Académique Documents
Professionnel Documents
Culture Documents
Ethical
Hacker
Version 10
Certification Training
Course description
CEH v10 Certified Ethical Hacker training (earlier CEH v9) and certification course provide
hands-on classroom training to help you master the same techniques that hackers use to
penetrate network systems and leverage them ethically to protect your own infrastructure.
This extensive ethical hacking course focuses on 20 of the most popular security domains to
provide a practical approach to essential security systems. You will learn to assess computer
system security by using penetration testing techniques; scan, test and hack security systems
and applications, and gain hands-on experience with sniffing, phishing and exploitation
tactics. This ethical hacking course will prepare you for the EC-Council Certified Ethical
Hacker exam 312-50.
In the latest CEH v10 EC-Council has introduced the following changes:
The EC-Council Certified Ethical Hacker course verifies your advanced security skill-sets to
thrive in the worldwide information security domain. Many IT departments have made CEH
certification a compulsory qualification for security-related posts, making it a go-to
certification for security professionals. And CEH-certified professionals typically earn 44
percent higher salaries than their non-certified peers.
Simplilearn’s Ethical Hacking Course will expand your knowledge of network, web and
mobile app security and prepare you to identify threats and vulnerabilities.
o Grasp the step-by-step methodology and tactics that hackers use to penetrate network
systems
o Cover the latest developments in mobile and web technologies including Andriod,
iOS, BlackBerry, Windows Phone and HTML 5
o Learn advanced log management for information assurance and allow you to manage
information security with more clarity
o The Certified Ethical Hacker CEH training course is best suited for:
o Site administrators
o IT operations manager
Certified Ethical Hacker (CEH) certification will enhance your ability to assess and analyze
computer systems security to protect your corporate infrastructure. The exam code for CEH
certification (version 10) is 312-50 and tests your capabilities in using penetration testing
tools to evaluate computer systems and network security and implementing the special
techniques of ethical hacking.
Tools covered
Page 39
o Pen Testing for General Wi-Fi Network Attack
o Pen Testing WEP Encrypted WLAN
o Pen Testing WPA/WPA2 Encrypted WLAN
o Pen Testing LEAP Encrypted WLAN
o Pen Testing Unencrypted WLAN
Page 40
Android Security Tool: Find My Device
Android Security Tools
Android Vulnerability Scanner
Android Device Tracking Tools
Hacking iOS
Apple iOS
Jailbreaking iOS
o Jailbreaking Techniques
o Jailbreaking of iOS 11.2.1 Using Cydia
o Jailbreaking of iOS 11.2.1 Using Pangu Anzhuang
o Jailbreaking Tools
iOS Trojans
Guidelines for Securing iOS Devices
iOS Device Tracking Tools
iOS Device Security Tools
Mobile Spyware
Mobile Spyware
Mobile Spyware: mSpy
Mobile Spywares
Mobile Device Management
Mobile Device Management (MDM)
Mobile Device Management Solutions
Bring Your Own Device (BYOD)
o BYOD Risks
o BYOD Policy Implementation
o BYOD Security Guidelines
Mobile Security Guidelines and Tools
General Guidelines for Mobile Platform Security
Mobile Device Security Guidelines for Administrator
SMS Phishing Countermeasures
Mobile Protection Tools
Mobile Anti-Spyware
Mobile Pen Testing
Android Phone Pen Testing
Page 41
iPhone Pen Testing
Mobile Pen Testing Toolkit: Hackode
Page 42
o Vulnerability Scanning using Nmap
o Vulnerability Scanning using RIoT Vulnerability Scanner
o Sniffing using Foren6
o Rolling code Attack using RFCrack
o Hacking Zigbee Devices with Attify Zigbee Framework
o BlueBorne Attack Using HackRF One
o Gaining Remote Access using Telnet
o Maintain Access by Exploiting Firmware
IoT Hacking Tools
Information Gathering Tools
Sniffing Tools
Vulnerability Scanning Tools
IoT Hacking Tools
Countermeasures
How to Defend Against IoT Hacking
General Guidelines for IoT Device Manufacturing Companies
OWASP Top 10 IoT Vulnerabilities Solutions
IoT Framework Security Considerations
IoT Security Tools
IoT Pen Testing
IoT Pen Testing
Page 43
Service Hijacking using Social Engineering Attacks
Service Hijacking using Network Sniffing
Session Hijacking using XSS Attack
Session Hijacking using Session Riding
Domain Name System (DNS) Attacks
Side Channel Attacks or Cross-guest VM Breaches
SQL Injection Attacks
Cryptanalysis Attacks
Wrapping Attack
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Man-in-the-Cloud Attack
Cloud Security
Cloud Security Control Layers
Cloud Security is the Responsibility of both Cloud Provider and Consumer
Cloud Computing Security Considerations
Placement of Security Controls in the Cloud
Best Practices for Securing Cloud
NIST Recommendations for Cloud Security
Organization/Provider Cloud Security Compliance Checklist
Cloud Security Tools
Cloud Security Tools
Cloud Penetration Testing
What is Cloud Pen Testing?
Key Considerations for Pen Testing in the Cloud
Cloud Penetration Testing
Recommendations for Cloud Testing
Page 44
Government Access to Keys (GAK)
Encryption Algorithms
Ciphers
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
RC4, RC5, and RC6 Algorithms
Twofish
The DSA and Related Signature Schemes
Rivest Shamir Adleman (RSA)
Diffie-Hellman
Message Digest (One-Way Hash) Functions
o Message Digest Function: MD5
o Secure Hashing Algorithm (SHA)
o RIPEMD - 160
o HMAC
Cryptography Tools
MD5 Hash Calculators
Hash Calculators for Mobile
Cryptography Tools
o Advanced Encryption Package 2017
o BCTextEncoder
o Cryptography Tools
Cryptography Tools for Mobile
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI)
o Certification Authorities
o Signed Certificate (CA) Vs. Self Signed Certificate
Email Encryption
Digital Signature
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Cryptography Toolkit
o OpenSSL
o Keyczar
Page 45
Pretty Good Privacy (PGP)
Disk Encryption
Disk Encryption
Disk Encryption Tools
o VeraCrypt
o Symantec Drive Encryption
o Disk Encryption Tools
Cryptanalysis
Cryptanalysis Methods
o Linear Cryptanalysis
o Differential Cryptanalysis
o Integral Cryptanalysis
Cryptanalysis Tools
Online MD5 Decryption Tools
Countermeasures
How to Defend Against Cryptographic Attacks
For CEH (Certified Ethical Hacker) training and certification, there are no specific
eligibility criteria but we recommend a basic knowledge of TCP/IP.
Page 46
Does the course fee include in the CEH examination fees as well?
Your exam voucher fee is included in the price of this ethical hacking course.
However, you must procure the CEH exam voucher within 3 months from the date of
course purchase. In the event that the CEH exam price does go up and you have not
yet booked the exam, you will need to pay the difference in amount to Simplilearn.
For assistance in scheduling your exam, reach out to the sales consultant (inside sales
manager) or raise a request to the support team of Simplilearn.
Exam vouchers are valid for 1 year from the date of course purchase. If you do not
book the exam within 1 year from purchase of voucher, you will need to buy the
voucher again per the actual price.
Can I ask for a refund of exam voucher cost once it's issued to me?
No, exam voucher cost cannot be refunded once it is issued to a learner as we procure
this from third party bodies. Simplilearn does not own the voucher policies and cost.
Exam prices are governed by the certification body and can change. Price changes are
typically announced at the end of the calendar year. If the event that an exam price
does go up and you have not yet booked the exam, you will need to pay the difference
in amount to.
To become CEH certified, you must pass the CEH examination after either attending
CEH training at an Accredited Training Center like Simplilearn, or through self-study.
If you self-study, you must fill out an application and submit proof of at least two
years of experience in the network security domain.
The CEH certification exam costs $500, plus and an additional eligibility/ registration
fee of $100.
The passing score depends on the difficulty of the exam, which is set by the subject
matter experts who review the questions.
Page 47
How many questions are there in the CEH certification exam?
There are a total of 125 multiple choice questions to be answered in four hours.
You are eligible to take the CEH exam no more than five times in a 12-month period.
You are not allowed to retake the same version of the exam If you have already
passed that version.
How long does it take to receive the CEH Certification exam results and receive my
certification?
You will get notification of your results within a few minutes after completing your
exam. You will also receive a report with feedback on your performance in the
evaluated skillsets.
If you do not pass the exam in your first attempt, you can retake it any time, but if you
fail in your successive attempts, you will have to wait for 14 days every time to retake
the exam.
If you fail an EC-Council exam, you can buy an ECC Exam Center voucher to
reappear for the exam.
Refunds are not accepted if you fail to pass the test or if your application is not
approved.
Labs are conducted on EC Council-designed iLabs. The access period is for six
months.
All of our highly qualified trainers are CEH (v10) certified with at least 15 years of
experience in ethical hacking training and working in the areas of cybersecurity and
IT service and architecture. Each of them has gone through a rigorous selection
process that includes profile screening, technical evaluation, and a training demo
before they are certified to train for us. We also ensure that only those trainers with a
high alumni rating remain on our faculty.
Page 48
Is this live training, or will I watch pre-recorded videos?
The ethical hacking course is conducted via live virtual classrooms (LVC). They are
interactive sessions that enable you to ask questions and participate in discussions
during class time. We do, however, provide recordings of each session you attend for
your future reference. Classes are attended by a global audience to enrich your
learning experience.
The tools you’ll need to attend the Ethical Hacking Course are:
Once you complete the course work and pass the exam, you will become a certified
ethical hacking professional.
Simplilearn provides an online exam voucher with the training package, allowing
learners to take the certification exam remotely using their computer. The computer
must have a webcam and a running Internet connection.
The certificates of attendance (COA) can be downloaded from Aspen using your
evaluation code, which would have either been emailed to you from EC-Council or is
printed on the first page of your courseware. If you cannot find your code you can
submit a request to Simplilearn team through the LMS for assistance.
Page 49
How long is the CEH certification valid for?
The CEH certification is valid for three years. You must earn 120 ECE credits to
maintain the certification.
Yes, EC-Council has developed a number of policies to support the goals of the EC-
Council certification program, including:
The non-disclosure agreement (NDA)
EC-Council Certification Agreement
Security and Integrity Policy.
How long do I need to wait for my EC-Council certificate after I take the exam?
Your digital certificate will be available to download between 7-10 days from the date
of certification in your Aspen account.
How many times can I retake the exam if I don’t pass the first time?
If you fail the exam in your first attempt, you are allowed four retakes in 12 months
with a 14 day waiting period between each attempt. After that, you must wait for 12
months before the next retake.
Courseware vouchers are valid for 1 year from the date of course purchase.
After successful completion of the CEH course training, you will be awarded an
industry-recognized course completion certificate.
We provide recordings of each session you attend for your future reference.
Our teaching assistants are a dedicated team of subject matter experts here to help you
get certified on your first attempt. They engage students proactively to ensure the
course path is being followed and help you enrich your learning experience, from
class onboarding to project mentoring and job assistance. Teaching Assistance is
available during business hours.
Page 50