EC-Council's 312-50 V8

CEH v8 - Certified Ethical Hacker

The EC-Council Certified Ethical Hacker 8 certification is an industry recognized vendor-neutral credential. The CEH 8 certification is proof of a person's competence across a spectrum of skills including Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation and more. uCertify’s guaranteed certification course for 312-50 V8 exam is comprehensive and helps you earn your certification and gain knowledge. Here’s what to expect from your uCertify course:

• 100% Exam Coverage • Interactive E-Book • Pre-Assessment • 665 Practice Questions with Full Explanations • 233 Interactive Quizzes • Test History and Performance Review and Powerful Analytics • Study Planner • Continuously Updated



Prepare for the following certification

The EC-Council Certified Ethical Hacker 8 certification exam is a standalone certification from EC-Council with the exam code 312-50-v8.

The certification is targeted at security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. The exam covers networking technologies, technical assessment methods, cryptography, network topologies, and security policies, etc.

Skills Measured

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls, and Honeypots

312-50 V8 Course Duration

This is a self-paced, independent study program, so there are no minimum or maximum restrictions placed by uCertify. The amount of time you will take depends on your existing knowledge of the area and related experience, as well as your availability. We recommend at least 3 weeks if you have a reasonable amount of IT Security and hacking knowledge work experience.

Authored by Industry Experts

uCertify uses content from the finest publishers and only the IT industry's finest instructors. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can study at your own pace. This creates a personal learning experience and gives you all the benefits of hands-on training with the flexibility of doing it around your schedule 24/7.

Exercises, Quizzes & Flashcards

uCertify's exercises, quizzes and flashcards prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes, flashcards and exercises after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course.

Practice Test Sets

uCertify courses also include full length practice test sets designed to test your knowledge under real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure you are 100% prepared before taking your certification exam.

Exam Simulators

Online labs to supplement your training. uCertify labs are an inexpensive & safe way to explore and learn. uCertify labs are versatile - labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training.

State of the Art Educator Tools

uCertify knows the importance of instructors and provide tools to help them do their job effectively. Instructors are able to clone and customize course, do ability grouping, create sections, design grade scale and grade formula, create and schedule assignments. Educators can also move a student from self-paced to mentor-guided to instructor-led mode in three clicks.

Award Winning Learning Platform (LMS)

uCertify has developed an award winning, highly interactive yet simple to use platform. uCertify understands that it is critical to help student focus on learning the subject and not learning the LMS. uCertify helps student retain and recall the knowledge by teaching students using interactive exercises. Features such as actionable analytics and study planner help in keeping students focused.


312-50 V8 Course/Exam Objectives

  • Lesson 1: Introduction to Ethical Hacking
    • Gain knowledge on various hacking terminologies
    • Understand the different types and implications of hacker attacks
  • Lesson 2: Footprinting and Reconnaissance
    • Understand the term footprinting
    • Understand how traceroute is used in footprinting
    • Google hacking, Website mirroring, and email tracking
  • Lesson 3: Scanning Networks
    • Understand the term port scanning, network scanning, and vulnerability scanning
    • Understand ping sweeping, firewalk tool, and nmap command switches
    • Understand scans
    • Learn TCP communication flag types, and gain knowledge on War dialing techniques
    • Understand banner grabbing using fingerprinting and other techniques and tools
    • Learn vulnerability scanning using BidiBlah and other hacking tools
    • Understand proxy servers, anonymizers, HTTP tunneling techniques, and IP spoofing techniques
  • Lesson 4: Enumeration
    • Learn the system hacking cycle, and understand enumeration and its techniques
    • Understand null sessions and their countermeasures
    • Understand SNMP enumeration and its countermeasures
  • Lesson 5: System Hacking
    • Understand the different types of passwords, password attacks, and password cracking techniques
    • Authentication mechanism, password sniffing, various password cracking tools, and countermeasures
    • Understand privilege escalation, key loggers, and other spyware technologies
    • Identify different ways to hide files, understand rootkits, and understand alternate data streams
    • Understand steganography technologies and tools used
    • Understand covering tracks, tools used and erase evidences
  • Lesson 6: Trojans and Backdoors
    • Define a Trojan
    • Identify the ports used by a Trojan
    • Identify listening ports using netstat
    • Understand wrapping , reverse shell Trojan, and ICMP tunneling
    • Understand Windows start up monitoring tools, and the Trojan horse constructing kit
    • Learn Trojan detection and evading techniques
  • Lesson 7: Viruses and Worms
    • Virus, characteristics of a virus, working of a virus, and virus hoaxes
    • Understand the difference between a virus and a worm, and understand the life cycle of virus
    • Virus writing technique and virus construction kits
    • Understand antivirus evasion techniques, and understand virus detection methods and countermeasures
    • Understand worm analysis
  • Lesson 8: Sniffers
    • Sniffers, identify types of sniffing, and understand active and passive sniffing
    • Understand Address Resolution Protocol (ARP), and the process of ARP spoofing
    • Understand MAC duplicating
    • Learn ethereal capture and display filters
    • Understand MAC flooding, understand DNS spoofing techniques, and DNS spoofing countermeasures
    • Know various sniffing tools, identify sniffing detection and defensive techniques
  • Lesson 9: Social Engineering
    • Understand social engineering
    • Identify the different types of social engineering
    • Understand dumpster diving, human-based social engineering, and insider attack
    • Understand phishing attacks, identify online scams, and understand URL obfuscation
    • Identify social engineering countermeasures
  • Lesson 10: Denial of Service
    • Understand a Denial of Service attack, and analyze symptoms of a DoS Attack
    • Understand Internet Chat Query (ICQ), Internet Relay Chat (IRC), and botnets
    • Assess DoS/DDoS attack tools
    • Identify DoS/DDoS countermeasure, post-attack forensics, and Penetration Testing
  • Lesson 11: Session Hijacking
    • Understand session hijacking and session hijacking techniques
    • Understand session hijacking process and session hijacking in the OSI Model
    • Understand the brute forcing attack, and HTTP referrer attack
    • Understand application level session hijacking, and discuss session sniffing
    • Describe man-in-the-middle, man-in-the-browser, Client-side, and cross-site script attacks
    • Understand session fixation attack, and describe network level session hijacking
    • Understand TCP/IP hijacking, session hijacking tools, and countermeasures of session hijacking
  • Lesson 12: Hacking Webservers
    • Web server attacks
    • Examine webserver misconfiguration, and understand directory traversal attacks
    • Learn regarding HTTP response splitting attack, and understand Web cache poisoning attack
    • Understand HTTP response hijacking, and discuss SSH bruteforce attack
    • Examine man-in-the-middle attack, and learn webserver password cracking techniques
    • Understand webserver attack methodology
    • Identify webserver attack tools, and identify countermeasures against webserver attacks
    • Understand patch management, assess webserver security tools
  • Lesson 13: Hacking Web applications
    • Understand Web applications, Web application components, and working of Web applications
    • Understand Web application architecture, parameter/form tampering, and injection flaws
    • Discuss hidden field manipulation, cross-site scripting (XSS), and Web services attacks
    • Identify Web application hacking and Web application security tools
    • Understand Web application firewalls, and gain insights on Web application pen testing
  • Lesson 14: SQL Injection
    • Understand SQL injection and SQL injection black box penetration testing
    • Understand types of SQL injection and blind SQL injection
    • Learn SQL injection methodology
    • Examine advanced enumeration, describe password grabbing, and discuss grabbing SQL Server hashes
    • SQL injection tools
    • Understand defensive strategies against SQL injection attacks
  • Lesson 15: Hacking Wireless Networks
    • Understand wireless networks, various types of wireless networks, and Wi-Fi authentication modes
    • Identify types of wireless encryption, and understand WEP encryption and WPA/WPA2
    • Understand wireless hacking methodology, and assess wireless hacking tools
    • Understand Bluetooth hacking, and understand how to defend against Bluetooth hacking
    • Understand how to defend against wireless attacks, and identify Wi-Fi security tools
    • Examine Wireless Penetration Testing Framework
  • Lesson 16: Hacking Mobile Platform
    • Mobile Platform Attack Vectors
    • Hacking Android OS
    • Hacking iOS
    • Hacking Windows Phone OS
    • Hacking BlackBerry
    • Mobile Device Management (MDM)
    • Mobile Security Guidelines and Tools
    • Mobile Pen Testing
  • Lesson 17: Evading IDS, Firewalls, and Honeypots
    • Understand Intrusion Detection Systems (IDS)
    • Understand what is a firewall, types of firewalls, and identify firewall identification techniques
    • Understand honeypot
    • Examine evading IDS, understand evading firewalls, and learn detecting honeypots
    • Identify firewall evading tools
  • Lesson 18: Buffer Overflow
    • Understand buffer overflows (BoF)
    • Reasons for buffer overflow attacks, and skills required to program buffer overflow exploits
    • Testing for heap overflow conditions: heap.exe, and understand OllyDbg debugger
    • Understand buffer overflow countermeasures tools and buffer overflow pen testing
  • Lesson 19: Cryptography
    • Understand cryptography, learn various types of cryptography, and understand ciphers
    • Understand AES, RC4, RC5, RC6 algorithms, RSA, Message Digest Function: MD5, and SHA
    • Identify cryptography tools, and understand Public Key Infrastructure (PKI), and digital signature
    • Understand SSL, disk encryption, and cryptography attacks
  • Lesson 20: Penetration Testing
    • Understand penetration testing (PT)
    • Understand automated testing, manual testing, and penetration testing techniques
    • Understand enumerating devices

Career Prospects

An EC-Council CEH 8 Certified Professional has several career opportunities open up to them, including:

  • Network Security Officer
  • Technical Writer
  • Authorized Hacker
  • Network Administrator
  • Security Administrator
  • Web Site Administrator


312-50 V8 Exam FAQs

What certificate do I earn on passing the 312-50 V8 exam?
If you pass EC-Council's 312-50 V8 exam you will get credit towards the following certification:
What is the exam registration fee?
USD 500

Pricing and taxes may vary from country to country.

Where do I take the exam?

The EC-Council 312-50-v8 exam is administered by Prometric and Pearson.

  • For Prometric: Click here to find a testing center near you.
  • For Pearson: Click here to find a testing center near you.
What is the format of the exam?
The exam consists of multiple choice questions.
What are the pre-requisites of the exam?
While there are no official pre-requisites for the CEH v8 certification, both EC-Council and uCertify strongly recommend that the candidate have attended the CEH class before enrolling into CEH Program and learn how to conduct ethical hacking. If you are not taking the CEH training, you have to fill exam eligibility form before taking the exam.
How many questions are asked in the exam?
The exam contains 125 questions.
What is the duration of the exam?
240 minutes
What is the passing score?

(on a scale of 0-1000)

What is the exam's retake policy?

In the event that you fail your first attempt at passing the EC-Council 312-50-v8 Exam, EC-Council's retake policy is:

  • The candidates who failed their exams in first attempt, cannot retake it more than five times in a 12 month (1 year) period. They need to wait for 12 months before attempting the 5th retake exam.
  • There is no waiting period between the first and second attempt to pass this examination. If you are not able to pass the exam in second, third, or fourth attempt, you shall be required to wait for a period of 14 calendar days from the date of your last attempt before you can retake the exam.
  • If you have already passed the exam, it cannot be taken again.
What is the validity of the certification?
The candidates are required to earn EC-Council Continuing Education Credits (ECE) to maintain the certification. Click here for more information.
Where can I find more information about this exam?
To know more about the 312-50-v8 exam, click here.

At a Glance

312-50 V8 Course Includes Free Buy
Lessons 1 20
Pre-Assessment Yes Yes
Practice Tests 0 6
Total Questions 29 665
Interactive Quizzes 14 233
Final Test No Yes

Copyright © 2014 uCertify / All rights reserved.