EC-Council Unleashes AI-Powered Ethical Hackers On Cybercrime

promotion

EC-Council, a world leader in cybersecurity certification, education, training, today announced the launch of Certified Ethical Hacker CEH v13 with AI-powered capabilities, a first of its kind certification in cybersecurity. Long recognized as the #1 ethical hacking certification in the world, the new and improved groundbreaking program integrates artificial intelligence (AI) learning into ethical hacking practices, giving professionals advanced skills and tools to battle global cybercriminals. 

CEH v13 provides in-depth training by integrating AI into all five phases of ethical hacking, from reconnaissance and scanning to gaining access, maintaining access, and covering tracks to help bridge the AI Chasm.

Through the course, learners will be equipped to leverage AI to enhance their hacking techniques, hack AI systems to automate their ethical hacking tasks while driving up to 40% efficiency in cyber defense and doubling their productivity.

“AI has already begun to radically transform the cybersecurity landscape,” said Jay Bavisi, Group President of EC-Council. “The launch of CEH v13 represents a major leap forward in cybersecurity education, with AI taking center stage in the curriculum. As AI tools for both attackers and defenders continue to proliferate, building AI skills is already becoming a key factor for employers looking to hire and retain cybersecurity talent.”

Inspired by the findings of EC-Council’s 2024 CEH Threat Report, the CEH v13 program is designed to leverage a unique four-phase learning framework based on the principles of Learn, Certify, Engage, and Compete, offering current and prospective cybersecurity professionals comprehensive knowledge of AI in cybersecurity through courses and hands-on learning experiences. The program includes 221 labs, attack vectors, hacking tools, a lab environment which simulates real-time environment and a Capture the Flag global hacking competition which will run all year long. The year-long competition allows individuals to continually sharpen their skills as needed while keeping them prepared to operate and defend in an increasingly complex cyber environment.

As part of the CEHv13 program, trainees will participate in 40 hours of rigorous training though instructional practice and education, followed by a yearlong, month-to-month competition across various technologies to help learners obtain world class operational skills in ethical hacking.

Course participants will experience more than 550 attack techniques and 4000+ commercial grade security tools. 

Key highlights of CEH v13 include:

  • World's first ethical hacking program harnessing the power of AI.
  • Master AI-driven skills and Learn Hacking AI systems: Learn to leverage AI for enhanced hacking techniques and how to identify and exploit vulnerabilities in AI systems.
  • Core domains of Cybersecurity: CEH strengthen your core domains of cybersecurity with a practical learning approach, which enables CEH to map across 45+ job roles over many industries.
  • Focus on the OWASP Top 10 AI Attacks: Gain expertise in mitigating threats like prompt injection, insecure output handling, training data poisoning, and more.
  • 221 hands-on labs and 4000+ commercial-grade hacking tools: Develop practical skills in a real-time simulated environment.
  • Knowledge-Based and Practical Exam: Validate your skills with both a 4-hour, knowledge-based exam and a 6-hour, fully practical exam as part of the CEH Master program.

For more information about the Certified Ethical Hacker CEH v13, visit https://www.eccouncil.org/cehv13ai/

Iimage: stevanovicigor

You Might Also Read: 

EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google’s EU Antitrust Case Dropped
US Healthcare Provider Fails To Protect Customer Data »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Trusted Technologies and Solutions (TTS)

Trusted Technologies and Solutions (TTS)

TTS is a security consulting company specialised on business continuity and crisis management, information security management, information risk management and identity and access management.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

VPNBlade

VPNBlade

VPNBlade is your go-to resource for expert reviews and advice on VPN services.

Inoxoft

Inoxoft

Inoxoft delivers IT security consulting, assessment, and protection services to help businesses secure their infrastructure, applications, and sensitive data.