CEH CERTIFICATION DETAILS

Start your lucrative career in computer security with the 45 hours of training offered in the Certified Ethical Hacking Certification

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The purpose of the CEH credential is to:

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

About the Exam

  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Course Outline:

What is New in CEH Version 9 Course

 
  • Focus on New Attack Vectors
    • Emphasis on Cloud Computing Technology
      • CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
      • Covers wide-ranging countermeasures to combat cloud computing attacks
      • Provides a detailed pen testing methodology for cloud systems to identify threats in advance
    • Emphasis on Mobile Platforms and Tablet Computers
      • CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
      • Coverage of latest development in mobile and web technologies
  • New Vulnerabilities Are Addressed
    • Heartbleed CVE-2014-0160
      • Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
      • Detailed coverage and labs in Module 18: Cryptography.
    • Shellshock CVE-2014-6271
      • Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
      • Detailed coverage and labs in Module 11: Hacking Webservers
    • Poodle CVE-2014-3566
      • POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
      • Case study in Module 18: Cryptography
    • Hacking Using Mobile Phones
      • CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) using mobile phones
      • Courseware covers latest mobile hacking tools in all the modules
    • Coverage of latest Trojan, Virus, Backdoors
    • Courseware covers Information Security Controls and Information
    • Security Laws and Standards
    • Labs on Hacking Mobile Platforms and Cloud Computing
    • More than 40 percent new labs are added from Version 8
    • More than 1500 new/updated tools
    • CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
  • It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)

Source: eccouncil.org

1 comment

  1. https://www.viagrasansordonnancefr.com/sildenafil-100mg-pas-cher-femme/

    May 23, 2017 at 5:51 pm -

    It’s in reality a nice and helpful piece of info. I am happy
    that you shared this useful information with us.

    Please keep us informed like this. Thanks for
    sharing.

Comments are closed.