EC-Council Unleashes AI-Powered Ethical Hackers On Cybercrime

promotion

EC-Council, a world leader in cybersecurity certification, education, training, today announced the launch of Certified Ethical Hacker CEH v13 with AI-powered capabilities, a first of its kind certification in cybersecurity. Long recognized as the #1 ethical hacking certification in the world, the new and improved groundbreaking program integrates artificial intelligence (AI) learning into ethical hacking practices, giving professionals advanced skills and tools to battle global cybercriminals. 

CEH v13 provides in-depth training by integrating AI into all five phases of ethical hacking, from reconnaissance and scanning to gaining access, maintaining access, and covering tracks to help bridge the AI Chasm.

Through the course, learners will be equipped to leverage AI to enhance their hacking techniques, hack AI systems to automate their ethical hacking tasks while driving up to 40% efficiency in cyber defense and doubling their productivity.

“AI has already begun to radically transform the cybersecurity landscape,” said Jay Bavisi, Group President of EC-Council. “The launch of CEH v13 represents a major leap forward in cybersecurity education, with AI taking center stage in the curriculum. As AI tools for both attackers and defenders continue to proliferate, building AI skills is already becoming a key factor for employers looking to hire and retain cybersecurity talent.”

Inspired by the findings of EC-Council’s 2024 CEH Threat Report, the CEH v13 program is designed to leverage a unique four-phase learning framework based on the principles of Learn, Certify, Engage, and Compete, offering current and prospective cybersecurity professionals comprehensive knowledge of AI in cybersecurity through courses and hands-on learning experiences. The program includes 221 labs, attack vectors, hacking tools, a lab environment which simulates real-time environment and a Capture the Flag global hacking competition which will run all year long. The year-long competition allows individuals to continually sharpen their skills as needed while keeping them prepared to operate and defend in an increasingly complex cyber environment.

As part of the CEHv13 program, trainees will participate in 40 hours of rigorous training though instructional practice and education, followed by a yearlong, month-to-month competition across various technologies to help learners obtain world class operational skills in ethical hacking.

Course participants will experience more than 550 attack techniques and 4000+ commercial grade security tools. 

Key highlights of CEH v13 include:

  • World's first ethical hacking program harnessing the power of AI.
  • Master AI-driven skills and Learn Hacking AI systems: Learn to leverage AI for enhanced hacking techniques and how to identify and exploit vulnerabilities in AI systems.
  • Core domains of Cybersecurity: CEH strengthen your core domains of cybersecurity with a practical learning approach, which enables CEH to map across 45+ job roles over many industries.
  • Focus on the OWASP Top 10 AI Attacks: Gain expertise in mitigating threats like prompt injection, insecure output handling, training data poisoning, and more.
  • 221 hands-on labs and 4000+ commercial-grade hacking tools: Develop practical skills in a real-time simulated environment.
  • Knowledge-Based and Practical Exam: Validate your skills with both a 4-hour, knowledge-based exam and a 6-hour, fully practical exam as part of the CEH Master program.

For more information about the Certified Ethical Hacker CEH v13, visit https://www.eccouncil.org/cehv13ai/

Iimage: stevanovicigor

You Might Also Read: 

EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google’s EU Antitrust Case Dropped
US Healthcare Provider Fails To Protect Customer Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.