Hyppää sisältöön

Koulutus

Certified Ethical Hacker v13

Access expert-led QA training live online, wherever you learn best.

Ajankohta

18.–22.5.2026

online

QA On-Line Virtual Centre

Ajankohta

18.–22.5.2026

online

QA On-Line Virtual Centre

Overview

This AI-enhanced course prepares cybersecurity professionals to earn the EC-Council Certified Ethical Hacker (CEH) v13 certification in just five days. It provides real-world insights into the ethical hacking process, enabling learners to identify and address vulnerabilities across systems, networks, applications, and cloud environments.

With a curriculum structured around 20 advanced modules, learners will explore attack techniques and commercial-grade hacking tools. Delivered by EC-Council-accredited instructors, the course includes hands-on labs, real-time simulations, and certification preparation, helping learners master both the theory and practice of ethical hacking.

Prerequisites

Participants should be familiar with:

  • Windows and Linux/Unix operating systems
  • Networking fundamentals and cybersecurity concepts
  • Basic understanding of information security protocols

Target audience

This course is ideal for:

  • Cybersecurity, network security, and cloud security professionals
  • Information security analysts, managers, and officers
  • IT auditors, system administrators, and engineers
  • Risk, threat, and vulnerability analysts
  • Professionals pursuing CEH certification or roles in penetration testing

Objectives

By the end of this course, learners will be able to:

  • Understand ethical hacking principles and information security frameworks
  • Perform reconnaissance and vulnerability assessments
  • Execute system, network, application, and mobile exploitation
  • Analyse malware and identify attack vectors such as Trojans, worms, and APTs
  • Conduct penetration testing across web servers, wireless networks, and cloud environments
  • Apply countermeasures to threats including DDoS, SQL injection, and social engineering
  • Evade firewalls, intrusion detection systems, and honeypots
  • Use cryptography and secure communications protocols effectively
  • Prepare for the CEH Knowledge and Practical Exams

Outline

Ethical hacking foundations

  • Introduction to ethical hacking and the legal landscape
  • Understanding security controls and compliance standards

Reconnaissance and information gathering

  • Foot printing techniques and reconnaissance tools
  • Scanning networks and identifying live hosts

Network and system exploitation

  • Enumeration techniques and tools
  • System hacking methodologies including steganography and privilege escalation

Threat detection and malware analysis

  • Analysing malware threats (Trojans, viruses, worms, fileless malware)
  • Sniffing attacks and defensive strategies

Social engineering and denial-of-service

  • Common social engineering tactics and mitigation
  • Tools and countermeasures for DoS and DDoS

Advanced exploitation techniques

  • Session hijacking techniques
  • Evading IDS, firewalls, and honeypots

Web application and database attacks

  • Hacking web servers and web applications
  • Performing SQL injection and implementing prevention techniques

Wireless, mobile, and IoT security

  • Exploiting wireless networks and mobile platforms
  • Assessing and securing IoT and OT infrastructures

Cloud and cryptography

  • Threats and attack vectors in cloud environments
  • Implementing encryption, cryptographic tools, and PKI

Hands-on hacking and AI integration

  • Applying the 5-phase hacking framework: reconnaissance, scanning, gaining access, maintaining access, covering tracks
  • Conducting AI-enabled penetration tests
  • Working with OWASP top 10 vulnerabilities

Exams and assessments

This course includes two EC-Council certification assessments, taken post class:

  • CEH Knowledge Exam: 125 multiple-choice questions (4 hours)
  • CEH Practical Exam: 20 scenario-based tasks (6 hours)

Participants also benefit from knowledge checks, scenario walkthroughs, and one CEH Knowledge exam retake included in the course package.

Hands-on learning

Participants will gain hands-on experience through:

  • Over 100 guided labs in a cloud-based Cyber Range
  • Live environments featuring real-world vulnerabilities and unpatched systems
  • Pre-configured tools and target networks to practice attacks and defences
  • AI-integrated ethical hacking simulations and practical challenges

Osta liput

QA’s online-courses from Tieturi

Questions about QA courses?

Find out how QA’s live online courses work, what you need to participate, and what to expect before booking your training.

Accreditation and trademark notice

ITIL® and PRINCE2® courses are provided by QA Ltd, an ATO of People Cert.

ITIL®, PRINCE2® are registered trademarks of the PeopleCert group. Used under licence from PeopleCert. All rights reserved.

TOGAF® is a registered trademark of The Open Group.