

You can have security gaps checked by external consultants, for example. Or you can protect your system yourself. In 5.5 days of intensive training, you will be optimally prepared for practical work in defending against cybercrime and for the exam for the internationally recognized certification as a Certified Ethical Hacker.
In a realistic hacking environment, you will learn how to protect your company against Trojans, viruses and worms, SQL injections as well as MAC, DHCP and DDoS attacks. You will be able to scan IT systems for threats, hack and secure them. To ensure that what you learn is not misused, course participants sign a corresponding agreement before each course. This is because as a CEH Certified Ethical Hacker, you use exactly the same tools as a hacker, but not to attack, but to defend.
Overview:
Requirements:
To get the most out of CEH v13, you should have the following knowledge and experience:
Work Experience & IT Fundamentals
Networking skills
Linux & Windows Command Line
Basic Security Knowledge
Optional—but helpful
The training is structured in intervals and provides ample time to reinforce what has been learned and to apply the material independently in the labs outside of class. Class time is focused on structured instruction and is effectively supplemented by the labs provided. This creates a balanced and sustainable learning experience.
We will provide you with the EC-Council CEH Elite package. It includes the following materials and allows you to review and reinforce the course content between class sessions.
We will send you an exam voucher, which you can redeem at the EC-Council Exam Center. There, you will create a user account and can choose your exam date and time. The exam is taken online and is proctored live by an EC-Council proctor.
On the day of the exam, log in to your account and connect with the remote proctor using the “Start Exam” feature. You will need a PC or Mac with a camera, microphone, and a stable internet connection. Before the exam begins, the proctor will conduct a brief identity verification, inspect your room and surroundings, and ensure that no aids are present (e.g., books, notes, or other devices). Have your ID or passport ready for the identity verification.
During the exam, you must allow screen sharing, and the proctor will start the exam for you. You must remain in the camera's field of view for the entire duration of the exam.
After submitting your exam, you'll see your results right on the screen. Your digital certificate will be available on the EC-Council portal (ASPEN) a few days later.
And if you didn't pass: Another voucher for a retake is included in the course price.
Examination:
MCSE and CCNA graduates who wish to obtain additional certification in the field of security. Individuals who wish to earn an international certification in the field of ethical hacking. Security consultants who wish to obtain additional certification at the international level. Anyone who wantsspecialist .
Common job roles for CEH:
Mid-Level Information Security Auditor, Cybersecurity Auditor, Security Administrator, IT Security Administrator, Cyber Defense analyst, Vulnerability Assessment analyst, Warning analyst, Information Security analyst , Security analyst , Infosec Security Administrator, Cybersecurity analyst 1, Level 2 & Level 3, Network Security Engineer, SOC Security analyst, Security analyst, Network Engineer, Senior Security Consultant, Information Security Manager, Senior SOC analyst, Solution Architect, and Cybersecurity Consultant
Form of learning
Learning form
No filter results
The training is conducted in cooperation with the accredited training organization Digicomp Academy AG.
Digicomp is an ATC-Accredited Training Center authorized by the EC-Council.
Participants' data will be transmitted to Digicomp Academy AG for the purpose of conducting the training.
The latter collects and processes data under its own responsibility.
Please take note of the relevant data protection declaration.
