Certified Ethical Hacker Version 9

(pearson-ceh-v9-complete) / ISBN : 978-1-61691-979-5
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
Video Lessons (Add-on)
208 Reviews
Get A Free Trial

About This Course

Prepare for the EC-Council CEH 312-50 exam with the Certified Ethical Hacker Version 9 course and lab. The lab simulates real-world, hardware, software, and command-line interface environments and can be mapped to any text-book, course or training. The course and lab cover CEH 312-50 exam objectives and include topics such as ethical hacking, technical foundations of hacking, footprinting, and scanning; and more. The labs also provide you with the tools and techniques used by hackers to break into an organization.

Skills You’ll Get

The EC-Council CEH certification exam validates the knowledge of auditors, security professionals, security officers, and site administrators which reinforces ethical hacking as a unique and self-regulating profession. Passing the CEH 312-50 exam certifies a candidate's skills and knowledge in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

1

Introduction

  • How to Use This Book
  • Goals and Methods
  • Who Should Read This Book?
  • Strategies for Exam Preparation
  • How This Book Is Organized
2

An Introduction to Ethical Hacking

  • Security Fundamentals
  • Security Testing
  • Hacker and Cracker Descriptions
  • Ethical Hackers
  • Test Plans—Keeping It Legal
  • Ethics and Legality
  • Summary
  • Review All Key Topics
  • Hands-On Labs
  • Suggested Reading and Resources
3

The Technical Foundations of Hacking

  • The Attacker's Process
  • The Ethical Hacker's Process
  • Security and the Stack
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
4

Footprinting and Scanning

  • Overview of the Seven-Step Information-Gathering Process
  • Information Gathering
  • Determining the Network Range
  • Identifying Active Machines
  • Finding Open Ports and Access Points
  • OS Fingerprinting
  • Fingerprinting Services
  • Mapping the Network Attack Surface
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
5

Enumeration and System Hacking

  • Enumeration
  • System Hacking
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
6

Malware Threats

  • Viruses and Worms
  • Trojans
  • Covert Communication
  • Keystroke Logging and Spyware
  • Malware Countermeasures
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
7

Sniffers, Session Hijacking, and Denial of Service

  • Sniffers
  • Session Hijacking
  • Denial of Service and Distributed Denial of Service
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
8

Web Server Hacking, Web Applications, and Database Attacks

  • Web Server Hacking
  • Web Application Hacking
  • Database Hacking
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
9

Wireless Technologies, Mobile Security, and Attacks

  • Wireless Technologies
  • Mobile Device Operation and Security
  • Wireless LANs
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
10

IDS, Firewalls, and Honeypots

  • Intrusion Detection Systems
  • Firewalls
  • Honeypots
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
11

Physical Security and Social Engineering

  • Physical Security
  • Social Engineering
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
12

Cryptographic Attacks and Defenses

  • Functions of Cryptography
  • History of Cryptography
  • Algorithms
  • Public Key Infrastructure
  • Protocols, Applications, and Attacks
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
13

Cloud Computing and Botnets

  • Cloud Computing
  • Botnets
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
14

Final Preparation

  • Hands-on Activities
  • Suggested Plan for Final Review and Study
  • Summary

1

An Introduction to Ethical Hacking

  • Examining Security Policies
2

The Technical Foundations of Hacking

  • Checking IP/Subnet mask
  • Checking Internet Access Availability
  • Checking System Reference for Common Port/Name Assignments
  • Checking DNS IP Address
3

Footprinting and Scanning

  • Searching people using AnyWho
  • Searching with Google Advance Search Operators
  • Using Google Hacking Database (GHDB) to Search
  • Mirroring the Entire Website
  • Viewing A Records
  • Viewing Mail Servers
  • Viewing Full Zone Transfer
  • Retrieving Whois Record of a website
  • Searching People using Spokeo and Zabasearch
  • Using LinkedIn to Find Details of an Employee
  • Performing active reconnaissance
  • Using Whois
  • Performing Information Gathering
  • Using arin.net to Find IP Ranges Assigned to Amazon
  • Performing a Ping Sweep with nmap
  • Scanning Network using nbtscan
  • Scanning Target Hosts for their Open Ports Using nmap
  • Viewing Which Ports are Up and Responding on the Local Host
  • Performing OS Detection of the Localhost
  • Performing OS Fingerprinting
  • Determining Webserver Version
  • Performing nmap Traceroute
  • Performing ARP Spoofing
4

Enumeration and System Hacking

  • Enumerating Data Using enum4linux
  • Observing State of NTP on the Localhost
  • Hiding Text File in Image by Steganography
  • Clear Event Logs Using Meterpreter
  • Detecting Rootkits
  • Capturing Screenshot Using Metasploit
5

Malware Threats

  • Disassembling: Convert Hexpair to Opcodes
  • Using NetCat to Access a Shell Over the Network
  • Using System Monitor
  • Observing the Current Running Processes
  • Observing the Listening Services
  • Finding Active Network Connection
6

Sniffers, Session Hijacking, and Denial of Service

  • Analyzing Protocols with Wireshark
  • Analyzing Captured Packets using Sniffer
  • Performing Passive OS Fingerprinting
  • Using tcpdump to View Network Traffic
  • Using tcpdump to View Data in tcp Traffic
  • Using Wireshark to Sniff the Network
  • Changing mac Address with macchanger
  • Simulating a DoS Attack
7

Web Server Hacking, Web Applications, and Database Attacks

  • Adding Netcraft Extension
  • Launching OpenVas and Running a Scan
  • Using Netcraft to Determine Server Version of fork.com
  • Reviewing CVEs and Buffer Overflows
  • Viewing Web Server Enumeration
  • Cracking Password using Hydra
  • Performing Banner Grabbing
  • Exploiting SQL Injection
  • Detecting Web Application Firewall using WAF00F
8

Wireless Technologies, Mobile Security, and Attacks

  • Fragmenting Large Ping Packets
9

Physical Security and Social Engineering

  • Browsing SSL Certificates
  • Managing Disk Partitions
  • Scanning a Network using nmap
  • Using Social Engineering Techniques to Plan an Attack
  • Hacking Web Browsers using BeEF
10

Cryptographic Attacks and Defenses

  • Examining an SSL Certificate
  • Observing MD5 Hash
  • Using Openssl to Create a Public/Private Keypair
  • Encrypting and Decrypting a Message
  • Using PGP

Why Do Learners Love This Course?

I decided to take the uCertify Certified Ethical Hacker Version 9 course which I studied over a period of 2 weeks - to which I'd strongly recommend industry players to take. This is a great course! The course has various interactive components like quizzes, flashcards along with pre and post assessments for making your learning experience awesome. The quizzes are useful not just for CEH, but GIAC and other practical security certifications. I liked the flashcards very much because it helps in understanding and remembering the concepts so easily.

Patrick Essien
Consultant Member

This is totally unbelievable, for some period of time now, I have been looking and searching everywhere for a comprehensive, deep with details on CEH v9. ucertify did a great work in bringing all this material together.

Oladimeji Adepoju ITIL CISA CCNP MC
IT Team Lead

The CEHv9 course is not an exception, the course is simple and precise, yet loaded with great contents to keep you abreast and fit for the industry and for the exams. The course also comes with an amazing lab, structured to give you that powerful hands-on required to keep you ahead.

Kelvin Johnson
IT Support Engineer

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Multiple choice questions

The exam contains 125 questions.

240 minutes

Here is the retake policy:

  • If a candidate is not able to pass the exam on the first attempt, no cooling or waiting period is required to attempt the exam for the second time (1st retake).
  • If a candidate is not able to pass the second attempt (1st retake), a waiting period of 14 days is required prior to attempting the exam for the third time (2nd retake).
  • If a candidate is not able to pass the third attempt (2nd retake), a waiting period of 14 days is required prior to attempting the exam for the fourth time (3rd retake).
  • If a candidate is not able to pass the fourth attempt (3rd retake), a waiting period of 14 days is required prior to attempting the exam for the fifth time (4th retake).
  • A candidate is not allowed to take a given exam more than five times in 12-months (1 year) period and a waiting period of 12-months will be imposed before being allowed to attempt the exam for the sixth time (5th retake).
  • Candidates who pass the exam are not allowed to attempt the same version of the exam for the second time.

Certified Ethical Hacker Version 9

$ 279.99

Buy Now
scroll to top