Course Outline
20 Modules that help you master the foundations of
Ethical Hacking and prepare to challenge the CEH certification exam.
TestOut Labsim + CertMaster Practice & Labs + EC-Council iLearn
To obtain the CEH or CEH ANSI certification recognized by the U.S. Department of Defense, you need to pass a 4-hour exam consisting of 125 questions with a passing score of over 70%. The cost for the CEH Exam Voucher is $1,199, available at https://store.eccouncil.org/product/ceh-vue-exam-voucher/, not including a non-refundable $100 application fee (non-refundable if you don't meet the requirements).
If you score below 70%, you must retake the exam at a cost of $550 for the Retake CEH Exam Voucher.
Therefore, it's recommended to purchase the CEH (ANSI) Exam Voucher Combo from CEH MASTER ACADEMY. This combo includes iLearn, featuring 20 modules of video lessons presented by official instructors (see description below), and detailed step-by-step practical guidance on the lab system. You'll also get access to iLab CyberQ with attack and target practice machines valid for 6 months, worth $200, allowing you to practice easily at any time. For On-Demand learners, there's over 60 hours of content to complete, and you'll automatically be verified as eligible, unlike when purchasing an Exam Voucher from the EC-Council Store.
Additionally, you can schedule your exam at any time and take it from home or any suitable location with a standard internet connection and a room meeting the requirements. You can be confident as the CEH ANSI Combo includes study materials and online practice tests (CEH Exam Prep) worth $149.
Notably, candidates will receive a complimentary Exam Insurance package, allowing unlimited free retakes, eliminating concerns about the $550 retake fee if you don't pass!
So, why not purchase the COMBO CEH ANSI + Exam Insurance for just $1,189 instead of only the CEH EXAM Voucher at $1,199 + the non-refundable $100 application fee?
Note: The Combo CEH ANSI Exam Voucher + Exam Insurance has a processing time of 4-7 business days after payment.
20 Modules that help you master the foundations of
Ethical Hacking and prepare to challenge the CEH certification exam.
Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Elements of Information Security, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Hacker Classes, Ethical Hacking, Information Assurance (IA), Risk Management, Incident Management, PCI DSS, HIPPA, SOX, GDPR
Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Over 30 hands-on exercises with real-life simulated targets to build skills on how to:
Footprinting, Advanced Google Hacking Techniques, Deep and Dark Web Footprinting, Competitive Intelligence Gathering, Website Footprinting, Website Mirroring, Email Footprinting, Whois Lookup, DNS Footprinting, Traceroute Analysis, Footprinting Tools
Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Over 10 hands-on exercises with real-life simulated targets to build skills on how to:
Network Scanning, Host Discovery Techniques, Port Scanning Techniques, Service Version Discovery, OS Discovery, Banner Grabbing, OS Fingerprinting, Packet Fragmentation, Source Routing, IP Address Spoofing, Scanning Tools
Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures
Over 20 hands-on exercises with real-life simulated targets to build skills on how to:
Enumeration, NetBIOS Enumeration, SNMP Enumeration, LDAP Enumeration, NTP Enumeration, NFS Enumeration, SMTP Enumeration, DNS Cache Snooping, DNSSEC Zone Walking, IPsec Enumeration, VoIP Enumeration, RPC Enumeration, Unix/Linux User Enumeration, Enumeration Tools
Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures
Over 20 hands-on exercises with real-life simulated targets to build skills on how to:
Enumeration, NetBIOS Enumeration, SNMP Enumeration, LDAP Enumeration, NTP Enumeration, NFS Enumeration, SMTP Enumeration, DNS Cache Snooping, DNSSEC Zone Walking, IPsec Enumeration, VoIP Enumeration, RPC Enumeration, Unix/Linux User Enumeration, Enumeration Tools
Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks—used to discover system and network vulnerabilities.
Over 25 hands-on exercises with real-life simulated targets to build skills on how to:
Password Cracking, Password Attacks, Wire Sniffing, Password-Cracking Tools, Vulnerability Exploitation, Buffer Overflow, Privilege Escalation, Privilege Escalation Tools, Keylogger, Spyware, Anti-Keyloggers, Anti-Spyware, Rootkits, Anti-Rootkits, Steganography, Steganography Tools, Steganalysis, Steganography Detection Tools, Maintaining Persistence, Post Exploitation, Clearing Logs, Covering Tracks, Track-Covering Tools
Get an introduction to the different types of malware, such as Trojans, viruses, and worms, as well as system auditing for malware attacks, malware analysis, and countermeasures.
Over 20 hands-on exercises with real-life simulated targets to build skills on how to:
Malware, Components of Malware, APT, Trojan, Types of Trojans, Exploit Kits, Virus, Virus Lifecycle, Types of Viruses, Ransomware, Computer Worms, Fileless Malware, Malware Analysis, Static Malware Analysis, Dynamic Malware Analysis, Virus Detection Methods, Trojan Analysis, Virus Analysis, Fileless Malware Analysis, Anti-Trojan Software, Antivirus Software, Fileless Malware Detection Tools
Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks
Over 10 hands-on exercises with real-life simulated targets to build skills on how to:
Network Sniffing, Wiretapping, MAC Flooding, DHCP Starvation Attack, ARP Spoofing Attack, ARP Poisoning, ARP Poisoning Tools, MAC Spoofing, STP Attack, DNS Poisoning, DNS Poisoning Tools, Sniffing Tools, Sniffer Detection Techniques, Promiscuous Detection Tools
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
Social Engineering, Types of Social Engineering, Phishing, Phishing Tools, Insider Threats/Insider Attacks, Identity Theft
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
DoS Attack, DDoS Attack, Botnets, DoS/DDoS Attack Techniques, DoS/DDoS Attack Tools, DoS/DDoS Attack Detection Techniques, DoS/DDoS Protection Tools
Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
Session Hijacking, Types of Session Hijacking, Spoofing, Application-Level Session Hijacking, Man-in-the-Browser Attack, Client-side Attacks, Session Replay Attacks, Session Fixation Attack, CRIME Attack, Network Level Session Hijacking, TCP/IP Hijacking, Session Hijacking Tools, Session Hijacking Detection Methods, Session Hijacking Prevention Tools
Get introduced to firewall, intrusion detection system, and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Over 7 hands-on exercises with real-life simulated targets to build skills on how to:
Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Firewall, Types of Firewalls, Honeypot, Intrusion Detection Tools, Intrusion Prevention Tools, IDS Evasion Techniques, Firewall Evasion Techniques, Evading NAC and Endpoint Security, IDS/Firewall Evading Tools, Honeypot Detection Tools
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Over 8 hands-on exercises with real-life simulated targets to build skills on how to:
Web Server Operations, Web Server Attacks, DNS Server Hijacking, Website Defacement, Web Cache Poisoning Attack, Web Server Attack Methodology, Web Server Attack Tools, Web Server Security Tools, Patch Management, Patch Management Tools
Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
Over 15 hands-on exercises with real-life simulated targets to build skills on how to:
Web Application Architecture, Web Application Threats, OWASP Top 10 Application Security Risks – 2021, Web Application Hacking Methodology, Web API, Webhooks, and Web Shell, Web API Hacking Methodology, Web Application Security
Learn about SQL injection attack techniques, injection detection tools, and countermeasures to detect and defend against SQL injection attempts.
Over 4 hands-on exercises with real-life simulated targets to build skills on how to:
SQL Injection, Types of SQL injection, Blind SQL Injection, SQL Injection Methodology, SQL Injection Tools, Signature Evasion Techniques, SQL Injection Detection Tools
Learn about wireless encryption, wireless hacking methodologies and tools, and Wi-Fi security tools.
Over 3 hands-on exercises with real-life simulated targets to build skills on how to:
Wireless Terminology, Wireless Networks, Wireless Encryption, Wireless Threats, Wireless Hacking Methodology, Wi-Fi Encryption Cracking, WEP/WPA/WPA2 Cracking Tools, Bluetooth Hacking, Bluetooth Threats, Wi-Fi Security Auditing Tools, Bluetooth Security Tools
Learn about mobile platform attack vectors, Android vulnerability exploits, and mobile security guidelines and tools.
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
Mobile Platform Attack Vectors, OWASP Top 10 Mobile Risks, App Sandboxing, SMS Phishing Attack (SMiShing), Android Rooting, Hacking Android Devices, Android Security Tools, Jailbreaking iOS, Hacking iOS Devices, iOS Device Security Tools, Mobile Device Management (MDM), OWASP Top 10 Mobile Controls, Mobile Security Tools
Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks
Over 2 hands-on exercises with real-life simulated targets to build skills on how to:
IoT Architecture, IoT Communication Models, OWASP Top 10 IoT Threats, IoT Vulnerabilities, IoT Hacking Methodology, IoT Hacking Tools, IoT Security Tools, IT/OT Convergence (IIOT), ICS/SCADA, OT Vulnerabilities, OT Attacks, OT Hacking Methodology, OT Hacking Tools, OT Security Tools
Learn different cloud computing concepts, such as container technologies and server less computing, various cloud-based threats and attacks, and cloud security techniques and tools.
Over 5 hands-on exercises with real-life simulated targets to build skills on how to:
Cloud Computing, Types of Cloud Computing Services, Cloud Deployment Models, Fog and Edge Computing, Cloud Service Providers, Container, Docker, Kubernetes, Serverless Computing, OWASP Top 10 Cloud Security Risks, Container and Kubernetes Vulnerabilities, Cloud Attacks, Cloud Hacking, Cloud Network Security, Cloud Security Controls, Cloud Security Tools
After taking an authorized course, candidates can attempt the CEH exam. Candidates that successfully pass the exam will receive their CEH certificate and membership privileges.
Exam Title: Certified Ethical Hacker (ANSI)
Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)
Number of Questions: 125
Test Format: Multiple Choice
Duration: 4 Hours
Availability: ECC EXAM* / VUE
Passing Score: Please refer to
https://cert.eccouncil.org/faq.html
CEH Certification Exam earned College Credit Recommendations from the American Council on Education (ACE) For more info, click here.
Job Roles
Forge Your Cybersecurity Path in Slovakia: The CEH Ascent
In the heart of Central Europe, Slovakia emerges as a rising star in the digital landscape. For ambitious IT professionals in this dynamic nation, the Certified Ethical Hacker (CEH) certification offers a unique climb to cybersecurity excellence. Here's why scaling your CEH journey online in Slovakia is a strategic ascent:
Shape your future today. Embark on your CEH online ascent in Slovakia with CEH MASTER ACADEMY and elevate your cybersecurity career to new heights in this land of emerging opportunities and innovation!
Be the first to know about new collections and exclusive offers.