C|EH v13
BECOME A CERTIFIED
ETHICAL HACKER
Powered by AI Capabilities
Certified Ethical Hacker Program by ICSS
Certified Ethical Hacker Powered by AI
Build Your Career 01 The World’s #1 Ethical Hacking
Certification for 20+ years
with the Most
In-Demand 01 EC-Council Introduces the Industry’s
First AI Cybersecurity Courses
Ethical Hacking
Certification 12 CEH Ranks 12th among the
Top 75 Highest-Paying IT
Certifications in the US and Globally
Ranked 1st in Ethical Hacking
97% Stated That the Skills They
Acquired in CEH Helped
Safeguard Their Organizations
Certifications by ZDNet
95% Chose CEH for
Career Growth
Ranked in the List of Top 10
Cybersecurity Certifications 92% of Hiring Managers Prefer
Candidates with the CEH for
Jobs That Require Ethical Hacking Skills
Ranked 4th Among the Top 45+ Cybersecurity Job Roles Are
Mapped to the CEH Certification in
2024, Compared to 20+ Roles in 2022
50 Leading Cybersecurity
Certifications
1 in every 2 Professionals Received
Promotions After Completing the CEH
CEH is the only Globally In-Demand Ethical
Hacking Certification that covers Core
Domains of Cybersecurity and has Global
Recognition and Accreditations while
offering a Higher Employability Rate
CEH v13 Brochure
Certified Ethical Hacker Powered by AI
Future Proof Your AI in Cybersecurity
Cybersecurity Threats
Career with AI
83% note tangible alterations in
attack methodologies amidst
the AI revolution (EC-Council, 2024)
The Demand for
Cybersecurity Professionals
with AI Skills is on the Rise 66% admit Being Unprepared
for AI Cyber Onslaughts
(EC-Council, 2024)
Countermeasures
AI Skills No Longer Optional;
They Are Essential Up to
90%
of fraud costs can be reduced
by AI models in specific
scenarios where behavioral data analysis
42%
of large enterprises actively
is effectively applied (IBM, 2024)
use AI, and 59% of early
adopters plan to increase investment and
accelerate AI integration (IBM, 2024)
AI and automation slashed breach
impact by 30%, saving businesses
40% surge in demand for specialists in USD 850,000 and reducing breach
Artificial Intelligence and Machine lifecycles by 108 days (IBM, 2023)
Learning (World Economic Forum, 2023)
96% of security leaders deem AI
solutions essential for countering
AI-powered threats due to their speed
and effectiveness (Darktrace, 2024)
87% of business leaders expect at
least a quarter of their workforce
will need to upskill in AI (IBM, 2024)
CEH v13 Brochure
Certified Ethical Hacker Powered by AI
What’s New in The CEH v13
The CEH v13 not only provides extensive hands-on coverage
but also integrates AI into all five phases of ethical hacking:
1 Reconnaissance
cal Hacking
Ethi
of
AI
s
2
se
Scanning
5 Pha
Hacking
AI and
Using AI 3 Gaining Access
4 Maintaining Access
5 Clearing Tracks
Get CEH Trained from Anywhere Learn AI Tools:
with our World-Class Instructors
ShellGPT
1. Live-Online ChatGPT
2. Self-Paced Video Lectures FraudGPT
3. In-Person training WormGPT
4. Masterclass DeepExploit
Nebula
Veed.io
And many more!
CEH v13 Brochure
Certified Ethical Hacker Powered by AI
Module Name Course Outline
Learn the fundamentals and key issues in information
Module 01
security, including the basics of ethical hacking, information
Introduction to Ethical Hacking
security controls, relevant laws, and standard procedures.
Learn how to use the latest techniques and tools
Module 02
for footprinting and reconnaissance, a critical
Footprinting and Reconnaissance
pre-attack phase of ethical hacking
Module 03 Learn different network scanning techniques
Scanning Networks and countermeasures.
Learn various enumeration techniques, including Border
Module 04
Gateway Protocol (BGP) and Network File Sharing
Enumeration
(NFS) exploits and associated countermeasures.
Learn how to identify security loopholes in a target
Module 05 organization’s network, communication infrastructure, and end
Vulnerability Analysis systems. Different types of vulnerability assessment and
vulnerability assessment tools are also included.
Learn about the various system hacking methodologies used
Module 06
to discover system and network vulnerabilities, including
System Hacking
steganography, steganalysis attacks, and how to cover tracks.
Learn about different types of malware (Trojan, viruses,
Module 07
worms, etc.), APT and fileless malware, malware analysis
Malware Threats
procedures, and malware countermeasures.
Learn about packet sniffing techniques and their
Module 08
uses for discovering network vulnerabilities, plus
Sniffing
countermeasures to defend against sniffing attacks.
Learn social engineering concepts and techniques,
Module 09
including how to identify theft attempts, audit human-level
Social Engineering
vulnerabilities, and suggest social engineering countermeasures.
Learn about different Denial of Service (DoS) and Distributed DoS
Module 10
(DDoS) attack techniques, plus the tools used to audit a target
Denial-of-Service
and devise DoS and DDoS countermeasures and protections.
CEH v13 Brochure
Certified Ethical Hacker Powered by AI
Module Name Course Outline
Learn the various session-hijacking techniques used to discover
Module 11
network-level session management, authentication, authorization,
Session Hijacking
and cryptographic weaknesses and associated countermeasures.
Module 12 Learn about firewalls, intrusion detection systems (IDS),
Evading IDS, Firewalls, and honeypot evasion techniques; the tools used to audit a
and Honeypots network perimeter for weaknesses; and countermeasures.
Learn about web server attacks, including a comprehensive
Module 13
attack methodology used to audit vulnerabilities in
Hacking Web Servers
web server infrastructures and countermeasures.
Learn about web application attacks, including a
Module 14
comprehensive hacking methodology for auditing
Hacking Web Applications
vulnerabilities in web applications and countermeasures.
Module 15 Learn about SQL injection attack techniques, evasion
SQL Injection techniques, and SQL injection countermeasures.
Learn about different types of encryption, threats,
Module 16
hacking methodologies, hacking tools, security tools,
Hacking Wireless Networks
and countermeasures for wireless networks.
Learn mobile platform attack vectors, Android and
Module 17
iOS hacking, mobile device management, mobile
Hacking Mobile Platforms
security guidelines, and security tools.
Learn different types of Internet of Things (IoT)
Module 18
and operational technology (OT) attacks, hacking
IoT Hacking
methodologies, hacking tools, and countermeasures.
Learn different cloud computing concepts, such as
Module 19 container technologies and serverless computing, various
Cloud Computing cloud computing threats, attacks, hacking methodologies,
and cloud security techniques and tools.
Learn about encryption algorithms, cryptography tools,
Module 20 Public Key Infrastructure (PKI), email encryption, disk
Cryptography encryption, cryptography attacks, and cryptanalysis tools.
CEH v13 Brochure
Certified Ethical Hacker Powered by AI
CEH Master
Upon successfully completing both the CEH Knowledge-based Exam and the CEH Practical
Exam, the CEH (Master) designation is awarded. A CEH (Master) signifies a high level of
proficiency in ethical hacking knowledge, skills, and abilities, with a total of 6 hours of testing to
prove their competency. The top 10 performers in both the CEH Knowledge-based Exam and
CEH Practical Exam are featured on the CEH Master Global Ethical Hacking Leader Board.
The CEH Exams at a Glance
Exam Details CEH Knowledge Exam CEH Practical Exam
Number of Questions/
125 Questions 20 Practical Challenges
Practical Challenges
Test Duration 4 Hours 6 Hours
Test Format MCQ iLabs Cyber Range
Test Availability ECC Exam, Vue ASPEN, iLabs
312-50 (ECC Exam),
Exam Prefix -
312-50 (VUE)
Passing Score 60% - 85% 60% - 85%
CEH v13 Brochure
Certified Ethical Hacker Powered by AI
CEH Skills Mapped To 49
Cybersecurity Job Roles
1. Mid-Level Information Security Auditor 26. Cyber Delivery Manager
2. Cybersecurity Auditor 27. Application Security Risk
3. Security Administrator 28. Threat Modelling Specialist
4. IT Security Administrator 29. Web Application Penetration Testing
5. Information Security Analyst 1 30. SAP Vulnerability Management
- Solution Delivery Advisor
6. Infosec Security Administrator
7. Cybersecurity Analyst 31. Ethical Hacker
(Level 1, Level 2, & Level 3)
32. SIEM Threat Responder
8. Network Security Engineer
33. Product Security Engineer / Manager
9. SOC Security Analyst
34. Endpoint Security Engineer
10. Network Engineer
35. Cybersecurity Instructor
11. Senior Security Consultant
36. Red Team Specialist
12. Information Security Manager
37. Data Protection & Privacy Officer
13. Senior SOC Analyst
38. SOAR Engineer
14. Solution Architect
39. AI Security Engineer
15. Cybersecurity Consultant
40. Sr. IAM Engineer
16. Cyber Defense Analyst
41. PCI Security Advisor
17. Vulnerability Assessment Analyst
42. Exploitation Analyst (EA)
18. Warning Analyst
43. Zero Trust Solutions Engineer / Analyst
19. All-Source Analyst
44. Cryptographic Engineer
20. Cyber Defense Incident Responder
45. AI/ML Security Engineer
21. Research & Development Specialist
46. Machine Learning Security Specialist
22. Senior Cloud Security Analyst
47. AI Penetration Tester
23. Third Party Risk Management:
48. AI/ ML Security Consultant
24. Threat Hunting Analyst
25. Penetration Ttester 49. Crypto Security Consultant
CEH v13 Brochure
Certified Ethical Hacker Powered by AI
About ICSS
Emplyement linked training program for Cybersecurity and Physical security sectors.
Trained and employed more than 2 Lac security personnel.
International College for Security Studies (ICSS) ICSS is one of the prominent market leaders in
is a very unique college in India dedicated to the field of Cyber Security as well as Physical
security studies. It was established in the year 2010 Security training, and consulting services around
under the aegis of Pragmatic Educational Society. two decades in India. Our core operation
It is national level society registered under the revolves around the ecosystem of individuals,
society's registration act, 1860. academia, industry, and government to provide
effective solutions related to security issues in
This college was established by eminent our country.
personality as late Lt. General N.S. Malik (PVSM
Retd.) with the vision of securing complete We also offer Next-gen Tech courses such as
landscape related to physical security as well as Artificial Intelligence (AI), Business Intelligence
IT Securities (Cyber Security). (BI), Competitive Intelligence (CI), Data Science
(DS), and many more courses for students,
Having a partnership with top-notch recognized academia, and industry professionals to bring
bodies in India and outside such as National Skill about a complete digital transformation.
Development Corporation (NSDC), EC-Council,
National Institute of Electronics & Information We were running first centre of excellence in
Technology (NIELIT), NASSCOM FutureSkills national security in Trivandrum, Kerala under
Prime, and relevant sector skill councils along with Public Private Partnership (PPP) model. This
all other globally recognized bodies related to centre of excellence was named as Centre for
cybersecurity to build a sustainable and enabling Advance Training in Security (CATS). We started
skill ecosystem to train private security industry maximum number of training programs related
personnel in India. to cyber security in CATS which was approved
by authorised constituted committee by the
cocern department.
CEH v13 Brochure
International College for Security Studies (ICSS)
CONTACT US:
+91 - 8744013901, 011-43870088
+91 - 9289743740
info@icssindia.in
D/452, 1ST FLOOR, RAMPHAL CHOWK,
SECTOR-7, DWARKA, NEW DELHI – 110077
www.icssindia.in