pearson-ceh-v9-complete : Pearson: Certified Ethical Hacker Version 9 (Course & Lab)

Gain hands-on expertise in the CEH v9 exam with Pearson: Certified Ethical Hacker Version 9 course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The course and labs cover all the objectives of CEH v9 exam and include topics such as ethical hacking, technical foundations of hacking, footprinting and scanning, malware threats, sniffers, session hijacking, and much more. The labs also provide you with the tools and techniques used by hackers to break into an organization. This will help you in understanding the hacker's mindset and protect your organization.
pearson-ceh-v9
pearson-ceh-v9-complete
Pearson: Certified Ethical Hacker Version 9 (Course & Lab)
ISBN : 978-1-61691-979-5

Here's what you will get

The Certified Ethical Hacker certification exam boost the application knowledge of auditors, security professionals, security officers, site administrators, and so on. Passing CEH V9 exam certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Lessons
Lessons
14+
Exercises
9+
Quizzes
332+
Flashcards
292+
Glossary of terms
292+
TestPrep
Pre-assessment Questions
125+
Full Length Tests
2+
Post-Assessment Questions
119+
Lab
Performance based lab
68+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
13+
Hours
01:07+
Exam FAQs
Where do I take the exam? ECC Exam Centre and Pearson VUE
What is the format of the exam? Multiple choice questions
How many questions are asked in the exam? The exam contains 125 questions.
What is the duration of the exam? 240 minutes
What is the passing score? 70%
What is the exam's retake policy? For first retake no waiting required, for second retake 14 days waiting required after the second attempt and same 14 days waiting is required till 4th retake. For 5th retake, 1 year waiting is required and if the person clears the exam he/she is not allowed to retake the exam.
What is the validity of the certification? http://www.eccouncil.org/Certification/exam-information/ceh-exam-312-50
Where can I find more information about this exam? To know more about the pearson-ceh-v9-complete, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • IT Auditor
  • Ethical Hacker
  • Penetration Tester
  • Site Administrator
  • Security Administrator
  • IT Security Consultant
  • Computer Forensics Analyst
  • Homeland Security Specialist

Here's what you will learn

  • How to Use This Book
  • Goals and Methods
  • Who Should Read This Book?
  • Strategies for Exam Preparation
  • How This Book Is Organized
  • Security Fundamentals
  • Security Testing
  • Hacker and Cracker Descriptions
  • Ethical Hackers
  • Test Plans—Keeping It Legal
  • Ethics and Legality
  • Summary
  • Review All Key Topics
  • Hands-On Labs
  • Suggested Reading and Resources
  • The Attacker's Process
  • The Ethical Hacker's Process
  • Security and the Stack
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Overview of the Seven-Step Information-Gathering Process
  • Information Gathering
  • Determining the Network Range
  • Identifying Active Machines
  • Finding Open Ports and Access Points
  • OS Fingerprinting
  • Fingerprinting Services
  • Mapping the Network Attack Surface
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Enumeration
  • System Hacking
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
  • Viruses and Worms
  • Trojans
  • Covert Communication
  • Keystroke Logging and Spyware
  • Malware Countermeasures
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Sniffers
  • Session Hijacking
  • Denial of Service and Distributed Denial of Service
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Web Server Hacking
  • Web Application Hacking
  • Database Hacking
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
  • Wireless Technologies
  • Mobile Device Operation and Security
  • Wireless LANs
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
  • Intrusion Detection Systems
  • Firewalls
  • Honeypots
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
  • Physical Security
  • Social Engineering
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
  • Functions of Cryptography
  • History of Cryptography
  • Algorithms
  • Public Key Infrastructure
  • Protocols, Applications, and Attacks
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Cloud Computing
  • Botnets
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
  • Hands-on Activities
  • Suggested Plan for Final Review and Study
  • Summary

Hands on Activities (Labs)

  • Examining security policies
  • Checking IP/subnet mask
  • Checking Internet access availability
  • Checking system reference for common port/name assignments
  • Checking DNS IP address
  • Searching people using AnyWho
  • Searching with Google Advance Search Operators
  • Using Google Hacking Database (GHDB) to search
  • Mirroring the entire website
  • Viewing A records
  • Viewing mail servers
  • Viewing full zone transfer
  • Using betterwhois.com
  • Searching people using Pipl, Spokeo, Zabasearch
  • Using LinkedIn to find details of an employee
  • Performing active reconnaissance
  • Using Whois
  • Performing information gathering
  • Using arin.net to find IP ranges assigned to Amazon
  • Performing a ping sweep with nmap
  • Scanning network using nbtscan
  • Scanning target hosts for their open ports
  • Viewing which ports are up and responding on the local host
  • Performing OS detection of the localhost
  • Performing OS fingerprinting
  • Determining webserver version
  • Performing nmap Traceroute
  • Using ettercap for ARP Spoofing
  • Enumerating data using enum4linux
  • Observing state of NTP on the localhost
  • Hiding text file in image by steganography
  • Covering tracks
  • Detecting Rootkits
  • Capturing screenshot using metasploit
  • Disassembling: convert hexpair to opcodes
  • Using NetCat to access a shell over the network
  • Using System Monitor
  • Observing the current running processes
  • Observing the listening services
  • Finding any active network connection
  • Analyzing protocols with Wireshark
  • Analyzing captured packets using sniffer
  • Performing passive OS fingerprinting
  • Using tcpdump to view network traffic
  • Using tcpdump to view data in tcp traffic
  • Using wireshark to sniff the network
  • Changing mac address with macchanger
  • Simulating a DoS attack
  • Adding Netcraft extension
  • Launching OpenVas and running a scan
  • Using netcraft to determine server version of fork.com
  • Reviewing CVEs and buffer overflows
  • Viewing web server enumeration
  • Cracking password using hydra
  • Performing banner grabbing
  • Exploiting SQL injection
  • Detecting web application firewall using WAF00F
  • Browsing SSL certificates
  • Managing disk partitions
  • Scanning a network using nmap
  • Using social engineering techniques to plan an attack
  • Hacking web browsers using BeEF
  • Examining an SSL certificate
  • Observing MD5 hash
  • Using openssl to create a public/private keypair
  • Encrypting and decrypting a message
  • Using PGP
uCertify

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved
app_store
google_play