Technical labor programs endorsed by the Ministry of Education
View all technical programsDescubre nuestra trayectoria como institución de educación de alta calidad
Programas alineados a certificaciones internacionales y necesidades del mercado global
Ver Oferta Académica CompletaThe CEH v13 certification trains you as an ethical hacker with skills in artificial intelligence. You will learn to identify vulnerabilities, simulate cyberattacks, automate processes using AI, and apply effective countermeasures in real-world scenarios. The program includes access to a practice…
The CEH v13 certification trains you as an ethical hacker with skills in artificial intelligence. You will learn to identify vulnerabilities, simulate cyberattacks, automate processes using AI, and apply effective countermeasures in real-world scenarios.
The program includes access to a practice environment with over 4,000 tools and 221 labs in a cyber range.
At the end of the course, participants will be able to:
To make the most of the course, participants are required to have:
| Certificación internacional Ethical Hacker (CEH) v13 | Applies |
|---|---|
| Certificación internacional Ethical Hacker (CEH) v13 | 40 hours |
The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.
The instructor (live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.
The methodology seeks that the student does not memorize, but rather understands the concepts and how they are applied in a work environment.
As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.
You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.
Pre-enroll nowMake your payment quickly, safely and reliably
- For bank transfer payments, request the details by email
capacita@aulamatriz.edu.co.
- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.
The CEH v13 certification trains you as an ethical hacker with skills in artificial intelligence. You will learn to identify vulnerabilities, simulate cyberattacks, automate processes using AI, and apply effective countermeasures in real-world scenarios.
The program includes access to a practice environment with over 4,000 tools and 221 labs in a cyber range.
At the end of the course, participants will be able to:
To make the most of the course, participants are required to have:
| Certificación internacional Ethical Hacker (CEH) v13 | Applies |
|---|---|
| Certificación internacional Ethical Hacker (CEH) v13 | 40 hours |
The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.
The instructor(live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.
La metodología persigue que el estudiante "does not memorize", but rather "understands" the concepts and how they are applied in a work environment."
As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.
Make your payment quickly, safely and reliably
- For bank transfer payments, request the details by email
capacita@aulamatriz.edu.co.
- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.
Understand the fundamentals of ethical hacking, information security concepts, controls, legal frameworks, and basic procedures.
Learn techniques to gather information about the target before conducting an attack, including search tools and passive/active scanning.
Explore scanning methods to identify devices, open ports, and active services on a network, using tools such as Nmap.
Delves into how to gather detailed information such as users, passwords, and shared resources, using protocols like SNMP, LDAP, and SMB.
Identify weaknesses in networks and systems using automated scanning tools such as Nessus and OpenVAS.
Learn techniques to compromise operating systems, escalate privileges, hide presence, and cover the attacker's tracks.
Study types of malware such as viruses, worms, trojans, ransomware, and APTs. Learn static and dynamic analysis of malware.
Learn to capture and analyze network traffic to detect credentials, sessions, and unencrypted vulnerabilities.
Discover how attackers manipulate people to gain access. Analyze phishing, pretexting, and baiting techniques.
Study how to saturate systems, services, and networks with traffic to render them inoperable, and how to mitigate them.
Learn to intercept and hijack active sessions in networks or applications, and how to protect them.
Analyzes how attackers evade defense systems to remain hidden, including fragmentation and tunneling techniques.
Explore vulnerabilities in web servers such as Apache or IIS and how to exploit them using specialized tools.
Dives into attacks such as XSS, CSRF, and RFI, with a focus on the use of automated and customized methods.
Learn SQL injection techniques to access databases and extract confidential information.
Study wireless protocols, Wi-Fi vulnerabilities (WEP, WPA2, WPA3), and password cracking techniques.
Learn about attack vectors in Android and iOS systems, analysis of malicious apps, and mobile security tools.
Analyze threats in connected devices (IoT), industrial environments (SCADA), and how to protect these vulnerable systems.
Explore risks in cloud environments, vulnerabilities in containers and serverless servers, and effective countermeasures.
Study encryption algorithms, attacks on cryptography (such as cracking, MITM, downgrade), and the use of tools like GPG and PKI.
Solo te pedimos tu número para explicarte nuestra metodología y brindarte una atención personalizada.