pearson-ceh-v9-lab : Pearson: Certified Ethical Hacker Version 9

pearson-ceh-v9
pearson-ceh-v9-lab
Pearson: Certified Ethical Hacker Version 9
ISBN : 978-1-61691-883-5
Kick start your prep for EC-Council CEH v9 exam with Pearson: Certified Ethical Hacker Version 9 performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The labs cover all the objectives of CEH v9 exam and include topics such as ethical hacking, Web server hacking, Web applications, enumeration, system hacking, and much more. The labs also provide you with the tools and techniques used by hackers to break into an organization. This will help you in understanding the hacker's mindset and protect your organization.

Here's what you will get

The Certified Ethical Hacker certification is designed for security professionals who understand and know how to look for weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). Passing CEH V9 exam certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Lab
Performance based lab
68+
Exam FAQs
Where do I take the exam? ECC Exam Centre and Pearson VUE
What is the format of the exam? Multiple choice questions
How many questions are asked in the exam? The exam contains 125 questions.
What is the duration of the exam? 240 minutes
What is the exam's retake policy?

Here is the retake policy:

  • If a candidate is not able to pass the exam on the first attempt, no cooling or waiting period is required to attempt the exam for the second time (1st retake).
  • If a candidate is not able to pass the second attempt (1st retake), a waiting period of 14 days is required prior to attempting the exam for the third time (2nd retake).
  • If a candidate is not able to pass the third attempt (2nd retake), a waiting period of 14 days is required prior to attempting the exam for the fourth time (3rd retake).
  • If a candidate is not able to pass the fourth attempt (3rd retake), a waiting period of 14 days is required prior to attempting the exam for the fifth time (4th retake).
  • A candidate is not allowed to take a given exam more than five times in 12-months (1 year) period and a waiting period of 12-months will be imposed before being allowed to attempt the exam for the sixth time (5th retake).
  • Candidates who pass the exam are not allowed to attempt the same version of the exam for the second time.
Where can I find more information about this exam? To know more about the pearson-ceh-v9-lab, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • IT Auditor
  • Ethical Hacker
  • Security Administrator
  • IT Security Consultant
  • Computer Forensics Analyst
  • Homeland Security Specialist

Here's what you will learn

Hands on Activities (Labs)

  • Examining security policies
  • Checking IP/subnet mask
  • Checking Internet access availability
  • Checking system reference for common port/name assignments
  • Checking DNS IP address
  • Searching people using AnyWho
  • Searching with Google Advance Search Operators
  • Using Google Hacking Database (GHDB) to search
  • Mirroring the entire website
  • Viewing A records
  • Viewing mail servers
  • Viewing full zone transfer
  • Using whois.icann.org
  • Searching people using Pipl, Spokeo, Zabasearch
  • Using LinkedIn to find details of an employee
  • Performing active reconnaissance
  • Using Whois
  • Performing information gathering
  • Using arin.net to find IP ranges assigned to Amazon
  • Performing a ping sweep with nmap
  • Scanning network using nbtscan
  • Scanning target hosts for their open ports
  • Viewing which ports are up and responding on the local host
  • Performing OS detection of the localhost
  • Performing OS fingerprinting
  • Determining webserver version
  • Performing nmap Traceroute
  • Using ettercap for ARP Spoofing
  • Enumerating data using enum4linux
  • Observing state of NTP on the localhost
  • Hiding text file in image by steganography
  • Covering tracks
  • Detecting Rootkits
  • Capturing screenshot using metasploit
  • Disassembling: convert hexpair to opcodes
  • Using NetCat to access a shell over the network
  • Using System Monitor
  • Observing the current running processes
  • Observing the listening services
  • Finding any active network connection
  • Analyzing protocols with Wireshark
  • Analyzing captured packets using sniffer
  • Performing passive OS fingerprinting
  • Using tcpdump to view network traffic
  • Using tcpdump to view data in tcp traffic
  • Using wireshark to sniff the network
  • Changing mac address with macchanger
  • Simulating a DoS attack
  • Adding Netcraft extension
  • Launching OpenVas and running a scan
  • Using netcraft to determine server version of fork.com
  • Reviewing CVEs and buffer overflows
  • Viewing web server enumeration
  • Cracking password using hydra
  • Performing banner grabbing
  • Exploiting SQL injection
  • Detecting web application firewall using WAF00F
  • Fragmenting large ping packets
  • Browsing SSL certificates
  • Managing disk partitions
  • Scanning a network using nmap
  • Using social engineering techniques to plan an attack
  • Hacking web browsers using BeEF
  • Examining an SSL certificate
  • Observing MD5 hash
  • Using openssl to create a public/private keypair
  • Encrypting and decrypting a message
  • Using PGP