CERTIFIED ETHICAL
HACKER (CEH)
-
02 Aprile 2025 -
Duration 24 weeks
Certified Ethical Hacker | EC-Council
-
01 June 2026 -
Duration: 36 weeks
Essential Series 3 in 1: NDE+EHE+DFE | EC-Council
Explore the EC-Council Certified Ethical Hacker (C|EH AI) Program
World’s No.1 ethical hacking certification, now with the power of AI
Key Features & Benefits
100+ Hands-On Labs for real-world practice
Approved by the U.S. Department of Defense (DoD)
World’s No.1 ethical hacking certification, now with the power of AI
Learn the latest cybersecurity technologies
Earn a globally recognized certificate
Build practical, job-ready skills
1 in every 2 professionals received promotions after CEH
95% chose CEH AI for career growth
Course Outline
Select a module to explore detailed content:
Module 01
Introduction to Ethical Hacking
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 02
Footprinting and Reconnaissance
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 03
Scanning Networks
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 04
Enumeration
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 05
Vulnerability Analysis
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 06
System Hacking
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 07
Malware Threats
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 08
Sniffing
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 09
Social Engineering
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 10
Denial-of-Service
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 11
Session Hijacking
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 12
Evading IDS, Firewalls, and Honeypots
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 13
Hacking Web Servers
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 14
Hacking Web Applications
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 15
SQL Injection
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 16
Hacking Wireless Networks
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 17
Hacking Mobile Platforms
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 18
IoT and OT Hacking
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 19
Cloud Computing
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Module 20
Cryptography
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
Hands-on Labs:
- Encrypt the Information using Various Cryptography Tools
- Create and Use Self-signed Certificates
- Perform Email and Disk Encryption
- Perform Cryptanalysis using Various Cryptanalysis Tools
- Perform Cryptography using AI
Key topics covered: Cryptography, Ciphers, Symmetric Encryption Algorithms, Asymmetric Encryption Algorithms, Message Digest Functions, Quantum Cryptography, Cryptography Tools, Public Key Infrastructure (PKI), Signed Certificate, Digital Signature, Email Encryption, Disk Encryption, Blockchain, Cryptanalysis Methods, Cryptography Attacks, Attacks on Blockchain, Quantum Computing Attacks, Cryptanalysis Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process. Hands-on Labs:
- Perform footprinting on the target network using search engines, internet research services, and social networking sites
- Perform whois, DNS, network, and email footprinting on the target network
- Perform Footprinting using A
Key topics covered: Reconnaissance, Footprinting Using Advanced Google Hacking Techniques, Footprinting through People Search Services, Dark Web Footprinting, Competitive Intelligence Gathering, Footprinting through Social Networking Sites, Whois Lookup, DNS Footprinting, Traceroute Analysis, Email Footprinting, Footprinting through Social Engineering, AI-Powered OSINT Tools
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.Hands-on Labs:
- Encrypt the Information using Various Cryptography Tools
- Create and Use Self-signed Certificates
- Perform Email and Disk Encryption
- Perform Cryptanalysis using Various Cryptanalysis Tools
- Perform Cryptography using AI
Key topics covered: Cryptography, Ciphers, Symmetric Encryption Algorithms, Asymmetric Encryption Algorithms, Message Digest Functions, Quantum Cryptography, Cryptography Tools, Public Key Infrastructure (PKI), Signed Certificate, Digital Signature, Email Encryption, Disk Encryption, Blockchain, Cryptanalysis Methods, Cryptography Attacks, Attacks on Blockchain, Quantum Computing Attacks, Cryptanalysis Tools
Our Partners & Vendors







Ready to grow your cybersecurity career?
Get personalized guidance, explore your learning path, and start moving toward certification success.
Book a Consultation
Student Requirements
Core Knowledge
Basic understanding of computer networks and protocols.
Technical Skills
Familiar with IP addressing, routing, and TCP/IP stack (IPv4, DNS, DHCP, ARP, ICMP).
Able to use basic network tools (e.g., ping, traceroute, nslookup, netstat, telnet, curl, http).
OS & Tools
Confident using Linux or macOS (or Windows Subsystem for Linux).
Can install packages and use command-line tools.
Understands basic file systems, permissions, and user management.
Training & Register Details
TRAINING OVERVIEW
Certified Ethical Hacker (C|EH AI)
One-time payment
₴45,000
Installments
upfront ₴15,000
+
5 months × ₴7,500
PrivatBank Credit
₴53,000
over 12 months

Training Duration: 24 weeks (60 hours)

Format: Instructor-Led Online

Level: Intermediate

Language: Ukrainian

Materials: English | 24 months valid

Labs: 24/7 180 days access

Exam Attempts: 1 offline
HOW TO REGISTER
1. Submit Your Application
Basic understanding of computer networks and protocols.
2. Intro Call
We’ll schedule a short call to learn more about your goals and expectations.
3. Confirm Your Spot
Get accepted and complete the paperwork. We’ll send you all the info you need.
4. Start Learning
Access your learning platform and get familiar with the materials.
5. Join the Community
Get access to the student chat, events, and mentorship opportunities.
Who is CEH AI for?
Cybersecurity Experts
Advance your career with CEH AI — smarter skills powered by AI.
Teams & Businesses
Boost your team’s hacking skills with cutting-edge AI-driven training.
Government & Defense
Trusted worldwide by agencies and defense sectors for advanced cybersecurity.
Educators
Build and expand your own cybersecurity training programs with ease.
FAQ
What Services Does SEG Offer?
The Certified Ethical Hacker (CEH) is a globally recognized certification in ethical hacking and cybersecurity. Developed by EC-Council, the CEH v13 AI program is the international gold standard for assessing the security of information systems. This course teaches you how to identify vulnerabilities, assess threats, and protect corporate data from cyberattacks using real-world AI-enhanced scenarios.
CEH v13 AI is built by cybersecurity experts and includes hands-on labs, vulnerability testing, and the latest ethical hacking tools integrated with artificial intelligence.
Why take the CEH AI (Certified Ethical Hacker) course?
CEH training is a smart investment in your cybersecurity career — ideal for IT professionals and companies aiming to boost security posture with AI-enhanced skills.
-
Globally Recognized – CEH certification is issued by EC-Council and trusted by Microsoft, IBM, Cisco, Google, Amazon, and government agencies worldwide. -
High Job Demand – Organizations actively seek certified ethical hackers. -
Comprehensive Curriculum – Covers everything from network attacks to advanced penetration testing. -
Hands-on Learning – Includes real-life labs, practical case studies, and attack simulations with AI elements. -
Career Growth – CEH certification opens the door to high-paying roles and competitive market advantage.
What you’ll learn in CEH v13 AI
The CEH v13 AI course covers the latest tools, techniques, and trends in cybersecurity. You’ll gain skills in:
-
Penetration testing methodologies -
Identifying network and application vulnerabilities -
Ethical hacking techniques used by real attackers -
Tracing attack footprints -
Social engineering and defense strategies -
Post-exploitation — maintaining a presence inside the system to gather data without detection. -
Securing cloud environments and IoT
Who should take the CEH AI course?
This course is ideal for:
-
Security Professionals – System admins, penetration testers, and SOC analysts -
Developers & DevOps Engineers – To detect vulnerabilities in code and applications -
Cybersecurity Managers – Looking to strengthen security policies -
Students & IT Graduates – Starting careers in ethical hacking -
Government & Enterprise Teams – Seeking to train staff in cybersecurity defense
What does CEH certification offer companies?
-
Stronger Security Posture – Certified professionals reduce data breach and financial loss risks -
Competitive Advantage – Enhances company credibility with partners and clients -
Infrastructure Protection – Ethical hackers assess and fortify your systems -
Compliance – CEH aligns with ISO 27001, GDPR, NIST, and other standards
How is CEH AI training delivered?
-
Format – Online or in-person -
Labs – Real-world attack simulations in a safe environment -
Knowledge Checks – Practice exams and interactive assessments -
Certification Exam – Earn an EC-Council certification upon passing the official test
Where to get CEH AI training?
You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:
-
Official EC-Council materials -
Certified instructors with real-world cybersecurity experience -
Full learning support and consultation -
Exam preparation guidance -
Lab access and testing environments
What should I know about the CEH v13 AI exam before taking it?
You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:
-
Exam code: 312-38 -
Number of questions: 100 -
Duration: 4 hours -
Format: Multiple choice -
Location: SEG official exam center
The Certified Ethical Hacker (CEH) is a globally recognized certification in ethical hacking and cybersecurity. Developed by EC-Council, the CEH v13 AI program is the international gold standard for assessing the security of information systems. This course teaches you how to identify vulnerabilities, assess threats, and protect corporate data from cyberattacks using real-world AI-enhanced scenarios.CEH v13 AI is built by cybersecurity experts and includes hands-on labs, vulnerability testing, and the latest ethical hacking tools integrated with artificial intelligence.CEH training is a smart investment in your cybersecurity career — ideal for IT professionals and companies aiming to boost security posture with AI-enhanced skills.
-
Globally Recognized – CEH certification is issued by EC-Council and trusted by Microsoft, IBM, Cisco, Google, Amazon, and government agencies worldwide. -
High Job Demand – Organizations actively seek certified ethical hackers. -
Comprehensive Curriculum – Covers everything from network attacks to advanced penetration testing. -
Hands-on Learning – Includes real-life labs, practical case studies, and attack simulations with AI elements. -
Career Growth – CEH certification opens the door to high-paying roles and competitive market advantage.
The CEH v13 AI course covers the latest tools, techniques, and trends in cybersecurity. You’ll gain skills in:
-
Penetration testing methodologies -
Identifying network and application vulnerabilities -
Ethical hacking techniques used by real attackers -
Tracing attack footprints -
Social engineering and defense strategies -
Post-exploitation — maintaining a presence inside the system to gather data without detection. -
Securing cloud environments and IoT
This course is ideal for:
-
Security Professionals – System admins, penetration testers, and SOC analysts -
Developers & DevOps Engineers – To detect vulnerabilities in code and applications -
Cybersecurity Managers – Looking to strengthen security policies -
Students & IT Graduates – Starting careers in ethical hacking -
Government & Enterprise Teams – Seeking to train staff in cybersecurity defense
-
Stronger Security Posture – Certified professionals reduce data breach and financial loss risks -
Competitive Advantage – Enhances company credibility with partners and clients -
Infrastructure Protection – Ethical hackers assess and fortify your systems -
Compliance – CEH aligns with ISO 27001, GDPR, NIST, and other standards
-
Format – Online or in-person -
Labs – Real-world attack simulations in a safe environment -
Knowledge Checks – Practice exams and interactive assessments -
Certification Exam – Earn an EC-Council certification upon passing the official test
You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:
-
Official EC-Council materials -
Certified instructors with real-world cybersecurity experience -
Full learning support and consultation -
Exam preparation guidance -
Lab access and testing environments
You can take the CEH v13 AI course via official training centers in Ukraine or online at SEG.com.ua. We offer:
-
Exam code: 312-38 -
Number of questions: 100 -
Duration: 4 hours -
Format: Multiple choice -
Location: SEG official exam center
Start Your Journey With Us
Ready to grow your skills or start a new career in cybersecurity?Leave your contact details, and our experts will get back to you shortly — whether you need help choosing the right course or certification program, or want details about enrollment and schedules.