Certified Ethical Hacker (CEH) v13

Certified Ethical Hacker (CEH) v13

Módulos

Módulo 01 Introducción al Hacking Ético

Comprende los fundamentos del hacking ético, conceptos de seguridad de la información, controles, marcos legales y procedimientos básicos.

Aprende técnicas para recolectar información sobre el objetivo antes de realizar un ataque, incluyendo herramientas de búsqueda y escaneo pasivo/activo.

Explora métodos de escaneo para identificar dispositivos, puertos abiertos y servicios activos en una red, usando herramientas como Nmap.

Profundiza en cómo recopilar información detallada como usuarios, contraseñas y recursos compartidos, utilizando protocolos como SNMP, LDAP y SMB.

Identifica debilidades en redes y sistemas mediante herramientas de escaneo automatizado como Nessus y OpenVAS.

Aprende técnicas para comprometer sistemas operativos, escalar privilegios, ocultar presencia y cubrir rastros del atacante.

Estudia tipos de malware como virus, gusanos, troyanos, ransomware y APTs. Aprende análisis estático y dinámico de malware.

Aprende a capturar y analizar tráfico de red para detectar credenciales, sesiones y vulnerabilidades no cifradas.

Descubre cómo los atacantes manipulan a las personas para obtener acceso. Analiza técnicas de phishing, pretexting y baiting.

Estudia cómo saturar sistemas, servicios y redes con tráfico para dejarlos inoperativos, y cómo mitigarlos.

Aprende a interceptar y secuestrar sesiones activas en redes o aplicaciones, y cómo protegerlas.

Analiza cómo los atacantes eluden sistemas de defensa para mantenerse ocultos, incluyendo técnicas de fragmentación y tunelización.

Explora vulnerabilidades en servidores web como Apache o IIS y cómo explotarlas con herramientas especializadas.

Profundiza en ataques como XSS, CSRF, y RFI, con un enfoque en el uso de métodos automatizados y personalizados.

Aprende técnicas de inyección SQL para acceder a bases de datos y extraer información confidencial.

Estudia los protocolos inalámbricos, vulnerabilidades de Wi-Fi (WEP, WPA2, WPA3) y técnicas de cracking de contraseñas.

Conoce vectores de ataque en sistemas Android e iOS, análisis de apps maliciosas y herramientas de seguridad móvil.

Analiza amenazas en dispositivos conectados (IoT), entornos industriales (SCADA) y cómo proteger estos sistemas vulnerables.

Explora riesgos en entornos cloud, vulnerabilidades en contenedores y servidores sin servidor, y contramedidas efectivas.

Estudia algoritmos de cifrado, ataques a criptografía (como cracking, MITM, downgrade), y uso de herramientas como GPG y PKI.

The CEH v13 certification trains you as an ethical hacker with skills in artificial intelligence. You will learn to identify vulnerabilities, simulate cyberattacks, automate processes using AI, and apply effective countermeasures in real-world scenarios.

The program includes access to a practice environment with over 4,000 tools and 221 labs in a cyber range.

At the end of the course, participants will be able to:

  • • Train professionals with mastery of the phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
  • • Teach the use of artificial intelligence tools to detect and mitigate cyber threats
  • • Prepare students for the CEH Knowledge and CEH Practical exams
  • • Provide training in defending real-world infrastructures through Cyber Range simulations
  • • Foster analytical skills, critical thinking, and proactive action against advanced threats

To make the most of the course, participants are required to have:

  • • Basic knowledge of networking, operating systems, and cybersecurity
  • • Familiarity with concepts such as TCP/IP, firewalls, and communication protocols
  • These prerequisites ensure that participants can focus on the implementation and development of skills using artificial intelligence to prioritize the cybersecurity of their infrastructures

Certified Ethical Hacker (CEH) v13 Applies
Certified Ethical Hacker (CEH) v13 40 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor (live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

The methodology seeks that the student does not memorize, but rather understands the concepts and how they are applied in a work environment.

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Pre-enrollment

You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.

Pre-enroll now

Infinity Payments

Make your payment quickly, safely and reliably


- For bank transfer payments, request the details by email capacita@aulamatriz.edu.co.

- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.

To continue you must
Or if you don't have an account you must

Description

The CEH v13 certification trains you as an ethical hacker with skills in artificial intelligence. You will learn to identify vulnerabilities, simulate cyberattacks, automate processes using AI, and apply effective countermeasures in real-world scenarios.

The program includes access to a practice environment with over 4,000 tools and 221 labs in a cyber range.

Objectives

At the end of the course, participants will be able to:

  • • Train professionals with mastery of the phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
  • • Teach the use of artificial intelligence tools to detect and mitigate cyber threats
  • • Prepare students for the CEH Knowledge and CEH Practical exams
  • • Provide training in defending real-world infrastructures through Cyber Range simulations
  • • Foster analytical skills, critical thinking, and proactive action against advanced threats

To make the most of the course, participants are required to have:

  • • Basic knowledge of networking, operating systems, and cybersecurity
  • • Familiarity with concepts such as TCP/IP, firewalls, and communication protocols
  • These prerequisites ensure that participants can focus on the implementation and development of skills using artificial intelligence to prioritize the cybersecurity of their infrastructures

offers

Certified Ethical Hacker (CEH) v13 Applies
Certified Ethical Hacker (CEH) v13 40 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor(live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

La metodología persigue que el estudiante "does not memorize", but rather "understands" the concepts and how they are applied in a work environment."

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Pre-enrollment

You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.

-->