance in your security career. With this certification, you will learn how to identify and fix vulnerabilities in systems and networks. With CEH certification, you will be able to advance in your career and take on more responsibilities.
Programme start every month
ask us for dates!
We offer shorter online classroom sessions
The CEH v13 training course is designed to equip you with the essential skills and knowledge to pass the CEH exam on your first attempt. The CEH certification is globally recognised and proves your expertise in ethical hacking, network defence and threat mitigation, positioning you as a leader in cybersecurity and furthering your career in roles such as IT security, penetration testing and risk management.
This Certified Ethical Hacking certification verifies the skills required to thrive in the information security domain. Many IT departments have made CEH mandatory for security-related positions.
Master Cybersecurity with EC Council's CEH course and accredited trainers
- Learn advanced AI-driven processes and tools with the CEH v13 AI Certification course, designed by EC-Council.
- Explore AI-driven threat detection and countermeasures to elevate your cybersecurity defences.
- Master network packet analysis and system penetration testing to improve your network security skills and prevent cyber attacks.
- This CEH certification course includes e-course materials and an exam voucher from EC-Council.
Key Features
Language
Course and material in English
Level
Intermediate - Advanced level for professional
40 hours of Live virtual classroom
Ask us for next live classroom session!
1 Year Access
to eLearning platform & Class recordings
Study Time
180 hours of recommended study time needed
Exam Included
The official CEH v13 Exam Voucher included
CEHv13 AI Labs
6 months free access to CEHv13 AI Labs with more than 4,000 integrated tools
Accredited training partner of EC-Council
Access to the latest eCourseware material from EC-Council
Covers 340 attack technologies
Improve your skills with over 150 practical practice demos

Learning Outcomes
This ethical hacking course will help you:
Mastery of ethical hacking techniques
Gain advanced skills in ethical hacking, including AI-powered automation for vulnerability scanning and threat detection.
AI-enhanced threat detection and mitigation
Learn how to use AI and machine learning for real-time threat analysis, improve response times, and minimise the impact of cyberattacks.
Advanced network and system security
Learn how to secure networks, applications, and operating systems with AI-powered solutions that neutralise sophisticated cyber threats.
Cloud and IoT security expertise
Develop skills to protect cloud infrastructures and IoT devices by applying AI-powered security measures and anomaly detection techniques
Incident response automation
Master the use of AI to automate incident response workflows, ensuring faster and more effective intrusion mitigation.
Hands-on experience with AI tools
Gain practical experience using AI-enhanced cybersecurity tools such as AI-powered SIEMs, firewalls, and penetration testing platforms.
Comprehensive compliance knowledge
Learn how to ensure compliance with data protection regulations using AI for continuous monitoring and reporting.
Enhanced defence against social engineering
Use AI tools to improve detection and defence against phishing and social engineering attacks, protecting your organisation's human factor.
Course timeline

- Introduction to Ethical Hacking - Lesson 01 - Lesson 01 - Information Security Overview - Lesson 02 - Information Security Threats and Attack Vectors - Lesson 06 - Penetration Testing Concepts - Lesson 03 - Hacking Concepts - Lesson 04 - Ethical Hacking Concepts - Lesson 05 - Information Security Controls - Lesson 07 - Information Security Laws and Standards 
- Footprinting and Reconnaissance - Lesson 02 - Lesson 01 - Footprinting Concepts - Lesson 02 - Footprinting through Search Engines - Lesson 03 - Footprinting through Web Services - Lesson 04 - Footprinting through Social Networking Sites - Lesson 05 - Website Footprinting - Lesson 06 - Email Footprinting - Lesson 07 - Competitive Intelligence - Lesson 08 - Whois Footprinting - Lesson 09 - DNS Footprinting - Lesson 10- Network Footprinting - Lesson 11- Footprinting through Social Engineering - Lesson 12 - Footprinting Tools - Lesson 13 - Countermeasures - Lesson 14 - Footprinting Pen Testing 
- Scanning Networks - Lesson 03 - Lesson 01 - Network Scanning Concepts - Lesson 02 - Scanning Tools - Lesson 03 - Scanning Techniques - Lesson 04 - Scanning Beyond IDS and Firewall - Lesson 05 - Banner Grabbing - Lesson 06 - Draw Network Diagrams - Lesson 07 - Scanning Pen Testing 
- Enumeration - Lesson 04 - Lesson 01 - Enumeration Concepts - Lesson 02 - NetBIOS Enumeration - Lesson 03 - SNMP Enumeration - Lesson 04 - LDAP Enumeration - Lesson 05 - NTP Enumeration - Lesson 06 - SMTP Enumeration and DNS Enumeration - Lesson 07 - Enumeration Countermeasures - Lesson 08 - Other Enumeration Techniques - Lesson 09 - Enumeration Pen Testing 
- Vulnerability Analysis - Lesson 05 - Lesson 01 - Vulnerability Assessment Concepts - Lesson 02 - Vulnerability Assessment Solutions - Lesson 03 - Vulnerability Scoring Systems - Lesson 04 - Vulnerability Assessment Tools - Lesson 05 - Vulnerability Assessment Reports 
- System Hacking - Lesson 06 - Lesson 01 - System Hacking Concepts - Lesson 02 - Cracking Passwords - Lesson 03 - Escalating Privileges - Lesson 04 - Executing Applications - Lesson 05 - Hiding Files - Lesson 06 - Covering Tracks - Lesson 07 - Penetration Testing 
- Malware Threats - Lesson 07 - Lesson 01 - Malware Concepts - Lesson 02 - Trojan Concepts - Lesson 03 - Virus and Worm Concepts - Lesson 04 - Malware Analysis - Lesson 05 - Countermeasures - Lesson 06 - Anti-Malware Software - Lesson 07 - Malware Penetration Testing 
- Sniffing - Lesson 08 - Lesson 01 - Sniffing Concepts - Lesson 02 - Sniffing Technique: MAC Attacks - Lesson 03 - Sniffing Technique: DHCP Attacks - Lesson 04 - Sniffing Technique: ARP Poisoning - Lesson 05 - Sniffing Technique: Spoofing Attacks - Lesson 06 - Sniffing Technique: DNS Poisoning - Lesson 07 - Sniffing Tools - Lesson 08 - Countermeasures - Lesson 09 - Sniffing Detection Techniques - Lesson 10 - Sniffing Pen Testing 
- Social Engineering - Lesson 09 - Lesson 01 - Social Engineering Concepts - Lesson 02 - Social Engineering Techniques - Lesson 03 - Insider Threats - Lesson 04 - Impersonation on Social Networking Sites - Lesson 05 - Identity Theft - Lesson 06 - Countermeasures - Lesson 07 - Social Engineering Penetration Testing 
- Denial-of-Service - Lesson 10 - Lesson 01 - DoS/DDoS Concepts - Lesson 02 - DoS/DDoS Attack Techniques - Lesson 03 - Botnets - Lesson 04 - DDoS Case Study - Lesson 05 - DoS/DDoS Attack Tools - Lesson 06 - Countermeasures - Lesson 07 - DoS/DDoS Protection Tools - Lesson 08 - DoS/DDoS Attack Penetration Testing 
- Session Hijacking - Lesson 11 - Lesson 01- Session Hijacking Concepts - Lesson 02- Application Level Session Hijacking - Lesson 03- Network Level Session Hijacking - Lesson 04- Session Hijacking Tools - Lesson 05- Countermeasures - Lesson 06- Penetration Testing 
- Evading IDS, Firewalls, and Honeypots - Lesson 12 - Lesson 01- IDS, Firewall, and Honeypot Concepts - Lesson 02- IDS, Firewall, and Honeypot Solutions - Lesson 03- Evading IDS - Lesson 04- Evading Firewalls - Lesson 05- IDS/Firewall Evading Tools - Lesson 06- Detecting Honeypots - Lesson 07- IDS/Firewall Evasion Countermeasures - Lesson 08- Penetration Testing 
- Hacking Web Servers - Lesson 13 - Lesson 01- Web Server Concepts - Lesson 02- Web Server Attacks - Lesson 03- Web Server Attack Methodology - Lesson 04- Web Server Attack Tools - Lesson 05- Countermeasures - Lesson 06- Patch Management - Lesson 07- Web Server Security Tools - Lesson 08- Web Server Pen Testing 
- Hacking Web Applications - Lesson 14 - Lesson 01 - Web App Concepts - Lesson 02 - Web App Threats - Lesson 03 - Hacking Methodology - Lesson 04 - Web Application Hacking Tools - Lesson 05 - Countermeasures - Lesson 06 - Web App Security Testing Tools - Lesson 07 - Web App Pen Testing 
- SQL Injection - Lesson 15 - Lesson 01 - SQL Injection Concepts - Lesson 02 - Types of SQL Injection - Lesson 03 - SQL Injection Methodology - Lesson 04 - SQL Injection Tools - Lesson 05 - Evasion Techniques - Lesson 06 - Countermeasures 
- Hacking Wireless Networks - Lesson 16 - Lesson 01 - Wireless Concepts - Lesson 02 - Wireless Encryption - Lesson 03 - Wireless Threats - Lesson 04 - Wireless Hacking Methodology - Lesson 05 - Wireless Hacking Tools - Lesson 06 - Bluetooth Hacking - Lesson 07 - Countermeasures - Lesson 08 - Wireless Security Tools - Lesson 09 - Wi-Fi Pen Testing 
- Hacking Mobile Platforms - Lesson 17 - Lesson 01- Mobile Platform Attack Vectors - Lesson 02- Hacking Android OS - Lesson 03- Hacking iOS - Lesson 04- Mobile Spyware - Lesson 05- Mobile Device Management - Lesson 06- Mobile Security Guidelines and Tools - Lesson 07- Mobile Pen Testing 
- IoT Hacking - Lesson 18 - Lesson 01 - IoT Concepts - Lesson 02 - IoT Attacks - Lesson 03 - IoT Hacking Methodology - Lesson 04 - IoT Hacking Tools - Lesson 05 - Countermeasures - Lesson 06 - IoT Pen Testing 
- Cloud Computing - Lesson 19 - Lesson 01 - Cloud Computing Concepts - Lesson 02 - Cloud Computing Threats - Lesson 03 - Cloud Computing Attacks - Lesson 04 - Cloud Security - Lesson 05 - Cloud Security Tools - Lesson 06 - Cloud Penetration Testing 
- Cryptography - Lesson 20 - Lesson 01 - Cryptography Concepts - Lesson 02 - Encryption Algorithms - Lesson 03 - Cryptography Tools - Lesson 04 - Public Key Infrastructure (PKI) - Lesson 05 - Email Encryption - Lesson 06 - Disk Encryption - Lesson 07 - Cryptanalysis - Lesson 08 - Countermeasures 
Skills Covered
- Trojans, backdoors and defence strategies
- Innovations in mobile and web security
- AIP-driven analysis of network traffic
- AI in vulnerability scanning and exploitation
- Phishing detection and prevention
- Cloud security and monitoring solutions
- Cyber threat intelligence and response
- Advanced hacking techniques with intelligent tools
- AI-enhanced intrusion detection and prevention
- Log management and threat detection
- Simulations of attacks with social engineering
- Malware analysis and remediation
- Protection of wireless networks
- Ethical hacking reporting and documentation

Who Should Enroll in this Program?
There are no specific eligibility criteria for Certified Ethical Hacker (CEH) training and certification, but we recommend a basic knowledge of TCP/IP.
Network security officers and practitioners
Site administrators
IS/IT security specialist, analyst, architect, administrator or manager
IS/IT auditor or consultant
IT security officer, auditor, or engineer
IT operation manager
Network specialist, analyst, manager
Technical support engineer
System analyst or administrator
Trends in industry
- Integration of AI and Machine Learning: CEH v13 emphasises the use of AI to enhance cybersecurity operations and positions you to take on roles that require expertise in AI-driven threat detection and response.
- IoT and Endpoint Protection Skills: With IoT and remote working as the norm, CEH v13 gives you advanced skills to secure devices and networks, opening doors to roles in endpoint protection and IoT security.
- Cloud and hybrid security expertise: As organisations increasingly move to cloud environments, CEH v13 gives you the knowledge to secure critical infrastructure, making you a valuable asset to any business leveraging cloud technology.
While certification itself may not guarantee a job, it is a valuable credential that can significantly improve your chances in a competitive job market. Combined with relevant experience and strong problem-solving skills, the CEH certification can be an influential asset in your career journey.
Statements
Licensing and accreditation
Certified Etchical Hacker Training course is offered by Simplilearn according to Partner Program Agreement and complies with the License Agreement requirements. AVC Promotes this course on behalf of Simplilearn.
Equity Policy
Simplilearn does not provide accommodations due to a disability or medical condition of any students. Candidates are encouraged to reach out to AVC for guidance and support throughout the accommodation process.
Frequently Asked Questions

Need corporate solutions or LMS integration?
Didn't find the course or program which would work for your business? Need LMS integration? Write us, we will solve everything!

