Certified Ethical Hacker CEHv13 (312–50 v13) Pearson Course
Please select required options above
The Certified Ethical Hacker (CEH 312-50) course is a great next step for anyone who wants to look at how attackers target networks, what tools attackers use, and how these techniques can be used by ethical hackers. Topics include the basic concepts related to ethical hacking, reconnaissance techniques, system hacking phases and attack techniques, network and perimeter hacking, web application hacking occurs, wireless network hacking, and mobile platforms, IoT, and OT hacking.
The goal of this course is to provide you with all the tools you need to prepare for the Certified Ethical Hacker exam — including extensive prep tools such as quizzes, foundation topics, exam preparation tasks, exercises, and review questions — to increase your chances of passing the exam on your first try.
Duration:Approximately 50 hours. Actual duration will vary by student.
Course components: 180-day access to:- Video Content
- Text Content
- Labs
- Practice Exam
- An IT skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker but in a lawful and legitimate manner to assess the security posture of a target system(s).
- Minimum 2 years' experience in Information Security
- Knowledge of networking, TCP/IP, and basic computer language
- Explain basic concepts related to ethical hacking
- Demonstrate reconnaissance techniques
- Describe system hacking phases and attack techniques
- Identify network and perimeter hacking
- Explain how web application hacking occurs
- Understand wireless network hacking
- Describe hacking on mobile platforms, IoT, and OT hacking
Training outline
Lesson 1: An Introduction to Ethical Hacking (1 hour and 12 minutes)
- Security Fundamentals
- Security Testing
- Hacker and Cracker Descriptions
- Ethical Hackers
- Test Plans – Keeping It Legal
- Ethics and Legality
Lesson 2: The Technical Foundations of Hacking (36 minutes)
- The Hacking Process
- The Ethical Hacker’s Process
- Information Security Systems and the Stack
Lesson 3: Footprinting, Reconnaissance, Scanning, and Enumeration (48 minutes)
- Footprinting
- Reconnaissance
- Scanning
- Enumeration
Lesson 4: Enumerations and System Hacking Attack Techniques (24 minutes)
- Enumeration
- System Hacking
Lesson 5: Social Engineering, Malware Threats, and Vulnerability Analysis (36 minutes)
- Social Engineering
- Malware Threats
- Vulnerability Analysis
Lesson 6: Sniffers, Session Hijacking, and Denial of Service (36 minutes)
- Sniffers
- Session Hijacking
- Denial of Service and Distributed Denial of Service
Lesson 7: Web Server Hacking, Web Applications, and Database Attacks (36 minutes)
- Web Server Hacking
- Web Application Hacking
- Database Hacking
Lesson 8: Wireless Technologies, Mobile Security, and Attacks (36 minutes)
- Wireless Technologies
- Mobile Security
- Wireless LANs
Lesson 9: Evading IDS, Firewalls, and Honeypots (36 minutes)
- Intrusion Detection and Prevention Systems
- Firewalls
- Honeypots
Lesson 10: Cryptographic Attacks and Defenses (1 hour and 12 minutes)
- Cryptography History and Concepts
- Encryption Algorithms
- Public Key Infrastructure
- Security Protocols and Attack Countermeasures
- Email and Disk Encryption
- Cryptoanalysis and Attacks
Lesson 11: Cloud Computing, IoT, and Botnets (36 minutes)
- Cloud Computing
- Internet of Things (IoT)
- Botnets