Certified Network Defender (CND)

Explore the EC-Council Certified Ethical Hacker (C|EH AI) Program

World’s No.1 ethical hacking certification, now with the power of AI

Key Features & Benefits

100+ Hands-On Labs for real-world practice

Approved by the U.S. Department of Defense (DoD)

World’s No.1 ethical hacking certification, now with the power of AI

Learn the latest cybersecurity technologies

Earn a globally recognized certificate

Build practical, job-ready skills

1 in every 2 professionals received promotions after CEH

95% chose CEH AI for career growth

Course Outline

Select a module to explore detailed content:
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 
  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
Hands-on Labs: 
  • Encrypt the Information using Various Cryptography Tools 
  • Create and Use Self-signed Certificates 
  • Perform Email and Disk Encryption 
  • Perform Cryptanalysis using Various Cryptanalysis Tools 
  • Perform Cryptography using AI  

Key topics covered: Cryptography, Ciphers, Symmetric Encryption Algorithms, Asymmetric Encryption Algorithms, Message Digest Functions, Quantum Cryptography, Cryptography Tools, Public Key Infrastructure (PKI), Signed Certificate, Digital Signature, Email Encryption, Disk Encryption, Blockchain, Cryptanalysis Methods, Cryptography Attacks, Attacks on Blockchain, Quantum Computing Attacks, Cryptanalysis Tools 

Our Partners & Vendors

Ready to grow your cybersecurity team?

Get expert guidance on upskilling your team and building a cybersecurity workforce tailored to your business needs.

Training Prerequisites

Core Knowledge

Basic understanding of computer networks and protocols.

Technical Skills

Familiar with IP addressing, routing, and TCP/IP stack (IPv4, DNS, DHCP, ARP, ICMP).

Able to use basic network tools (e.g., ping, traceroute, nslookup, netstat, telnet, curl, http).

OS & Tools

Confident using Linux or macOS (or Windows Subsystem for Linux).

Can install packages and use command-line tools.

Understands basic file systems, permissions, and user management.

Training & Register Details

TRAINING OVERVIEW

Certified Ethical Hacker (C|EH AI)

Empower your organization with certified ethical hacking expertise.

Training Duration: 24 weeks (60 hours)

Format: Instructor-Led Online

Level: Intermediate

Language: Ukrainian

Materials: English | 24 months valid

Labs: 24/7 180 days access

Exam Attempts: 1 offline

HOW TO REGISTER

1. Submit Your Application

Basic understanding of computer networks and protocols.

2. Intro Call

We’ll schedule a short call to learn more about your goals and expectations.

3. Confirm Your Spot

Get accepted and complete the paperwork. We’ll send you all the info you need.

4. Start Learning

Access your learning platform and get familiar with the materials.

5. Join the Community

Get access to the student chat, events, and mentorship opportunities.

Who is CEH AI for?

Cybersecurity Experts

Advance your career with CEH AI — smarter skills powered by AI.

Teams & Businesses

Boost your team’s hacking skills with cutting-edge AI-driven training.

Government & Defense

Trusted worldwide by agencies and defense sectors for advanced cybersecurity.

Educators

Build and expand your own cybersecurity training programs with ease.

FAQ

The Certified Ethical Hacker (CEH) is a globally recognized certification in ethical hacking and cybersecurity. Developed by EC-Council, the CEH v13 AI program is the international gold standard for assessing the security of information systems. This course teaches you how to identify vulnerabilities, assess threats, and protect corporate data from cyberattacks using real-world AI-enhanced scenarios.
CEH v13 AI is built by cybersecurity experts and includes hands-on labs, vulnerability testing, and the latest ethical hacking tools integrated with artificial intelligence.
CEH training is a smart investment in your cybersecurity career — ideal for IT professionals and companies aiming to boost security posture with AI-enhanced skills.
The CEH v13 AI course covers the latest tools, techniques, and trends in cybersecurity. You’ll gain skills in:
This course is ideal for:
You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:
You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:

Start Your Journey With Us

Ready to grow your skills or start a new career in cybersecurity?
Leave your contact details, and our experts will get back to you shortly — whether you need help choosing the right course or certification program, or want details about enrollment and schedules.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
Scroll to Top

Let’s Talk About Your Project

Need a consultation or more information? We’re here to help!
Leave your contact details, and our experts will get back to you shortly — whether it’s about choosing the right cybersecurity services, training your team, or getting certified.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.

Thank you!

Your message has been successfully sent.
Our team will get back to you shortly.