Koulutus
Overview
This AI-enhanced course prepares cybersecurity professionals to earn the EC-Council Certified Ethical Hacker (CEH) v13 certification in just five days. It provides real-world insights into the ethical hacking process, enabling learners to identify and address vulnerabilities across systems, networks, applications, and cloud environments.
With a curriculum structured around 20 advanced modules, learners will explore attack techniques and commercial-grade hacking tools. Delivered by EC-Council-accredited instructors, the course includes hands-on labs, real-time simulations, and certification preparation, helping learners master both the theory and practice of ethical hacking.
Prerequisites
Participants should be familiar with:
- Windows and Linux/Unix operating systems
- Networking fundamentals and cybersecurity concepts
- Basic understanding of information security protocols
Target audience
This course is ideal for:
- Cybersecurity, network security, and cloud security professionals
- Information security analysts, managers, and officers
- IT auditors, system administrators, and engineers
- Risk, threat, and vulnerability analysts
- Professionals pursuing CEH certification or roles in penetration testing
Objectives
By the end of this course, learners will be able to:
- Understand ethical hacking principles and information security frameworks
- Perform reconnaissance and vulnerability assessments
- Execute system, network, application, and mobile exploitation
- Analyse malware and identify attack vectors such as Trojans, worms, and APTs
- Conduct penetration testing across web servers, wireless networks, and cloud environments
- Apply countermeasures to threats including DDoS, SQL injection, and social engineering
- Evade firewalls, intrusion detection systems, and honeypots
- Use cryptography and secure communications protocols effectively
- Prepare for the CEH Knowledge and Practical Exams
Outline
Ethical hacking foundations
- Introduction to ethical hacking and the legal landscape
- Understanding security controls and compliance standards
Reconnaissance and information gathering
- Foot printing techniques and reconnaissance tools
- Scanning networks and identifying live hosts
Network and system exploitation
- Enumeration techniques and tools
- System hacking methodologies including steganography and privilege escalation
Threat detection and malware analysis
- Analysing malware threats (Trojans, viruses, worms, fileless malware)
- Sniffing attacks and defensive strategies
Social engineering and denial-of-service
- Common social engineering tactics and mitigation
- Tools and countermeasures for DoS and DDoS
Advanced exploitation techniques
- Session hijacking techniques
- Evading IDS, firewalls, and honeypots
Web application and database attacks
- Hacking web servers and web applications
- Performing SQL injection and implementing prevention techniques
Wireless, mobile, and IoT security
- Exploiting wireless networks and mobile platforms
- Assessing and securing IoT and OT infrastructures
Cloud and cryptography
- Threats and attack vectors in cloud environments
- Implementing encryption, cryptographic tools, and PKI
Hands-on hacking and AI integration
- Applying the 5-phase hacking framework: reconnaissance, scanning, gaining access, maintaining access, covering tracks
- Conducting AI-enabled penetration tests
- Working with OWASP top 10 vulnerabilities
Exams and assessments
This course includes two EC-Council certification assessments, taken post class:
- CEH Knowledge Exam: 125 multiple-choice questions (4 hours)
- CEH Practical Exam: 20 scenario-based tasks (6 hours)
Participants also benefit from knowledge checks, scenario walkthroughs, and one CEH Knowledge exam retake included in the course package.
Hands-on learning
Participants will gain hands-on experience through:
- Over 100 guided labs in a cloud-based Cyber Range
- Live environments featuring real-world vulnerabilities and unpatched systems
- Pre-configured tools and target networks to practice attacks and defences
- AI-integrated ethical hacking simulations and practical challenges
Osta liput
QA’s online-courses from Tieturi
Questions about QA courses?
Find out how QA’s live online courses work, what you need to participate, and what to expect before booking your training.
Accreditation and trademark notice
ITIL® and PRINCE2® courses are provided by QA Ltd, an ATO of People Cert.
ITIL®, PRINCE2® are registered trademarks of the PeopleCert group. Used under licence from PeopleCert. All rights reserved.
TOGAF® is a registered trademark of The Open Group.