312-50 : Certified Ethical Hacker Version 9

Certified Ethical Hacker Version 9
ISBN : 978-1-61691-718-0
Gain hands-on expertise in Certified Ethical Hacker Exam with 312-50: Certified Ethical Hacker Version 9 course. This course provides complete coverage of 312-50 exam and covers topics such as ethical hacking, network topologies, cryptography, system hacking and much more. The course also makes you understand the tools and techniques used by hackers to break into an organization and helps you read the hacker mindset so that you can defend against future attacks.


uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keep the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keep learners engaged and make learning fun.

Here's What You Get

Exercises Quizzes

Each lesson comes with Exercises & Quizzes. There is no limit to the number of times learners can attempt these. Exercises come with detailed remediation, which ensures that learners are confident on the topic before proceeding.

Exercise Questions

Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
Full Length Tests
Post-Assessments Questions


Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.

Exam Information

The EC-Council Certified Ethical Hacker 9 certification exam is a standalone certification from EC-Council with the exam code 312-50-v9. The exam is intended for security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. The exam covers topics such as networking technologies, technical assessment methods, network topologies, cryptography, security policies, and so on.

Prepare for the following certification

Career Prospects

An EC-Council CEH 9 Certified Professional has several career opportunities open up to them, including:

  • IT Auditor
  • Ethical Hacker
  • Penetration Tester
  • Site Administrator
  • Security Administrator
  • IT Security Consultant
  • Computer Forensics Analyst
  • Homeland Security Specialist
Exam FAQs
Where do I take the exam?

The EC-Council 312-50-v9 exam is administered by Prometric and Pearson.

  • For Prometric: Click here to find a testing center near you.
  • For Pearson: Click here to find a testing center near you.
What is the format of the exam?
The exam consists of multiple choice questions.
What are the pre-requisites of the exam?
While there are no official pre-requisites for the CEH v9 certification, both EC-Council and uCertify strongly recommend that the candidates have attended the CEH class before enrolling into CEH Program and learn how to conduct ethical hacking. If you are not taking the CEH training, you have to fill exam eligibility form before taking the exam.
How many questions are asked in the exam?
The exam contains 125 questions.
What is the duration of the exam?
240 minutes
What is the passing score?
What is the exam's retake policy?
For first retake no waiting required, for second retake 14 days waiting required after the second attempt and same 14 days waiting is required till 4th retake. For 5th retake, 1 year waiting is required and if a person clears the exam he/she is not allowed to retake the exam.
What is the validity of the certification?
The candidates are required to earn EC-Council Continuing Education Credits (ECE) to maintain the certification. Click here for more information.
Where can I find more information about this exam?
To know more about the CEH-V9, click here.

Table of Content

Here's What you will Learn

Lesson 1: Introduction

  • Exam 312-50 Exam Objectives

Lesson 2: Introduction to Ethical Hacking

  • Hacking: the Evolution
  • So, What Is an Ethical Hacker?
  • Summary
  • Exam Essentials

Lesson 3: System Fundamentals

  • Exploring Network Topologies
  • Working with the Open Systems Interconnection Model
  • Dissecting the TCP/IP Suite
  • IP Subnetting
  • Hexadecimal vs. Binary
  • Exploring TCP/IP Ports
  • Understanding Network Devices
  • Working with MAC Addresses
  • Intrusion Prevention and Intrusion Detection Systems
  • Network Security
  • Knowing Operating Systems
  • Backups and Archiving
  • Summary
  • Exam Essentials

Lesson 4: Cryptography

  • Cryptography: Early Applications and Examples
  • Cryptography in Action
  • Understanding Hashing
  • Issues with Cryptography
  • Applications of Cryptography
  • Summary
  • Exam Essentials

Lesson 5: Footprinting

  • Understanding the Steps of Ethical Hacking
  • What Is Footprinting?
  • Terminology in Footprinting
  • Threats Introduced by Footprinting
  • The Footprinting Process
  • Summary
  • Exam Essentials

Lesson 6: Scanning

  • What Is Scanning?
  • Checking for Live Systems
  • Checking the Status of Ports
  • The Family Tree of Scans
  • OS Fingerprinting
  • Countermeasures
  • Vulnerability Scanning
  • Mapping the Network
  • Using Proxies
  • Summary
  • Exam Essentials

Lesson 7: Enumeration

  • A Quick Review
  • What Is Enumeration?
  • About Windows Enumeration
  • Linux Basic
  • Enumeration with SNMP
  • Unix and Linux Enumeration
  • LDAP and Directory Service Enumeration
  • Enumeration Using NTP
  • SMTP Enumeration
  • Summary
  • Exam Essentials

Lesson 8: System Hacking

  • Up to This Point
  • System Hacking
  • Summary
  • Exam Essentials

Lesson 9: Malware

  • Malware
  • Overt and Covert Channels
  • Summary
  • Exam Essentials

Lesson 10: Sniffers

  • Understanding Sniffers
  • Using a Sniffer
  • Switched Network Sniffing
  • Summary
  • Exam Essentials

Lesson 11: Social Engineering

  • What Is Social Engineering?
  • Social Networking to Gather Information?
  • Commonly Employed Threats
  • Identity Theft
  • Summary
  • Exam Essentials

Lesson 12: Denial of Service

  • Understanding DoS
  • Understanding DDoS
  • DoS Tools
  • DDoS Tools
  • DoS Defensive Strategies
  • DoS Pen-Testing Considerations
  • Summary
  • Exam Essentials

Lesson 13: Session Hijacking

  • Understanding Session Hijacking
  • Exploring Defensive Strategies
  • Summary
  • Exam Essentials

Lesson 14: Web Servers and Applications

  • Exploring the Client-Server Relationship
  • Summary
  • Exam Essentials

Lesson 15: SQL Injection

  • Introducing SQL Injection
  • Summary
  • Exam Essentials

Lesson 16: Hacking Wi-Fi and Bluetooth

  • What Is a Wireless Network?
  • Summary
  • Exam Essentials

Lesson 17: Mobile Device Security

  • Mobile OS Models and Architectures
  • Goals of Mobile Security
  • Device Security Models
  • Countermeasures
  • Summary
  • Exam Essentials

Lesson 18: Evasion

  • Honeypots, IDSs, and Firewalls
  • Summary
  • Exam Essentials

Lesson 19: Cloud Technologies and Security

  • What Is the Cloud?
  • Summary
  • Exam Essentials

Lesson 20: Physical Security

  • Introducing Physical Security
  • Summary
  • Exam Essentials

Lesson 21: Appendix A: Penetration Testing Frameworks

  • Overview of Alternative Methods
  • Penetration Testing Execution Standard
  • Summary

Lesson 22: Appendix B: Building a Lab

  • Why Build a Lab?
  • Creating a Test Setup
  • The Installation Process
  • Summary

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved