EC-Council Unleashes AI-Powered Ethical Hackers On Cybercrime

promotion

EC-Council, a world leader in cybersecurity certification, education, training, today announced the launch of Certified Ethical Hacker CEH v13 with AI-powered capabilities, a first of its kind certification in cybersecurity. Long recognized as the #1 ethical hacking certification in the world, the new and improved groundbreaking program integrates artificial intelligence (AI) learning into ethical hacking practices, giving professionals advanced skills and tools to battle global cybercriminals. 

CEH v13 provides in-depth training by integrating AI into all five phases of ethical hacking, from reconnaissance and scanning to gaining access, maintaining access, and covering tracks to help bridge the AI Chasm.

Through the course, learners will be equipped to leverage AI to enhance their hacking techniques, hack AI systems to automate their ethical hacking tasks while driving up to 40% efficiency in cyber defense and doubling their productivity.

“AI has already begun to radically transform the cybersecurity landscape,” said Jay Bavisi, Group President of EC-Council. “The launch of CEH v13 represents a major leap forward in cybersecurity education, with AI taking center stage in the curriculum. As AI tools for both attackers and defenders continue to proliferate, building AI skills is already becoming a key factor for employers looking to hire and retain cybersecurity talent.”

Inspired by the findings of EC-Council’s 2024 CEH Threat Report, the CEH v13 program is designed to leverage a unique four-phase learning framework based on the principles of Learn, Certify, Engage, and Compete, offering current and prospective cybersecurity professionals comprehensive knowledge of AI in cybersecurity through courses and hands-on learning experiences. The program includes 221 labs, attack vectors, hacking tools, a lab environment which simulates real-time environment and a Capture the Flag global hacking competition which will run all year long. The year-long competition allows individuals to continually sharpen their skills as needed while keeping them prepared to operate and defend in an increasingly complex cyber environment.

As part of the CEHv13 program, trainees will participate in 40 hours of rigorous training though instructional practice and education, followed by a yearlong, month-to-month competition across various technologies to help learners obtain world class operational skills in ethical hacking.

Course participants will experience more than 550 attack techniques and 4000+ commercial grade security tools. 

Key highlights of CEH v13 include:

  • World's first ethical hacking program harnessing the power of AI.
  • Master AI-driven skills and Learn Hacking AI systems: Learn to leverage AI for enhanced hacking techniques and how to identify and exploit vulnerabilities in AI systems.
  • Core domains of Cybersecurity: CEH strengthen your core domains of cybersecurity with a practical learning approach, which enables CEH to map across 45+ job roles over many industries.
  • Focus on the OWASP Top 10 AI Attacks: Gain expertise in mitigating threats like prompt injection, insecure output handling, training data poisoning, and more.
  • 221 hands-on labs and 4000+ commercial-grade hacking tools: Develop practical skills in a real-time simulated environment.
  • Knowledge-Based and Practical Exam: Validate your skills with both a 4-hour, knowledge-based exam and a 6-hour, fully practical exam as part of the CEH Master program.

For more information about the Certified Ethical Hacker CEH v13, visit https://www.eccouncil.org/cehv13ai/

Iimage: stevanovicigor

You Might Also Read: 

EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google’s EU Antitrust Case Dropped
US Healthcare Provider Fails To Protect Customer Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Cobalt Iron

Cobalt Iron

Cobalt Iron is a global leader in SaaS-based enterprise backup and data protection technology.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

Qevlar AI

Qevlar AI

Qevlar AI empowers SOC teams, to eliminate redundant tasks and refocus on what truly matters - making the most of every employee within the SecOps team.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.