● NEW: VERSION 13

Certified Ethical Hacker
(CEH v13) AI

The World's First AI-Powered Ethical Hacking Certification.
[ Duration: 2 Months | 20 Modules ]

🤖 AI-Integrated

Learn to use AI tools for automated threat detection and advanced evasion techniques.

⚔️ Red Team Focus

Master the 5 Phases of Hacking: Recon, Scanning, Access, Maintaining Access, Clearing Tracks.

☁️ Cloud & IoT

Deep dive into modern infrastructure attacks: AWS, Azure, Docker Containers, and IoT.

The Master Syllabus

MODULE 01

Introduction to Ethical Hacking

  • Information Security Overview & Controls
  • Hacking Concepts & Hacker Classes
  • Cyber Kill Chain & MITRE ATT&CK
  • Information Security Laws & Standards
MODULE 02

Footprinting & Reconnaissance

  • Search Engines & Advanced Google Hacking
  • Social Networking & People Search
  • DNS, Network & Email Footprinting
  • AI-Powered Recon Tools
MODULE 03

Scanning Networks

  • Host, Port & Service Discovery
  • OS Fingerprinting (Active/Passive)
  • Scanning Beyond IDS/Firewall
  • Network Scanning Countermeasures
MODULE 04

Enumeration

  • NetBIOS, SNMP, LDAP Enumeration
  • NTP, NFS, SMTP & DNS Enumeration
  • Enumeration Countermeasures
MODULE 05

Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Scoring Systems (CVSS)
  • Automated Reporting Tools
MODULE 06

System Hacking

  • Gaining Access & Cracking Passwords
  • Privilege Escalation Techniques
  • Executing Applications & Keyloggers
  • Steganography & Clearing Logs
MODULE 07 [CRITICAL]

Malware Threats

  • APT & Fileless Malware Concepts
  • AI-Based Malware Generation
  • Trojans, Viruses & Worms Analysis
  • Malware Reverse Engineering Basics
MODULE 08

Sniffing

  • MAC Attacks & DHCP Attacks
  • ARP Poisoning & Spoofing
  • Wireshark Packet Analysis
MODULE 09

Social Engineering

  • Phishing, Vishing & Smishing
  • AI-Driven Deepfakes & Voice Cloning
  • Physical Security & Insider Threats
MODULE 10

Denial-of-Service

  • DoS vs DDoS Attack Vectors
  • Botnets & Botnet Scanning
  • DDoS Protection Strategies
MODULE 11

Session Hijacking

  • Application vs Network Level Hijacking
  • Token Theft & XSS Hijacking
  • Session Fixation Attacks
MODULE 12

Evading IDS, Firewalls & Honeypots

  • Firewall Evasion Techniques
  • Detecting & Bypassing Honeypots
  • Obfuscation Methods
MODULE 13

Hacking Web Servers

  • Web Server Architecture & Flaws
  • Patch Management Weaknesses
  • Web Server Attack Methodologies
MODULE 14

Hacking Web Applications

  • OWASP Top 10 Vulnerabilities
  • Web API & Webhook Security
  • Parameter Tampering & XSS
MODULE 15

SQL Injection

  • In-Band, Blind & Out-of-Band SQLi
  • SQLi Evasion Techniques
  • Database Extraction Tools (Sqlmap)
MODULE 16

Hacking Wireless Networks

  • WEP/WPA/WPA2/WPA3 Cracking
  • Bluetooth & RFID Hacking
  • Rogue Access Points
MODULE 17

Hacking Mobile Platforms

  • Android Rooting & iOS Jailbreaking
  • Mobile Device Management (MDM)
  • Mobile Malware Vectors
MODULE 18

IoT and OT Hacking

  • IoT Architecture & Vulnerabilities
  • Operational Technology (OT) Attacks
  • SCADA/ICS System Security
MODULE 19

Cloud Computing

  • AWS, Azure & Google Cloud Hacking
  • Container (Docker/K8s) Security
  • Serverless Architecture Threats
MODULE 20

Cryptography

  • Encryption Algorithms (AES, RSA, ECC)
  • Public Key Infrastructure (PKI)
  • Cryptanalysis & Attack Methods

*Note: The points above are a summary. The course includes detailed sub-topics, practical labs, and real-world scenarios.

Ready to Certify?

CEHv13 Registration

Enter your details to receive the full brochure and upcoming batch dates.

Defend the Future.

Join the elite league of AI Certified Ethical Hackers.

CONTACT +91-7992281130
EMAIL learning@suviksan.com

© 2025 Suviksan Technologies Pvt. Ltd. | CEH is a registered trademark of EC-Council.