{"id":82374,"date":"2024-09-23T12:02:22","date_gmt":"2024-09-23T12:02:22","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82374"},"modified":"2025-09-25T07:26:07","modified_gmt":"2025-09-25T07:26:07","slug":"closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/","title":{"rendered":"Closing the AI Chasm with the New and Improved Certified Ethical Hacker"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82374\" class=\"elementor elementor-82374\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ee6c18c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ee6c18c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ea4334e\" data-id=\"ea4334e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7be3f4 elementor-widget elementor-widget-text-editor\" data-id=\"a7be3f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The cybersecurity industry is in the midst of a pressing and all too critical challenge: a massive skills shortage at all levels of the profession. In fact, according to the U.S. Bureau of Labor Statistics, there are currently as many as <a href=\"https:\/\/blog.dol.gov\/2023\/09\/22\/see-yourself-in-cybersecurity\" target=\"_blank\" rel=\"noopener\">700,000 open cybersecurity positions<\/a>, with that number set to grow. As both cybercrime and cyber defense continue to evolve at an unprecedented pace, fueled by the rise of sophisticated technologies like AI, there is an acute need to train a new generation of cybersecurity professionals ready to answer the call.<\/p><p>At EC-Council, we&#8217;re committed to bridging this gap by equipping ethical hackers with the cutting-edge skills and knowledge they need to combat modern cyber threats.<\/p><p>That is why I am thrilled to announce today a major leap forward in our mission: the launch of <strong><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker CEH v13<\/a> with AI powered Capabilities<\/strong>, the world&#8217;s first <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-ethical-hacking\/\" target=\"_blank\" rel=\"noopener\">ethical hacking<\/a> program that fully integrates artificial intelligence learning and skills. This groundbreaking certification program marks a new era in cybersecurity education, where AI takes center stage.<\/p><h2>Why AI Matters in Cybersecurity<\/h2><p>Since it splashed onto the world stage in 2023, the impact of AI has left the realm of speculation and is now having significant and tangible impact on the cybersecurity landscape. Cybercriminals are leveraging AI to automate attacks, develop sophisticated malware, and exploit vulnerabilities at an alarming rate, while many cybersecurity technologies are integrating AI capabilities to empower defenders and equip them with new means to defend the organizations they serve. In order to address these rapid advancements, cybersecurity professionals must have pathways to learning on how to leverage AI for enhanced defense strategies and defend against AI powered attacks.<\/p><h2>CEH v13: Forging the Next Generation of Ethical Hackers<\/h2><p>Inspired by the findings of our<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/eccouncil-ceh-cybersecurity-threat-report-ai-report\/\" target=\"_blank\" rel=\"noopener\"><b> 2024 CEH Threat Report<\/b><\/a>, CEH v13 will equip cybersecurity professionals with real world skills and knowledge. In building CEH, it was always a top priority that those who finish the program are immediately ready to enter the cybersecurity workforce and start long, meaningful careers in the industry.<\/p><p>With CEHv13ai I am proud to say that it continues in that tradition, leveraging our unique education framework based on the core tenets of Learn, Certify, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh-engage\/\" target=\"_blank\" rel=\"noopener\">Engage<\/a>, and<a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh-compete\/\" target=\"_blank\" rel=\"noopener\"> Compete<\/a>, and taking cybersecurity learners beyond theory and into practice.<\/p><p>Those taking the certification will learn crucial skills in leveraging AI for enhanced hacking techniques, including reconnaissance, vulnerability scanning, and exploit development. They will also be able to gain in-depth knowledge of AI systems, gaining understanding of how to identify and exploit vulnerabilities in these technologies. Building on these skills, learners will develop expertise in mitigating the latest AI-powered threats as identified by the OWASP Top 10 AI Threats, such as prompt injection, insecure output handling, and training data poisoning.<\/p><p>As previously mentioned, hand-on experience is a central component of this certification. With CEHv13ai, learners will benefit from a world-class training program featuring 221 hands-on labs, utilizing over 4,000 commercial-grade hacking tools in a real-time simulated environment.<\/p><p>Finally, the certification also comes with the opportunity to compete in a year long Capture the Flag competition. Engaging with this event offers a continuous opportunity for eager learners to sharpen their skills and test their knowledge in a global hacking competition, with the chance to take home the win and add an impressive credential to their resume.<\/p><h2>Closing the Skills Gap, Together<\/h2><p>At <a href=\"https:\/\/www.eccouncil.org\/\">EC-Council<\/a>, we believe that empowering ethical hackers with the right skills is crucial to building a safer digital world, closing the massive cybersecurity skills gap, and providing individuals around the globe with a pathway into highly valuable and rewarding careers. CEH v13 is a testament to our commitment to staying ahead of the curve and providing the most relevant and advanced cybersecurity training available, and I am proud of all of those who have contributed towards making this new version the very best in the industry.<\/p><p>I hope that you will join us in this mission to bridge the cybersecurity skills gap and create a more secure future for all. Those interested in embarking on the journey to becoming an AI-powered ethical hacker can learn more here.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The cybersecurity industry is in the midst of a pressing and all too critical challenge: a massive skills shortage at all levels of the profession. In fact, according to the U.S. Bureau of Labor Statistics, there are currently as many as 700,000 open cybersecurity positions, with that number set to grow. As both cybercrime and&hellip;<\/p>\n","protected":false},"author":32,"featured_media":82381,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12083],"tags":[],"class_list":{"0":"post-82374","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethical-hacking"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Closing the AI Chasm and Certified Ethical Hacker (CEH) | EC-Council<\/title>\n<meta name=\"description\" content=\"Discover how the Certified Ethical Hacker program at EC-Council bridges the AI chasm, empowering the next generation of cybersecurity professionals to combat threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Closing the AI Chasm and Certified Ethical Hacker (CEH) | EC-Council\" \/>\n<meta property=\"og:description\" content=\"Discover how the Certified Ethical Hacker program at EC-Council bridges the AI chasm, empowering the next generation of cybersecurity professionals to combat threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-23T12:02:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T07:26:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Closing-the-AI-Chasm-with-the-New-and-Improved-Certified-Ethical-Hacker-blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Closing the AI Chasm and Certified Ethical Hacker (CEH) | EC-Council\" \/>\n<meta name=\"twitter:description\" content=\"Discover how the Certified Ethical Hacker program at EC-Council bridges the AI chasm, empowering the next generation of cybersecurity professionals to combat threats.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Closing-the-AI-Chasm-with-the-New-and-Improved-Certified-Ethical-Hacker-blog.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Closing the AI Chasm with the New and Improved Certified Ethical Hacker\",\"datePublished\":\"2024-09-23T12:02:22+00:00\",\"dateModified\":\"2025-09-25T07:26:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/press-release-BG.jpg\",\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/\",\"name\":\"Closing the AI Chasm and Certified Ethical Hacker (CEH) | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/press-release-BG.jpg\",\"datePublished\":\"2024-09-23T12:02:22+00:00\",\"dateModified\":\"2025-09-25T07:26:07+00:00\",\"description\":\"Discover how the Certified Ethical Hacker program at EC-Council bridges the AI chasm, empowering the next generation of cybersecurity professionals to combat threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/press-release-BG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/press-release-BG.jpg\",\"width\":1080,\"height\":1080,\"caption\":\"Closing the AI Chasm and Certified Ethical Hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ethical Hacking\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Closing the AI Chasm with the New and Improved Certified Ethical Hacker\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Closing the AI Chasm and Certified Ethical Hacker (CEH) | EC-Council","description":"Discover how the Certified Ethical Hacker program at EC-Council bridges the AI chasm, empowering the next generation of cybersecurity professionals to combat threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/","og_locale":"en_US","og_type":"article","og_title":"Closing the AI Chasm and Certified Ethical Hacker (CEH) | EC-Council","og_description":"Discover how the Certified Ethical Hacker program at EC-Council bridges the AI chasm, empowering the next generation of cybersecurity professionals to combat threats.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-09-23T12:02:22+00:00","article_modified_time":"2025-09-25T07:26:07+00:00","og_image":[{"width":1500,"height":750,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Closing-the-AI-Chasm-with-the-New-and-Improved-Certified-Ethical-Hacker-blog.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Closing the AI Chasm and Certified Ethical Hacker (CEH) | EC-Council","twitter_description":"Discover how the Certified Ethical Hacker program at EC-Council bridges the AI chasm, empowering the next generation of cybersecurity professionals to combat threats.","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Closing-the-AI-Chasm-with-the-New-and-Improved-Certified-Ethical-Hacker-blog.png","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Closing the AI Chasm with the New and Improved Certified Ethical Hacker","datePublished":"2024-09-23T12:02:22+00:00","dateModified":"2025-09-25T07:26:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/"},"wordCount":698,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/press-release-BG.jpg","articleSection":["Ethical Hacking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/","name":"Closing the AI Chasm and Certified Ethical Hacker (CEH) | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/press-release-BG.jpg","datePublished":"2024-09-23T12:02:22+00:00","dateModified":"2025-09-25T07:26:07+00:00","description":"Discover how the Certified Ethical Hacker program at EC-Council bridges the AI chasm, empowering the next generation of cybersecurity professionals to combat threats.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/press-release-BG.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/press-release-BG.jpg","width":1080,"height":1080,"caption":"Closing the AI Chasm and Certified Ethical Hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/closing-the-ai-chasm-with-the-new-and-improved-certified-ethical-hacker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Ethical Hacking","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/"},{"@type":"ListItem","position":4,"name":"Closing the AI Chasm with the New and Improved Certified Ethical Hacker"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82374"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82381"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}