• Home
uCertify Logo
  • Browse Titles
  • Course Categories
    • IT / Computer Science
    • Project Management
    • Vocational Training
    • Coding
  • platform
    • Learn
    • Course
    • Lab
    • Test
    • Mobile App
    • Create
  • partner with us
    • Educator
    • Publisher
    • Request Demo
  • 0
    • Your cart is empty
    • Continue Shopping
    • View Cart
  • Login or Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Request Demo
  • Browse Titles
  • Cart 0
    • Your cart is empty
    • Continue Shopping
    • View Cart
  • Course Categories
    • IT / Computer Science
    • Project Management
    • Vocational Training
    • Coding
  • Technology
    • Learn
    • Course
    • Lab
    • Test
    • Learn Smart App
    • Create
  • I am...
    • Professional (Self-Paced Learner)
    • Educator
    • Publisher
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Help
    • Keyboard Shortcuts
    • Features
    • Send Feedback
Scroll to top button

Certified Ethical Hacker (CEH v10 )

(CEH-v10) / ISBN: 9781644591154
This course includes
Lessons
TestPrep
LiveLab
CEH-v10 : Certified Ethical Hacker (CEH v10 )
Share
$279.99
Try This Course
Are you an instructor?
Request a free evaluation copy

Certified Ethical Hacker (CEH v10 )

Prepare for the EC-Council CEH certification exam with the Certified Ethical Hacker CEHv10 study guide. The lab is cloud-based, device-enabled, and can be easily integrated with an LMS. Interactive chapters comprehensively cover the CEH exam objectives and provide knowledge in areas such as assessment, security, tools, systems, programs, procedures, methodology, regulation, policy, and ethics. The CEH training course will help you gain skills in information security threats and attack vectors; attack detection and prevention, and more.
Here's what you will get

The Certified Ethical Hacker certification validates the application knowledge of auditors, security officers, and site administrators to establish and govern the minimum standards of credentialing professional information security specialists in ethical hacking measures. Passing the CEH V10 exam certifies that individuals have the specific network security discipline of ethical hacking from a vendor-neutral perspective.

Lessons
  • 15+ Lessons
  • 250+ Quizzes
  • 70+ Flashcards
  • 140+ Glossary of terms
TestPrep
  • 100+ Pre Assessment Questions
  • 2+ Full Length Tests
  • 100+ Post Assessment Questions
  • 200+ Practice Test Questions
Lab
  • 38+ Performance lab
  • 38+ Video tutorials
  • 16+ Minutes
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
  • What Is a CEH?
  • About EC-Council
  • Using This Course
  • Objective Map
  • Let’s Get Started!
Lesson 2: Ethical Hacking
  • Overview of Ethics
  • Overview of Ethical Hacking
  • Methodology of Ethical Hacking
  • Summary
Lesson 3: Networking Foundations
  • Communications Models
  • Topologies
  • Physical Networking
  • IP
  • TCP
  • UDP
  • Internet Control Message Protocol
  • Network Architectures
  • Cloud Computing
  • Summary
Lesson 4: Security Foundations
  • The Triad
  • Risk
  • Policies, Standards, and Procedures
  • Security Technology
  • Being Prepared
  • Summary
Lesson 5: Footprinting and Reconnaissance
  • Open-Source Intelligence
  • Domain Name System
  • Passive Reconnaissance
  • Website Intelligence
  • Technology Intelligence
  • Summary
Lesson 6: Scanning Networks
  • Ping Sweeps
  • Port Scanning
  • Vulnerability Scanning
  • Packet Crafting and Manipulation
  • Evasion Techniques
  • Summary
Lesson 7: Enumeration
  • Service Enumeration
  • Remote Procedure Calls
  • Server Message Block
  • Simple Network Management Protocol
  • Simple Mail Transfer Protocol
  • Web-Based Enumeration
  • Summary
Lesson 8: System Hacking
  • Searching for Exploits
  • System Compromise
  • Gathering Passwords
  • Password Cracking
  • Client-Side Vulnerabilities
  • Post Exploitation
  • Summary
Lesson 9: Malware
  • Malware Types
  • Malware Analysis
  • Creating Malware
  • Malware Infrastructure
  • Antivirus Solutions
  • Summary
Lesson 10: Sniffing
  • Packet Capture
  • Packet Analysis
  • Spoofing Attacks
  • Summary
Lesson 11: Social Engineering
  • Social Engineering
  • Physical Social Engineering
  • Phishing Attacks
  • Website Attacks
  • Wireless Social Engineering
  • Automating Social Engineering
  • Summary
Lesson 12: Wireless Security
  • Wi-Fi
  • Bluetooth
  • Mobile Devices
  • Summary
Lesson 13: Attack and Defense
  • Web Application Attacks
  • Denial of Service Attacks
  • Application Exploitation
  • Lateral Movement
  • Defense in Depth/Defense in Breadth
  • Defensible Network Architecture
  • Summary
Lesson 14: Cryptography
  • Basic Encryption
  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Certificate Authorities and Key Management
  • Cryptographic Hashing
  • PGP and S/MIME
  • Summary
Lesson 15: Security Architecture and Design
  • Data Classification
  • Security Models
  • Application Architecture
  • Security Architecture
  • Summary

Hands on Activities (Performance Labs)

Security Foundations

  • Creating a Personal Linux Firewall Using iptables
  • Observing Syslog Messages
  • Using Event Viewer
  • Configuring Audit Policies in Windows

Footprinting and Reconnaissance

  • Using the whois Program
  • Using the theHarvester Tool to Gather Information about a Victim
  • Using Recon-ng
  • Using Maltego
  • Using the host Program
  • Using Nslookup for Passive Reconnaissance
  • Performing Zone Transfer Using dig
  • Using DNSRecon
  • Mirroring Sites with HTTrack

Scanning Networks

  • Using fping
  • Identifying Web Servers Using masscan
  • Scanning a Port Using nmap
  • Using Zenmap
  • Using OpenVAS
  • Using the hping Program

Enumeration

  • Using the Metasploit sunRPC Scanner
  • Using nmap for Enumerating Users
  • Enumerating Data Using enum4linux

System Hacking

  • Using Searchsploit
  • Grabbing a Screenshot of a Target Machine Using Metasploit
  • Exploiting Windows 7 Using Metasploit
  • Cracking a Linux Password Using John the Ripper
  • Cracking a Windows Password Using ophcrack

Malware

  • Scanning Malware Using Antivirus
  • Observing an MD5-Generated Hash Value
  • Using the msfvenom Program

Sniffing

  • Using Wireshark
  • Capturing Network Packets Using tcpdump
  • Performing ARP Spoofing

Social Engineering

  • Using the SET Tool

Attack and Defense

  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection

Cryptography

  • Using OpenSSL to Create a Public/Private Key Pair
  • Observing an SHA-Generated Hash Value
Exam FAQs
What are the prerequisites for this exam? No official prerequisites
What is the exam registration fee? USD 1199
Where do I take the exam? ECC Exam and Pearson VUE
What is the format of the exam? Multiple choice questions
How many questions are asked in the exam? The exam contains 125 questions.
What is the duration of the exam? 240 minutes
What is the passing score? This depends on the exam.
What is the exam's retake policy?

Here is the retake policy:

  • If a candidate is not able to pass the exam on the first attempt, no cooling or waiting period is required to attempt the exam for the second time (1st retake).
  • If a candidate is not able to pass the second attempt (1st retake), a waiting period of 14 days is required prior to attempting the exam for the third time (2nd retake).
  • If a candidate is not able to pass the third attempt (2nd retake), a waiting period of 14 days is required prior to attempting the exam for the fourth time (3rd retake).
  • If a candidate is not able to pass the fourth attempt (3rd retake), a waiting period of 14 days is required prior to attempting the exam for the fifth time (4th retake).
  • A candidate is not allowed to take a given exam more than five times in 12-months (1 year) period and a waiting period of 12-months will be imposed before being allowed to attempt the exam for the sixth time (5th retake).
  • Candidates who pass the exam are not allowed to attempt the same version of the exam for the second time.
What is the validity of the certification? 3 years
Where can I find more information about this exam? To know more about the , click here.
What are the career opportunities after passing this exam?
  • IT Auditor
  • Ethical Hacker
  • Penetration Tester
  • Site Administrator
  • Security Administrator
  • IT Security Consultant
  • Computer Forensics Analyst
  • Homeland Security Specialist
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

ucertify logo
uCertify provides Courses, Lab, TestPrep for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, IC3, Adobe, Axelos and many more.

The logos and certification names are the trademarks of their respective owners.
Connect
  • About Us
  • Awards
  • Contact Us
  • Sitemap
  • Careers
  • Partners with us
  • Platform
Resources
  • Titles Catalog
  • Vendors
  • Certifications
  • Exams
  • Blog
  • Sitemap

Subscribe To Our Newsletters
Sign up for our monthly newsletter to get the latest news, updates and amazing offers delivered directly in your inbox.
Accessibility Terms & Conditions Privacy Statement
© 2002-2020 uCertify. All Rights Reserved
uCertify App
android app image
ios app image
We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept