CERTIFIED ETHICAL HACKER (CEH)

CERTIFIED ETHICAL

HACKER (CEH)


Book a Consultation


  • 02 Aprile 2025

  • Duration 24 weeks


Certified Ethical Hacker | EC-Council


  • 01 June 2026

  • Duration: 36 weeks


Essential Series 3 in 1: NDE+EHE+DFE | EC-Council

Explore the EC-Council Certified Ethical Hacker (C|EH AI) Program

World’s No.1 ethical hacking certification, now with the power of AI

Key Features & Benefits

100+ Hands-On Labs for real-world practice

Approved by the U.S. Department of Defense (DoD)

World’s No.1 ethical hacking certification, now with the power of AI

Learn the latest cybersecurity technologies

Earn a globally recognized certificate

Build practical, job-ready skills

1 in every 2 professionals received promotions after CEH

95% chose CEH AI for career growth

Course Outline

Select a module to explore detailed content:

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. 
Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
Hands-on Labs: 

  • Encrypt the Information using Various Cryptography Tools 
  • Create and Use Self-signed Certificates 
  • Perform Email and Disk Encryption 
  • Perform Cryptanalysis using Various Cryptanalysis Tools 
  • Perform Cryptography using AI  

Key topics covered: Cryptography, Ciphers, Symmetric Encryption Algorithms, Asymmetric Encryption Algorithms, Message Digest Functions, Quantum Cryptography, Cryptography Tools, Public Key Infrastructure (PKI), Signed Certificate, Digital Signature, Email Encryption, Disk Encryption, Blockchain, Cryptanalysis Methods, Cryptography Attacks, Attacks on Blockchain, Quantum Computing Attacks, Cryptanalysis Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs: 

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites 
  • Perform whois, DNS, network, and email footprinting on the target network 
  • Perform Footprinting using A

Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools 

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.Hands-on Labs: 

  • Encrypt the Information using Various Cryptography Tools 
  • Create and Use Self-signed Certificates 
  • Perform Email and Disk Encryption 
  • Perform Cryptanalysis using Various Cryptanalysis Tools 
  • Perform Cryptography using AI  

Key topics covered: Cryptography, Ciphers, Symmetric Encryption Algorithms, Asymmetric Encryption Algorithms, Message Digest Functions, Quantum Cryptography, Cryptography Tools, Public Key Infrastructure (PKI), Signed Certificate, Digital Signature, Email Encryption, Disk Encryption, Blockchain, Cryptanalysis Methods, Cryptography Attacks, Attacks on Blockchain, Quantum Computing Attacks, Cryptanalysis Tools 

Our Partners & Vendors

Security Expert Group Cyberserucity Partner CompTIA
Security Expert Group Cyberserucity Partner PECB
Security Expert Group Cyberserucity Partner Offensive Security
Security Expert Group Cyberserucity Partner mile2
Security Expert Group Cyberserucity Partner ISC2
Security Expert Group Cyberserucity Partner Rapid7
Security Expert Group Cyberserucity Partner EC-Council

Ready to grow your cybersecurity career?

Get personalized guidance, explore your learning path, and start moving toward certification success.

Book a Consultation

Student Requirements

Core Knowledge

Basic understanding of computer networks and protocols.

Technical Skills

Familiar with IP addressing, routing, and TCP/IP stack (IPv4, DNS, DHCP, ARP, ICMP).

Able to use basic network tools (e.g., ping, traceroute, nslookup, netstat, telnet, curl, http).

OS & Tools

Confident using Linux or macOS (or Windows Subsystem for Linux).

Can install packages and use command-line tools.

Understands basic file systems, permissions, and user management.

Training & Register Details

TRAINING OVERVIEW

Certified Ethical Hacker (C|EH AI)

One-time payment

₴45,000

Installments

upfront ₴15,000

+

5 months × ₴7,500

PrivatBank Credit

₴53,000

over 12 months

Training Duration: 24 weeks (60 hours)

Format: Instructor-Led Online

Level: Intermediate

Language: Ukrainian

Materials: English | 24 months valid

Labs: 24/7 180 days access

Exam Attempts: 1 offline


Book a Consultation

HOW TO REGISTER

1. Submit Your Application

Basic understanding of computer networks and protocols.

2. Intro Call

We’ll schedule a short call to learn more about your goals and expectations.

3. Confirm Your Spot

Get accepted and complete the paperwork. We’ll send you all the info you need.

4. Start Learning

Access your learning platform and get familiar with the materials.

5. Join the Community

Get access to the student chat, events, and mentorship opportunities.


Register Now

Who is CEH AI for?



Cybersecurity Experts

Advance your career with CEH AI — smarter skills powered by AI.



Teams & Businesses

Boost your team’s hacking skills with cutting-edge AI-driven training.



Government & Defense

Trusted worldwide by agencies and defense sectors for advanced cybersecurity.



Educators

Build and expand your own cybersecurity training programs with ease.

FAQ

The Certified Ethical Hacker (CEH) is a globally recognized certification in ethical hacking and cybersecurity. Developed by EC-Council, the CEH v13 AI program is the international gold standard for assessing the security of information systems. This course teaches you how to identify vulnerabilities, assess threats, and protect corporate data from cyberattacks using real-world AI-enhanced scenarios.
CEH v13 AI is built by cybersecurity experts and includes hands-on labs, vulnerability testing, and the latest ethical hacking tools integrated with artificial intelligence.

CEH training is a smart investment in your cybersecurity career — ideal for IT professionals and companies aiming to boost security posture with AI-enhanced skills.


  • Globally Recognized – CEH certification is issued by EC-Council and trusted by Microsoft, IBM, Cisco, Google, Amazon, and government agencies worldwide.

  • High Job Demand – Organizations actively seek certified ethical hackers.

  • Comprehensive Curriculum – Covers everything from network attacks to advanced penetration testing.

  • Hands-on Learning – Includes real-life labs, practical case studies, and attack simulations with AI elements.

  • Career Growth – CEH certification opens the door to high-paying roles and competitive market advantage.

The CEH v13 AI course covers the latest tools, techniques, and trends in cybersecurity. You’ll gain skills in:


  • Penetration testing methodologies

  • Identifying network and application vulnerabilities

  • Ethical hacking techniques used by real attackers

  • Tracing attack footprints

  • Social engineering and defense strategies

  • Post-exploitation — maintaining a presence inside the system to gather data without detection.

  • Securing cloud environments and IoT

This course is ideal for:


  • Security Professionals – System admins, penetration testers, and SOC analysts

  • Developers & DevOps Engineers – To detect vulnerabilities in code and applications

  • Cybersecurity Managers – Looking to strengthen security policies

  • Students & IT Graduates – Starting careers in ethical hacking

  • Government & Enterprise Teams – Seeking to train staff in cybersecurity defense

  • Stronger Security Posture – Certified professionals reduce data breach and financial loss risks

  • Competitive Advantage – Enhances company credibility with partners and clients

  • Infrastructure Protection – Ethical hackers assess and fortify your systems

  • Compliance – CEH aligns with ISO 27001, GDPR, NIST, and other standards

  • Format – Online or in-person

  • Labs – Real-world attack simulations in a safe environment

  • Knowledge Checks – Practice exams and interactive assessments

  • Certification Exam – Earn an EC-Council certification upon passing the official test

You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:


  • Official EC-Council materials

  • Certified instructors with real-world cybersecurity experience

  • Full learning support and consultation

  • Exam preparation guidance

  • Lab access and testing environments

You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:


  • Exam code: 312-38

  • Number of questions: 100

  • Duration: 4 hours

  • Format: Multiple choice

  • Location: SEG official exam center

The Certified Ethical Hacker (CEH) is a globally recognized certification in ethical hacking and cybersecurity. Developed by EC-Council, the CEH v13 AI program is the international gold standard for assessing the security of information systems. This course teaches you how to identify vulnerabilities, assess threats, and protect corporate data from cyberattacks using real-world AI-enhanced scenarios.CEH v13 AI is built by cybersecurity experts and includes hands-on labs, vulnerability testing, and the latest ethical hacking tools integrated with artificial intelligence.CEH training is a smart investment in your cybersecurity career — ideal for IT professionals and companies aiming to boost security posture with AI-enhanced skills.


  • Globally Recognized – CEH certification is issued by EC-Council and trusted by Microsoft, IBM, Cisco, Google, Amazon, and government agencies worldwide.

  • High Job Demand – Organizations actively seek certified ethical hackers.

  • Comprehensive Curriculum – Covers everything from network attacks to advanced penetration testing.

  • Hands-on Learning – Includes real-life labs, practical case studies, and attack simulations with AI elements.

  • Career Growth – CEH certification opens the door to high-paying roles and competitive market advantage.

The CEH v13 AI course covers the latest tools, techniques, and trends in cybersecurity. You’ll gain skills in:


  • Penetration testing methodologies

  • Identifying network and application vulnerabilities

  • Ethical hacking techniques used by real attackers

  • Tracing attack footprints

  • Social engineering and defense strategies

  • Post-exploitation — maintaining a presence inside the system to gather data without detection.

  • Securing cloud environments and IoT

This course is ideal for:


  • Security Professionals – System admins, penetration testers, and SOC analysts

  • Developers & DevOps Engineers – To detect vulnerabilities in code and applications

  • Cybersecurity Managers – Looking to strengthen security policies

  • Students & IT Graduates – Starting careers in ethical hacking

  • Government & Enterprise Teams – Seeking to train staff in cybersecurity defense

  • Stronger Security Posture – Certified professionals reduce data breach and financial loss risks

  • Competitive Advantage – Enhances company credibility with partners and clients

  • Infrastructure Protection – Ethical hackers assess and fortify your systems

  • Compliance – CEH aligns with ISO 27001, GDPR, NIST, and other standards

  • Format – Online or in-person

  • Labs – Real-world attack simulations in a safe environment

  • Knowledge Checks – Practice exams and interactive assessments

  • Certification Exam – Earn an EC-Council certification upon passing the official test

You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:


  • Official EC-Council materials

  • Certified instructors with real-world cybersecurity experience

  • Full learning support and consultation

  • Exam preparation guidance

  • Lab access and testing environments

You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:


  • Exam code: 312-38

  • Number of questions: 100

  • Duration: 4 hours

  • Format: Multiple choice

  • Location: SEG official exam center

Start Your Journey With Us

Ready to grow your skills or start a new career in cybersecurity?Leave your contact details, and our experts will get back to you shortly — whether you need help choosing the right course or certification program, or want details about enrollment and schedules.