The CEH exam (312-50) is available at the ECC Exam Centre and Pearson Vue testing centers.

Similar documents
CEH: CERTIFIED ETHICAL HACKER v9

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Certified Ethical Hacker

EC-Council C EH. Certified Ethical Hacker. Program Brochure

CyberVista Certify cybervista.net

Certified Ethical Hacker V9

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Course 831 Certified Ethical Hacker v9

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

CRAW Security. CRAW Security

Certified Ethical Hacker (CEH)

Certified Ethical Hacker - CEH v9 Training & Certification

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

CertStore is a ISO (International Standard Organization) Certified and Approved by Govt. Of India.

Certified Cyber Security Specialist

Security+ SY0-501 Study Guide Table of Contents

CPTE: Certified Penetration Testing Engineer

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Software Development & Education Center Security+ Certification

Ingram Micro Cyber Security Portfolio

CCISO Blueprint v1. EC-Council

You Can Click at the enclosed Link to check out AATP Authorization:

Ethical Hacking and Prevention

DIS10.1 Ethical Hacking and Countermeasures

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

A guide to CompTIA training and certification DDLS Australia Pty Ltd

CCNA Cybersecurity Operations. Program Overview

A Passage to Penetration Testing!

CERTIFICATION TRAINING - ISC2

CND Exam Blueprint v2.0

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Training on CREST Practitioner Security Analyst (CPSA)

CompTIA Security+ Study Guide (SY0-501)

WHAT S NEW IN SECURITY+ SY0-401?

CCNA Cybersecurity Operations 1.1 Scope and Sequence

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Instructor: Eric Rettke Phone: (every few days)

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

DIS10.1:Ethical Hacking and Countermeasures

IT Foundations Networking Specialist Certification with Exam

to Enhance Your Cyber Security Needs

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

Mohammad Shahadat Hossain

Workforce Certification

Ethical Hacking & Information Security. Justin David G. Pineda Asia Pacific College

IT Technician Pathways Course Guide

Cyber Security Audit & Roadmap Business Process and

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Course Description. Audience. Prerequisites. Skills Taught. Module Title. Duration. Course Outline :: CompTIA A+ Certification ::

Dumpswheel. Exam : v10. Title : Certified Ethical Hacker Exam ( CEH v 10) Vendor : EC-COUNCIL. Version : DEMO.

A guide to CompTIA training and certification DDLS Australia Pty Ltd

GSLC. GIAC Security Leadership.

IMEC Cybersecurity for Manufacturers Penetration Testing and Top 10

Ethical Hacker Foundation and Security Analysts Course Semester 2

EC-Council. Program Brochure. EC-Council. Page 1

Protect Your Organization from Cyber Attacks

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

Ceh V9 Certified Ethical Hacker Version 9 Kit

Certified Vulnerability Assessor

401 - SECURITY SOLUTION EXPERT

CompTIA Security+ (Exam SY0-401)

201 - TMOS TECHNOLOGY SPECIALIST

COURSE BROCHURE CISA TRAINING

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

Ethical Hacking Foundation Exam Syllabus

Syllabus: The syllabus is broadly structured as follows:

CompTIA IT Fundamentals:

E-guide Getting your CISSP Certification

EXAM PREPARATION GUIDE

A: Administering System Center Configuration Manager

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

ITdumpsFree. Get free valid exam dumps and pass your exam test with confidence

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

IIA EXAM - IIA-CGAP. Certified Government Auditing Professional. Buy Full Product.

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Practice Labs Ethical Hacker

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

CIT 480: Securing Computer Systems. Putting It All Together

hidden vulnerabilities

Ethical Hacking Guide 2017

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This is the first unit in a series in which we are going to speak about jobs in the Information Technology field.

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Principles of ICT Systems and Data Security

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Transcription:

What is an Ethical Hacker? To beat a hacker, you need to think like one! Ethical Hacking is often referred to as the process of penetrating one s own computer/s or computers to which one has official permission to do so as to determine if vulnerabilities exist and to undertake preventive, corrective, and protective countermeasures before an actual compromise to the system takes place. Become a Certified Ethical Hacker A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The purpose of the CEH credential is to: Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures. Inform the public that credentialed individuals meet or exceed the minimum standards. Reinforce ethical hacking as a unique and self-regulating profession. Certification Target Audience The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Exam Information The CEH exam (312-50) is available at the ECC Exam Centre and Pearson Vue testing centers. For VUE, please visit http://www.vue.com/eccouncil. EC-Council reserves the right to revoke the certification status of candidates that do not comply to all EC-Council examination policies found here.

CEH Exam Details CEH Exam Details Duration 4 Hours Questions 125

CEH Exam Blueprint v2.0 EC-Council

Sec on Knowledge of: Weight Number of I. Background A. networking technologies (e.g., hardware, infrastructure) 4% 5 B. web technologies (e.g., web 2.0, skype) C. systems technologies D. communi ca on protocol s E. malware opera ons F. mobile technologies (e.g., smart phones) G. telecommunica on technologies H. backups and archiving (e.g., local, network) II. Analysis/Assessment A. data analysis 13% 16 B. systems analysis C. risk assessments D. technical assessment methods III. Security A. systems security controls 25% 31 B. applica on/file server C. firewalls D. cryptography E. network security F. physical security G. threat modeling H. verifica on procedures (e.g., false posi ve/nega ve valida on) I. social engineering (human factors manipula on) J. vulnerability scanners K. security policy implica ons L. privacy/confiden ality (with regard to engagement) M. biometrics N. wireless access technology (e.g., networki ng, RFID, Bl uetooth) O. trus ted networks P. vulnerabili es CEH Exam Blueprint 1

Sec on Knowledge of: Weight Number of IV. Tools / Systems / A. network/host based intrusion 32% 40 Programs B. network/wireless sniffers (e.g., WireShark, Airsnort) C. access control mechanisims (e.g., smart cards) D. cryptography techniques (e.g., IPsec, SSL, PGP) E. programming languages (e.g. C++, Java, C#, C) F. scrip ng languages (e.g., PHP, Java script) G. boundary protec on appliances H. network topologies I. subne ng J. port scanning (e.g., NMAP) K. domain name system (DNS) L. routers/modems/switches M. vulnerability scanner (e.g., Nessus, Re na) N. vulnerability management and protec on systems (e.g., Founds tone, Ecora) O. opera ng environments (e.g., Linux, Windows, Mac) P. an virus systems and programs Q. log analysis tools R. security models S. exploita on tools T. database structures V. Procedures / A. cryptography 20% 25 Methodology B. public key infrastructure (PKI) C. Securi ty Archi tecture (SA) D. Service Oriented Architecture E. informa on security incident F. N- er applica on design G. TCP/IP networking (e.g., network rou ng) H. security tes ng methodology VI. Regula on/policy A. security policies 4% 5 B. compliance regula ons (e.g., PCI) VII. Ethics A. professional code of conduct 2% 3 B. appropriateness of hacking CEH Exam Blueprint 2