CEH v13 Ethical Hacking Course in Nagpur – Certified Ethical Hacker Training

Master the latest ethical hacking techniques: AI security, IoT hacking, cloud pentesting, and all 20 CEH v13 modules. Hands-on tools, real-world attack vectors, and countermeasures.

20 Expert Modules AI System Security (NEW) Cloud & IoT Hacking EC-Council Aligned
20
Modules
100+
Tools Covered
40+
Real Attacks
CEH v13
Latest Syllabus
πŸ“˜ CEH v13 Module-wise Syllabus
Module 01
Introduction to Ethical Hacking
  • InfoSec fundamentals, CIA triad
  • Types of Hackers (White, Black, Grey)
  • Cyber Kill Chain & MITRE ATT&CK
  • Phases of Ethical Hacking, Laws & Compliance (GDPR, ISO)
Module 02
Footprinting & Reconnaissance
  • OSINT techniques, Google Hacking
  • DNS, WHOIS, Email tracing
  • Social media footprinting
  • Tools: Maltego, Recon-ng, theHarvester
MaltegoRecon-ng
Module 03
Scanning Networks
  • Network scanning, port scanning (TCP/UDP)
  • Banner grabbing, OS fingerprinting
  • Tools: Nmap, Nessus, Masscan
Module 04
Enumeration
  • NetBIOS, SNMP, LDAP enumeration
  • User & group extraction
  • Active Directory attacks
  • Tools: Enum4Linux, SNMPwalk
Module 05
Vulnerability Analysis
  • Vulnerability assessment process
  • CVE, CVSS scoring
  • Tools: OpenVAS, Nexpose
  • Manual vs automated testing
Module 06
System Hacking
  • Password cracking techniques
  • Privilege escalation, keyloggers
  • Steganography, covering tracks
John the RipperMimikatz
Module 07
Malware Threats
  • Virus, Worms, Trojans, Ransomware
  • Malware analysis basics
  • Obfuscation & countermeasures
Module 08
Sniffing
  • Packet capturing, MITM attacks
  • ARP poisoning, MAC flooding
  • Tools: Wireshark, tcpdump, Ettercap
Module 09
Social Engineering
  • Phishing, vishing, baiting
  • Human-based attacks
  • Social engineering toolkits
Module 10
DoS / DDoS
  • DoS/DDoS attack types (SYN flood, UDP)
  • Botnets, detection & mitigation
  • Tools: LOIC, HOIC
Module 11
Session Hijacking
  • Session fixation, cookie hijacking
  • XSS & session prediction
  • Countermeasures & tools
Module 12
Evading IDS, Firewalls & Honeypots
  • IDS/IPS systems, evasion techniques
  • Firewall bypass, honeypot detection
  • Stealth scanning & tunneling
Module 13
Hacking Web Servers
  • Apache/IIS vulnerabilities
  • Web server attacks & hardening
  • Tools: Nikto, Metasploit
Module 14
Hacking Web Applications
  • OWASP Top 10 (2025 edition)
  • Authentication & input validation attacks
  • Secure coding practices
Module 15
SQL Injection
  • SQLi types (error, blind, union)
  • Exploitation with SQLmap
  • Prevention & parameterized queries
SQLmapBurp Suite
Module 16
Hacking Wireless Networks
  • Wi-Fi encryption (WEP/WPA/WPA2/WPA3)
  • Rogue AP, deauth attack, cracking
  • Tools: Aircrack-ng, Kismet
Module 17
Hacking Mobile Platforms
  • Android & iOS vulnerabilities
  • Mobile pentesting, reverse engineering
  • Tools: MobSF, Drozer
Module 18
IoT & OT Hacking
  • IoT architecture vulnerabilities
  • Smart device & SCADA/OT attacks
  • IoT security frameworks (OWASP IoT)
Module 19
Cloud Computing Security
  • Cloud models (IaaS, PaaS, SaaS)
  • Misconfiguration risks, cloud attacks
  • Tools: ScoutSuite, Prowler
⭐ NEW in v13
AI System Security
  • AI/ML vulnerabilities & adversarial attacks
  • AI-based hacking tools (ChatGPT for red team)
  • Securing AI pipelines & model poisoning
Adversarial Robustness Toolkit
πŸ› οΈ Key Tools & Certifications Prep
NmapWiresharkMetasploitBurp Suite John the RipperAircrack-ngSQLmapRecon-ng NessusOpenVASMaltegoHydra

Certification alignment: CEH v13 (ANSI accredited) | Prepares for EC-Council exam, real-world penetration testing roles.

🎯 Job Roles After CEH v13
Penetration Tester Security Analyst Red Team Operator SOC Engineer Vulnerability Assessor
βœ… PDF ready: use browser print to save as PDF