Certified Ethical Hacker (CEH AI)
- 02 Aprile 2025
- Duration 24 weeks
- 01 June 2026
- Duration: 36 weeks
Explore the EC-Council Certified Ethical Hacker (C|EH AI) Program

Key Features & Benefits
100+ Hands-On Labs for real-world practice
Approved by the U.S. Department of Defense (DoD)
World’s No.1 ethical hacking certification, now with the power of AI
Learn the latest cybersecurity technologies
Earn a globally recognized certificate
Build practical, job-ready skills
1 in every 2 professionals received promotions after CEH
95% chose CEH AI for career growth
Course Outline
Module 01
Introduction to Ethical Hacking
Introduction to Ethical Hacking
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 02
Footprinting and Reconnaissance
Footprinting and Reconnaissance
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 03
Scanning Networks
Scanning Networks
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 04
Enumeration
Enumeration
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 05
Vulnerability Analysis
Vulnerability Analysis
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 06
System Hacking
System Hacking
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 07
Malware Threats
Malware Threats
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 08
Sniffing
Sniffing
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 09
Social Engineering
Social Engineering
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 10
Denial-of-Service
Denial-of-Service
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 11
Session Hijacking
Session Hijacking
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 12
Evading IDS, Firewalls, and Honeypots
Evading IDS, Firewalls, and Honeypots
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 13
Hacking Web Servers
Hacking Web Servers
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 14
Hacking Web Applications
Hacking Web Applications
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 15
SQL Injection
SQL Injection
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 16
Hacking Wireless Networks
Hacking Wireless Networks
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 17
Hacking Mobile Platforms
Hacking Mobile Platforms
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 18
IoT and OT Hacking
IoT and OT Hacking
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 19
Cloud Computing
Cloud Computing
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 20
Cryptography
Cryptography
- Encrypt the Information using Various Cryptography Tools
- Create and Use Self-signed Certificates
- Perform Email and Disk Encryption
- Perform Cryptanalysis using Various Cryptanalysis Tools
- Perform Cryptography using AI
Key topics covered: Cryptography, Ciphers, Symmetric Encryption Algorithms, Asymmetric Encryption Algorithms, Message Digest Functions, Quantum Cryptography, Cryptography Tools, Public Key Infrastructure (PKI), Signed Certificate, Digital Signature, Email Encryption, Disk Encryption, Blockchain, Cryptanalysis Methods, Cryptography Attacks, Attacks on Blockchain, Quantum Computing Attacks, Cryptanalysis Tools
Our Partners & Vendors







Ready to grow your cybersecurity team?
Training Prerequisites
Core Knowledge
Basic understanding of computer networks and protocols.
Technical Skills
Familiar with IP addressing, routing, and TCP/IP stack (IPv4, DNS, DHCP, ARP, ICMP).
Able to use basic network tools (e.g., ping, traceroute, nslookup, netstat, telnet, curl, http).
OS & Tools
Confident using Linux or macOS (or Windows Subsystem for Linux).
Can install packages and use command-line tools.
Understands basic file systems, permissions, and user management.

Training & Register Details
TRAINING OVERVIEW

Certified Ethical Hacker (C|EH AI)
Empower your organization with certified ethical hacking expertise.


Training Duration: 24 weeks (60 hours)

Format: Instructor-Led Online

Level: Intermediate

Language: Ukrainian

Materials: English | 24 months valid

Labs: 24/7 180 days access

Exam Attempts: 1 offline
HOW TO REGISTER

1. Submit Your Application
Basic understanding of computer networks and protocols.
2. Intro Call
We’ll schedule a short call to learn more about your goals and expectations.
3. Confirm Your Spot
Get accepted and complete the paperwork. We’ll send you all the info you need.
4. Start Learning
Access your learning platform and get familiar with the materials.
5. Join the Community
Get access to the student chat, events, and mentorship opportunities.
Who is CEH AI for?

Cybersecurity Experts
Advance your career with CEH AI — smarter skills powered by AI.

Teams & Businesses
Boost your team’s hacking skills with cutting-edge AI-driven training.

Government & Defense
Trusted worldwide by agencies and defense sectors for advanced cybersecurity.

Educators
Build and expand your own cybersecurity training programs with ease.
FAQ
What Services Does SEG Offer?
Why take the CEH AI (Certified Ethical Hacker) course?
- Globally Recognized - CEH certification is issued by EC-Council and trusted by Microsoft, IBM, Cisco, Google, Amazon, and government agencies worldwide.
- High Job Demand – Organizations actively seek certified ethical hackers.
- Comprehensive Curriculum – Covers everything from network attacks to advanced penetration testing.
- Hands-on Learning – Includes real-life labs, practical case studies, and attack simulations with AI elements.
- Career Growth – CEH certification opens the door to high-paying roles and competitive market advantage.
What you’ll learn in CEH v13 AI
- Penetration testing methodologies
- Identifying network and application vulnerabilities
- Ethical hacking techniques used by real attackers
- Tracing attack footprints
- Social engineering and defense strategies
- Post-exploitation — maintaining a presence inside the system to gather data without detection.
- Securing cloud environments and IoT
Who should take the CEH AI course?
- Security Professionals – System admins, penetration testers, and SOC analysts
- Developers & DevOps Engineers – To detect vulnerabilities in code and applications
- Cybersecurity Managers – Looking to strengthen security policies
- Students & IT Graduates – Starting careers in ethical hacking
- Government & Enterprise Teams – Seeking to train staff in cybersecurity defense
What does CEH certification offer companies?
- Stronger Security Posture – Certified professionals reduce data breach and financial loss risks
- Competitive Advantage – Enhances company credibility with partners and clients
- Infrastructure Protection – Ethical hackers assess and fortify your systems
- Compliance – CEH aligns with ISO 27001, GDPR, NIST, and other standards
How is CEH AI training delivered?
- Format – Online or in-person
- Labs – Real-world attack simulations in a safe environment
- Knowledge Checks – Practice exams and interactive assessments
- Certification Exam – Earn an EC-Council certification upon passing the official test
Where to get CEH AI training?
- Official EC-Council materials
- Certified instructors with real-world cybersecurity experience
- Full learning support and consultation
- Exam preparation guidance
- Lab access and testing environments
What should I know about the CEH v13 AI exam before taking it?
- Exam code: 312-38
- Number of questions: 100
- Duration: 4 hours
- Format: Multiple choice
- Location: SEG official exam center