COURSES
EC Council

OUR COURSES SERIES
EC Council Course Directory
312-50: Certified Ethical Hacker (CEH) v13
| Course Name | Course Type | Syllabus |
|---|---|---|
| CEH v13: Cryptography | Course | View details Course Syllabus | Print Syllabus CEH v13: CryptographyOverview/Description: Cryptography is a fundamental aspect of cybersecurity that helps ensure data confidentiality, integrity, and authentication. In this course, learn about fundamental cryptographic concepts, how cryptography protects sensitive information from unauthorized access, and how attackers attempt to break encryption through various cryptanalysis techniques. Next, explore various encryption methods, secure key management, digital certificates, and best practices for protecting encrypted data. Finally, identify cryptographic vulnerabilities, analyze encryption techniques, perform cryptanalysis, and apply security measures to protect sensitive information from unauthorized access and cyber threats.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_20_enus |
| CEH v13: Denial of Service (DoS) | Course | View details Course Syllabus | Print Syllabus CEH v13: Denial of Service (DoS)Overview/Description: Denial of service (DoS) attacks pose a significant cybersecurity threat as they can disrupt networks, websites, and applications by overwhelming them with excessive traffic. In this course, explore various DoS techniques, including flood attacks, botnets, and response manipulation attacks, along with distributed denial of service (DDoS) attacks, their impact, and attacker motivations. Next, learn how to detect, analyze, and mitigate threats using advanced security tools and examine modern AI-driven DoS defense mechanisms and best practices for securing critical infrastructures. Finally, discover how to identify DoS and DDoS attack vectors, implement mitigation strategies, configure defensive tools, and strengthen network resilience against disruptive cyber threats.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_10_enus |
| CEH v13: Enumeration Techniques | Course | View details Course Syllabus | Print Syllabus CEH v13: Enumeration TechniquesOverview/Description: Enumeration is a critical phase in ethical hacking where attackers gather active information about a target system. In this course, you will learn various enumeration techniques used to extract usernames, network shares, services, and system vulnerabilities from a network.Explore different enumeration tools and techniques, including the use of Network Basic Input/Output System (NetBIOS), Simple Network Management Protocol (SNMP), and many more. Learn how to perform banner grabbing and other tasks using tools such as Network Mapper (Nmap) and Metasploit. At the end of this course, you will have a comprehensive understanding of enumeration, enabling you to identify system vulnerabilities and strengthen cybersecurity defenses against potential attacks.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_04_enus |
| CEH v13: Evading IDS Firewalls and Honeypots | Course | View details Course Syllabus | Print Syllabus CEH v13: Evading IDS Firewalls and HoneypotsOverview/Description: Intrusion Detection Systems (IDS), firewalls, and honeypots are essential security mechanisms used to detect and prevent cyber threats. In this course, learn how attackers bypass these defenses using evasion techniques. Understand how these security tools work to identify their limitations and weaknesses. Next, explore advanced evasion methods, including firewall, honeypot detection techniques. Hands-on demonstrations with tools like Nmap, Metasploit will showcase how attackers stealthily infiltrate networks. Finally, discover how to identify evasion tactics used by attackers, analyze security system vulnerabilities, and implement measures to enhance network security against stealthy cyber threats.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_12_enus |
| CEH v13: Footprinting | Course | View details Course Syllabus | Print Syllabus CEH v13: FootprintingOverview/Description: Footprinting is the foundation of cybersecurity assessments, allowing ethical hackers and security professionals to understand an organizations attack surface. In this course, learn about the concepts of footprinting and reconnaissance, the types of footprinting techniques, and the methodologies of reconnaissance that are used for attacks. Next, explore how to perform footprinting using various tools, social engineering reconnaissance strategies, and DNS footprinting methods. Finally, discover how to use AI tools to automate footprinting, execute footprinting using the Shodan tool, and utilize the Whois lookup tool.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_02_enus |
| CEH v13: Hacking Mobile Platforms | Course | View details Course Syllabus | Print Syllabus CEH v13: Hacking Mobile PlatformsOverview/Description: As mobile device usage grows, hackers increasingly target smartphones and tablets to find weaknesses in apps, operating systems, and network connections. In this course, learn about mobile security, focusing on Android and iOS systems, common attack methods, security risks, and also about threats and dangers of using unsecured Wi-Fi networks. Next, explore different mobile hacking techniques, such as breaking into weak apps, unlocking security barriers, and gaining higher access to devices. Additionally, learn about mobile device management (MDM), safe coding methods, and protective measures. Finally, identify mobile security threats, find weaknesses in Android and iOS apps, and apply steps to protect mobile devices from cyberattacks.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_17_enus |
| CEH v13: Hacking Web Applications | Course | View details Course Syllabus | Print Syllabus CEH v13: Hacking Web ApplicationsOverview/Description: Web applications are prime targets for cyber attackers due to their widespread accessibility and extensive data handling capabilities. In this course, explore common web application vulnerabilities, such as SQL injections, cross-site scripting (XSS), and weak authentication mechanisms. Learn web application hacking techniques that target weaknesses in input validation, session management, and access controls. Additionally, learn about security best practices, including input sanitization, secure coding, and the use of web application firewalls (WAFs) to enhance application security. Finally, discover how to identify web application security flaws, analyze attack techniques, and implement protective measures to secure web applications from cyber threats.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_14_enus |
| CEH v13: Hacking Web Servers | Course | View details Course Syllabus | Print Syllabus CEH v13: Hacking Web ServersOverview/Description: Web servers are prime targets for cybercriminals due to the critical data they store and process. In this course, learn how attackers exploit vulnerabilities in web servers, misconfigurations, and weak authentication mechanisms to gain unauthorized access. Topics such as directory traversal, misconfigured permissions, and unpatched vulnerabilities will be covered to understand common attack vectors. Next, explore various web server hacking techniques and how to use tools to identify and exploit security flaws. Finally, identify web server vulnerabilities, analyze attack methodologies, and implement security measures to protect web servers from unauthorized access and exploitation.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_13_enus |
| CEH v13: Hacking Wireless Networks | Course | View details Course Syllabus | Print Syllabus CEH v13: Hacking Wireless NetworksOverview/Description: Wireless networks are a prime target for attackers due to the potential for weak encryption, misconfigurations, and rogue access points. In this course, explore various wireless hacking techniques such as packet sniffing and WAP (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access 2) cracking. Learn how to use tools like aircrack-ng and hashcat to analyze and exploit wireless networks. Next, discover countermeasures to mitigate these threats, such as secure encryption protocols, intrusion detection systems, and best security practices. Finally, you will be able to identify and exploit wireless network vulnerabilities, perform penetration testing on Wi-Fi networks, and implement effective security measures to protect wireless environments.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_16_enus |
| CEH v13: Introduction to Ethical Hacking | Course | View details Course Syllabus | Print Syllabus CEH v13: Introduction to Ethical HackingOverview/Description: In today’s digital landscape cyber threats are growing, hence ethical hacking has become an important skill for cybersecurity professionals. Cybersecurity plays a critical role in protecting sensitive data, systems, and networks from malicious threats. Ethical hacking, a subset of cybersecurity, involves identifying and addressing vulnerabilities before malicious hackers can exploit them. This course starts by explaining fundamental security concepts, including vulnerabilities, threats, hacking, and risk assessment. You will explore various types of hackers and go into ethical hacking methodologies, including the setup of essential tools like Kali Linux and Burp Suite. Additionally, you will learn about the importance of complying with security laws and standards. The course also covers AI-driven ethical hacking approaches and the threat intelligence lifecycle, providing you with a comprehensive understanding of both traditional and modern cybersecurity defense techniques. This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_01_enus |
| CEH v13: IoT and OT Hacking | Course | View details Course Syllabus | Print Syllabus CEH v13: IoT and OT HackingOverview/Description: With the rise of smart devices and industrial automation, the security of the Internet of Things (IoT) and Operational Technology (OT) has become a major concern.In this course, learn about the fundamentals of IoT and OT security, including common threats like device misconfigurations, weak authentication, and insecure network connections that attackers exploit. Next, explore hacking techniques used to compromise IoT and OT environments, including firmware analysis, exploit development, and bypassing authentication mechanisms. Finally, discover security best practices, encryption techniques, and network segmentation to protect IoT and OT systems, as well as how to identify threats, analyze vulnerabilities, and implement measures to secure smart and industrial environments from cyberattacks.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_18_enus |
| CEH v13: Malware Threats | Course | View details Course Syllabus | Print Syllabus CEH v13: Malware ThreatsOverview/Description: Performing proper malware threat detection and mitigation is vital in cybersecurity as it helps enable organizations to protect their systems and data.In this course, learn about malware, advanced persistent threats (APTs), Trojans, viruses, ransomware, and fileless and AI-based malware. Next, explore malware detection techniques, the importance of AI in cybersecurity, and the application of natural language processing (NLP) in AI-powered attacks. Finally, discover how to perform static and dynamic malware analysis using various tools and methodologies and examine famous case studies about previous malware attacks.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_07_enus |
| CEH v13: Scanning | Course | View details Course Syllabus | Print Syllabus CEH v13: ScanningOverview/Description: In the ever-evolving landscape of cybersecurity, network scanning plays a pivotal role in identifying vulnerabilities before malicious actors exploit them.In this course, learn about the various types and uses of scanning in cybersecurity, network and port scanning, TCP/IP communication, and the three-way handshake. Next, discover how to perform OS and host discovery with AI tools like ShellGPT and the key approaches for bypassing IDS/IPS. Finally, explore common scanning tools such as Nmap, Nessus, Nikto, OpenVAS, Wireshark, Angry IP Scanner, and Netcat.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_03_enus |
| CEH v13: Session Hijacking | Course | View details Course Syllabus | Print Syllabus CEH v13: Session HijackingOverview/Description: Session hijacking is a cyberattack where an attacker takes control of a valid session between a user and a system. In this course, discover what session hijacking is, its process, and the different types of session hijacking attacks, as well as the difference between spoofing and hijacking, and OSI model session hijacking. Next, learn about application-level and network-level session hijacking, techniques attackers use to predict session tokens, and common attack methods. Finally, explore techniques for protecting against session hijacking, the tools used in session hijacking, and how to perform session hijacking using Cookie-Editor and cross-site scripting.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_11_enus |
| CEH v13: Sniffing | Course | View details Course Syllabus | Print Syllabus CEH v13: SniffingOverview/Description: Sniffing is a critical phase in cybersecurity used to identify network vulnerabilities and prevent attacks that can compromise sensitive data.In this course, learn about sniffing attacks, how packet sniffing works, the different types of sniffing attacks, and how attackers exploit vulnerabilities in network communication to eavesdrop on data. Next, explore sniffing tools like Wireshark and tcpdump, which help ethical hackers analyze captured packets, detect anomalies, and understand how attackers manipulate network traffic. Finally, examine MITM (man-in-the-middle) attacks, ARP spoofing, and DNS poisoning, which allow attackers to intercept or alter communications between victims.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_08_enus |
| CEH v13: Social Engineering | Course | View details Course Syllabus | Print Syllabus CEH v13: Social EngineeringOverview/Description: Social engineering attacks exploit human psychology to gain unauthorized access to systems and sensitive information. In this course, learn about common social engineering techniques, such as phishing and impersonation, as well as tools like phishing simulators, AI-powered deepfake attacks, and social media-based exploitation to understand how cybercriminals deceive victims. Next, explore real-world social engineering attacks, how attackers exploit things to bypass security defenses, and preventive measures, including awareness training, multi-factor authentication, and email filtering to strengthen defenses. Finally, discover how to identify, analyze, and prevent social engineering attacks using awareness strategies and security best practices.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_09_enus |
| CEH v13: SQL Injection | Course | View details Course Syllabus | Print Syllabus CEH v13: SQL InjectionOverview/Description: SQL injection (SQLi) is a critical web vulnerability that allows attackers to manipulate databases using malicious queries. In this course, explore in-band, blind, and out-of-band SQLi, and learn how attackers exploit improper input validation to assess database security risks. Next, discover hands-on techniques like error-based, union-based, and time-based SQLi using tools such as sqlmap, Burp Suite, and ShellGPT to exploit vulnerable applications. Finally, learn mitigation techniques such as input validation, parameterized queries, and web application firewalls (WAFs) to protect databases and web applications from SQL-based threats.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_15_enus |
| CEH v13: System Hacking | Course | View details Course Syllabus | Print Syllabus CEH v13: System HackingOverview/Description: System hacking is a critical phase in ethical hacking, where attackers exploit vulnerabilities to gain unauthorized access.In this course, learn about how hackers break into systems, escalate privileges, and maintain persistence, as well as techniques like password cracking, keylogging, spyware, and privilege escalation. Next, explore various attack vectors, how AI-powered security tools detect and prevent such attacks, and how tools like the Metasploit Framework simulate real-world hacking scenarios. Finally, discover how to exploit system vulnerabilities, bypass security controls, and cover tracks while reinforcing ethical hacking principles.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_06_enus |
| CEH v13: Vulnerability Analysis | Course | View details Course Syllabus | Print Syllabus CEH v13: Vulnerability AnalysisOverview/Description: Vulnerability analysis is a critical step in ethical hacking, helping security professionals to identify weaknesses in systems, networks, and applications. In this course, you will learn how to assess security flaws and outdated software that attackers can exploit. This course covers both manual and automated vulnerability scanning techniques, providing a deep understanding of risk assessment and security hardening.You will explore various tools such as Nessus, OpenVAS, Nikto, and Nmap, along with AI-driven scanners that enhance detection accuracy. Explore how to perform vulnerability identification, analyze scan results, and prioritize security fixes. Additionally, you will discover compliance requirements and risk management strategies used in cybersecurity environments.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_05_enus |
| CEH v13: Cloud Computing | Course | View details Course Syllabus | Print Syllabus CEH v13: Cloud ComputingOverview/Description: As organizations increasingly move to cloud-based infrastructures, securing cloud environments has become essential. Cloud computing security involves understanding cloud service models, deployment types, and shared responsibility principles. In this course, learn about common threats such as misconfigurations, insecure APIs, data breaches, and unauthorized access in cloud environments. Next, explore various cloud hacking techniques, including privilege escalation, container security bypassing, and exploiting misconfigured storage and identity management services. Finally, identify security threats in cloud environments, analyze vulnerabilities in cloud services, and implement security measures to protect cloud infrastructures from cyberattacks.This course can be used in preparation for the Certified Ethical Hacker (CEH) 312-50 exam. Course Number: it_spceh13_19_enus |