EC-Council Unleashes AI-Powered Ethical Hackers On Cybercrime

promotion

EC-Council, a world leader in cybersecurity certification, education, training, today announced the launch of Certified Ethical Hacker CEH v13 with AI-powered capabilities, a first of its kind certification in cybersecurity. Long recognized as the #1 ethical hacking certification in the world, the new and improved groundbreaking program integrates artificial intelligence (AI) learning into ethical hacking practices, giving professionals advanced skills and tools to battle global cybercriminals. 

CEH v13 provides in-depth training by integrating AI into all five phases of ethical hacking, from reconnaissance and scanning to gaining access, maintaining access, and covering tracks to help bridge the AI Chasm.

Through the course, learners will be equipped to leverage AI to enhance their hacking techniques, hack AI systems to automate their ethical hacking tasks while driving up to 40% efficiency in cyber defense and doubling their productivity.

“AI has already begun to radically transform the cybersecurity landscape,” said Jay Bavisi, Group President of EC-Council. “The launch of CEH v13 represents a major leap forward in cybersecurity education, with AI taking center stage in the curriculum. As AI tools for both attackers and defenders continue to proliferate, building AI skills is already becoming a key factor for employers looking to hire and retain cybersecurity talent.”

Inspired by the findings of EC-Council’s 2024 CEH Threat Report, the CEH v13 program is designed to leverage a unique four-phase learning framework based on the principles of Learn, Certify, Engage, and Compete, offering current and prospective cybersecurity professionals comprehensive knowledge of AI in cybersecurity through courses and hands-on learning experiences. The program includes 221 labs, attack vectors, hacking tools, a lab environment which simulates real-time environment and a Capture the Flag global hacking competition which will run all year long. The year-long competition allows individuals to continually sharpen their skills as needed while keeping them prepared to operate and defend in an increasingly complex cyber environment.

As part of the CEHv13 program, trainees will participate in 40 hours of rigorous training though instructional practice and education, followed by a yearlong, month-to-month competition across various technologies to help learners obtain world class operational skills in ethical hacking.

Course participants will experience more than 550 attack techniques and 4000+ commercial grade security tools. 

Key highlights of CEH v13 include:

  • World's first ethical hacking program harnessing the power of AI.
  • Master AI-driven skills and Learn Hacking AI systems: Learn to leverage AI for enhanced hacking techniques and how to identify and exploit vulnerabilities in AI systems.
  • Core domains of Cybersecurity: CEH strengthen your core domains of cybersecurity with a practical learning approach, which enables CEH to map across 45+ job roles over many industries.
  • Focus on the OWASP Top 10 AI Attacks: Gain expertise in mitigating threats like prompt injection, insecure output handling, training data poisoning, and more.
  • 221 hands-on labs and 4000+ commercial-grade hacking tools: Develop practical skills in a real-time simulated environment.
  • Knowledge-Based and Practical Exam: Validate your skills with both a 4-hour, knowledge-based exam and a 6-hour, fully practical exam as part of the CEH Master program.

For more information about the Certified Ethical Hacker CEH v13, visit https://www.eccouncil.org/cehv13ai/

Iimage: stevanovicigor

You Might Also Read: 

EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google’s EU Antitrust Case Dropped
US Healthcare Provider Fails To Protect Customer Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

Abion

Abion

At Abion (formerly BRANDIT), we empower your business by providing comprehensive brand protection and web security services.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

QuoLab

QuoLab

QuoLab empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem.

Saepio Solutions

Saepio Solutions

Saepio promote an all-encompassing approach to cybersecurity, ensuring the appropriate balance of budget and resource across Policy, Product and People.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.