pearson-cehv9 : Pearson: Certified Ethical Hacker Version 9

Pearson: Certified Ethical Hacker Version 9
Includes:
13+ Videos
332+ Test Prepkits
Rating :
(11)
Gain hands-on expertise in the EC-Council CEH v9 exam with Pearson: Certified Ethical Hacker Version 9 course. The course covers all the objectives of CEH v9 exam and includes topics such as malware threats, sniffers, session hijacking, social engineering, cryptography, cloud computing, botnets, and much more. The CEH course also provides you the tools and techniques that are used by hackers for breaking into an organization's security system that can guide you about the hackers mind set and game plan.

Here's what you will get

The Certified Ethical Hacker certification validates the application knowledge of auditors, security officers, and site administrators to establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures. Passing CEH V9 exam certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Lessons
Lessons
14+
Exercises
9+
Quizzes
332+
Flashcards
292+
Glossary of terms
292+
TestPrep
Pre-assessment Questions
120+
Full Length Tests
2+
Post-Assessment Questions
119+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
13+
Hours
01:08+
Exam FAQs
Where do I take the exam? ECC Exam and Pearson VUE
What is the format of the exam? Multiple choice questions
How many questions are asked in the exam? The exam contains 125 questions.
What is the duration of the exam? 240 minutes
What is the exam's retake policy?

Here is the retake policy:

  • If a candidate is not able to pass the exam on the first attempt, no cooling or waiting period is required to attempt the exam for the second time (1st retake).
  • If a candidate is not able to pass the second attempt (1st retake), a waiting period of 14 days is required prior to attempting the exam for the third time (2nd retake).
  • If a candidate is not able to pass the third attempt (2nd retake), a waiting period of 14 days is required prior to attempting the exam for the fourth time (3rd retake).
  • If a candidate is not able to pass the fourth attempt (3rd retake), a waiting period of 14 days is required prior to attempting the exam for the fifth time (4th retake).
  • A candidate is not allowed to take a given exam more than five times in 12-months (1 year) period and a waiting period of 12-months will be imposed before being allowed to attempt the exam for the sixth time (5th retake).
  • Candidates who pass the exam are not allowed to attempt the same version of the exam for the second time.
Where can I find more information about this exam? To know more about the pearson-ceh-v9, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • IT Auditor
  • Ethical Hacker
  • Penetration Tester
  • Site Administrator
  • Security Administrator
  • IT Security Consultant
  • Computer Forensics Analyst
  • Homeland Security Specialist

Here's what you will learn

  • How to Use This Book
  • Goals and Methods
  • Who Should Read This Book?
  • Strategies for Exam Preparation
  • How This Book Is Organized
  • Security Fundamentals
  • Security Testing
  • Hacker and Cracker Descriptions
  • Ethical Hackers
  • Test Plans—Keeping It Legal
  • Ethics and Legality
  • Summary
  • Review All Key Topics
  • Hands-On Labs
  • Suggested Reading and Resources
  • The Attacker's Process
  • The Ethical Hacker's Process
  • Security and the Stack
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Overview of the Seven-Step Information-Gathering Process
  • Information Gathering
  • Determining the Network Range
  • Identifying Active Machines
  • Finding Open Ports and Access Points
  • OS Fingerprinting
  • Fingerprinting Services
  • Mapping the Network Attack Surface
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Enumeration
  • System Hacking
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
  • Viruses and Worms
  • Trojans
  • Covert Communication
  • Keystroke Logging and Spyware
  • Malware Countermeasures
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Sniffers
  • Session Hijacking
  • Denial of Service and Distributed Denial of Service
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Web Server Hacking
  • Web Application Hacking
  • Database Hacking
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
  • Wireless Technologies
  • Mobile Device Operation and Security
  • Wireless LANs
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
  • Intrusion Detection Systems
  • Firewalls
  • Honeypots
  • Summary
  • Review All Key Topics
  • Suggested Reading and Resources
  • Physical Security
  • Social Engineering
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
  • Functions of Cryptography
  • History of Cryptography
  • Algorithms
  • Public Key Infrastructure
  • Protocols, Applications, and Attacks
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
  • Cloud Computing
  • Botnets
  • Summary
  • Review All Key Topics
  • Exercise
  • Suggested Reading and Resources
  • Hands-on Activities
  • Suggested Plan for Final Review and Study
  • Summary