Certified Ethical Hacker CEH v10

ceh v10 certified ethical hacker
US$ 8.99 US$ 14.99
0
Number of Students Registered

Certified Ethical Hacker CEH v10 covers the latest exam blueprint, comprised of 20 Modules which includes the practice of information security and hacking tools which are popularly used by professionals to exploit any computer systems. CEHv10 course blueprint covers all five Phases of Ethical Hacking starting from Reconnaissance, gaining access, Enumeration, Maintaining Access till covering your tracks. While studying CEHv10, you will feel yourself inside a Hacker’s Mindset. Major additions in the CEHv10 course are Vulnerability Analysis, IoT Hacking, Focused on Emerging Attack Vectors, Hacking Challenges, and updates of latest threats & attacks including Ransomware, Android Malware, Banking & Financial malware, IoT botnets and much more.

This workbook covers all the information you need to pass the EC-Council’s Certified Ethical Hacking exam. The workbook is designed to take a practical approach to learning with real-life examples and case studies.

  • Covers complete Certified Ethical Hacker CEH v10 blueprint
  • Summarized content
  • Case Study based approach
  • Ready to practice labs on VM
  • 100% passing guarantee
  • Mind maps
  • 100 Exam Practice Questions
  • Contains Quick Reference (CHEAT SHEET) which helps to revise exams instantly

Chapter 1: Introduction to Ethical Hacking
Technology Brief
Data Breach
Essential Terminology
Elements of Information Security
Information Security Threats and Attack Vectors
Motives, Methods, and Vulnerabilities of Information Security Attacks
Top Information Security Attack Vectors
Threat Categories
Types of Attacks on a System
Information Warfare
Hacking Concepts, Types, and Phases
Hacker
Hacking
Hacking Phases
Ethical Hacking Concepts and Scope
Ethical Hacking
Why Ethical Hacking is Necessary
Scope and Limitations of Ethical Hacking
Phases of Ethical Hacking
Skills of an Ethical Hacker
Information Security Controls
Information Security Management Program
Threat Modeling
Enterprise Information Security Architecture (EISA)
Network Security Zoning
Information Security Policies
Types of Security Policies
Promiscuous Policy
Permissive Policy
Prudent Policy
Paranoid Policy
Implications for Security Policy Enforcement
Physical Security
Incident Management
Incident Management Process
Incident Response Team
Vulnerability Assessment
Types of Vulnerability Assessment
Application Assessment Network Vulnerability Assessment Methodology
Evaluation
Penetration Testing
Technology Overview
The Importance of Penetration testing
Types of Penetration Testing
Phases of Penetration Testing
Security Testing Methodology
Information Security Laws and Standards
Payment Card Industry Data Security Standard (PCI-DSS)
ISO/IEC 2700 1:20 13
Health Insurance Portability and Accountability Act (HIPAA)
Sarbanes Oxley Act (SOX)
Industry Standard Framework and Reference Architecture
Benchmarks/Secure Configuration Guides
Practice Questions


Chapter 2: Footprinting & Reconnaissance
Technology Brief
Footprinting Concepts
Pseudonymous Footprinting
Internet Footprinting
Objectives of Footprinting
Footprinting Methodology
Footprinting through Search Engines
Footprinting Using Advanced Google Hacking Techniques
Footprinting through Social Networking Sites
Website Footprinting
Competitive Intelligence
Monitoring a Target Company’s Website Traffic
WHOIS Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tool
Countermeasures of Footprinting
Practice Questions


Chapter 3: Scanning Networks
Technology Brief
An Overview of Network Scanning
TCP Communication
Creating Custom Packets Using TCP Flags
Scanning Methodology
Checking for Live Systems
ICMP Scanning
Ping Sweep
Check for Open Ports
SSDP Scanning
Scanning Tool
Lab 3- 1: Hping Commands
Lab 3-2: Hping Commands
Scanning Techniques
Scanning Tool
Scanning Tools for Mobile
Scanning Beyond IDS
OS Fingerprinting & Banner Grabbing
Active OS Fingerprinting or Banner Grabbing
Passive OS Fingerprinting or Banner Grabbing
Banner Grabbing Tools
Draw Network Diagrams
Network Discovery Tool
Lab 3-4: Creating a Network Topology Map
Prepare Proxies
Proxy Servers
Proxy Chaining
Proxy Tool
Introduction to Anonymizers
Practice Questions


Chapter 4: Enumeration
Technology Brief
Enumeration Concepts
Services and Ports to Enumerate
Lab 4- 1: Services Enumeration using Nmap
NetBIOS Enumeration
Lab 4-2: Enumeration using SuperScan Tool
Lab 4-3: Enumeration using SoftPerfect Network Scanner Tool
SNMP Enumeration
Simple Network Management Protocol
LDAP Enumeration
LDAP Enumeration Tool
NTP Enumeration
Network Time Protocol (NTP)
SMTP Enumeration
Simple Mail Transfer Protocol (SMTP)
SMTP Enumeration Technique
DNS Zone Transfer Enumeration Using NsLookup
Enumeration Countermeasures
Practice Questions


Chapter 5: Vulnerability Analysis
Technology Brief
The Concept of Vulnerability Assessment
Vulnerability Assessment
Vulnerability Assessment Life Cycle
Vulnerability Scoring Systems
LAB 5- 1: Installing and Using a Vulnerability Assessment Tool
Lab 5.2: Vulnerability Scanning using the Nessus Vulnerability Scanning Tool
Practice Questions


Chapter 6: System Hacking
Technology Brief
System Hacking
System Hacking Methodology
Password Cracking
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Practice Questions


Chapter 7: Malware Threats
Technology Brief
Malware Propagation Methods
The Trojan Concept
Trojan
The Trojan Infection Process
Trojan Construction Kit
Trojan Deployment
Types of Trojans
Trojan Countermeasures
Virus and Worm Concepts
Viruses
Ransomware
Computer Worms
Malware Reverse Engineering
Sheep Dipping
Malware Analysis
Lab 7- 1: HTTP RAT Trojan
Lab 7-2: Monitoring a TCP/IP Connection Using CurrPort Tool
Practice Questions


Chapter 8: Sniffing
Technology Brief
Sniffing Concepts
Introduction to Sniffing
Types of Sniffing
Hardware Protocol Analyzer
SPAN Port
MAC Attacks
MAC Address Table/CAM Table
Switch Port Stealing
Defending Against MAC Attacks
Configuring Port Security
DHCP Attacks
Dynamic Host Configuration Protocol (DHCP) Operation
DHCP Starvation Attack
Rogue DHCP Server Attack
Defending Against DHCP Starvation and Rogue Server Attack
ARP Poisoning
Address Resolution Protocol (ARP)
ARP Spoofing Attack
Defending ARP Poisoning
Spoofing Attack
MAC Spoofing/Duplicating
Lab 8- 1: Configuring Locally Administered MAC Addresses
MAC Spoofing Tool
How to Defend Against MAC Spoofing
DNS Poisoning
DNS Poisoning Techniques
How to Defend Against DNS Spoofing
Sniffing Tools
Wireshark
Lab 8-2: Introduction to Wireshark
Follow the TCP Stream in Wireshark
Countermeasures
Sniffing Detection Techniques
Practice Questions


Chapter 9: Social Engineering
Technology Brief
Social Engineering Concepts
Introduction to Social Engineering
Social Engineering Techniques
Impersonation on Social Networking Sites
Social Engineering Through Impersonation on Social Networking Sites
Risks of Social Networking to Corporate Networks
Identity Theft
Identify Theft Overview
The Process of Identity theft
Social Engineering Countermeasures
Lab 09- 1: Social Engineering using Kali Linux
Practice Questions


Chapter 10: Denial-of-Service (DoS)
Technology Brief
DoS/DDoS Concepts
Distributed Denial-of-Service (DDoS)
How do Distributed Denial-of-Service Attacks Work?
DoS/DDoS Attack Techniques
Volumetric Attacks
Fragmentation Attacks
TCP-State-Exhaustion Attacks
Application Layer Attacks
Bandwidth Attacks
Service Request Floods
SYN Attack/Flooding
ICMP Flood Attack
Peer-to-Peer Attacks
Permanent Denial-of-Service Attack
Application Level Flood Attacks
Distributed Reflection Denial-of-Service (DRDoS)
Botnets
Botnet Setup
Botnet Trojan
DoS/DDoS Attack Tools
Pandora DDoS Bot Toolkit
Other DDoS Attack Tools
DoS and DDoS Attack Tools for Mobile
Lab 10- 1: SYN Flooding Attack Using Metasploit
Lab 10-2: SYN Flooding Attack Using Hping3
Countermeasures
Activity Profiling
Wavelet Analysis
Sequential Change-Point Detection
DoS/DDoS Countermeasure Strategies
Techniques to Defend against Botnets
RFC 3704 Filtering
Cisco IPS Source IP Reputation Filtering
Black Hole Filtering
Enabling TCP Intercept on Cisco IOS Software
Practice Questions


Chapter 11: Session Hijacking
Technology Brief
Session Hijacking
Session Hijacking Techniques
Types of Session Hijacking
Session Hijacking in OSI Model
Spoofing vs. Hijacking
Application Level Session Hijacking
Compromising Session IDs using Sniffing
Compromising Session IDs by Predicting Session Token
How to Predict a Session Token?
Compromising Session IDs Using a Man-in-the-Middle Attack
Compromising Session IDs Using a Man-in-the-Browser Attack
Compromising Session IDs Using Client-side Attacks
Session Replay Attack
Session Fixation
Network Level Session Hijacking
The Three-Way Handshake
TCP/IP Hijacking
Source Routing
RST Hijacking
Blind Hijacking
Forged ICMP and ARP Spoofing
UDP Hijacking
Session Hijacking Countermeasures
IPSec
Practice Questions


Chapter 12: Evading IDS, Firewalls, and Honeypots
Technology Brief
Intrusion Detection Systems (IDS)
Ways to Detect an Intrusion
Types of Intrusion Detection Systems
Firewall
Firewall Architecture
Types of Firewall
Honeypot
Types of Honeypots
Detecting Honeypots
IDS, Firewall, and Honeypot System
Snort
Evading IDS
Evading Firewalls
IDS/Firewall Evasion Countermeasures
Lab 12- 1: Configuring Honeypot on Windows Server 20 16
Practice Questions


Chapter 13: Hacking Web Servers
Technology Brief
Web Server Concepts
Web Server Security Issues
Open Source Web Server Architecture
IIS Web Server Architecture
Web Server Attacks
Web Application Attacks
Attack Methodology
Information Gathering
Web Server Footprinting
Lab 13- 1: Web Server Footprinting Tool
Mirroring a Website
Vulnerability Scanning
Session Hijacking
Hacking Web Passwords
Countermeasures
Detecting Web Server Hacking Attempts
Defending Against Web Server Attacks
Disable Debug Compiles Patch Management
Lab 13-2: Microsoft Baseline Security Analyzer (MBSA)
Lab 13-3: Web Server Security Tool
Practice Questions


Chapter 14: Hacking Web Applications
Technology Brief
Web Application Concepts
How do Web Applications Work?
Web 2.0
Web App Threats
Web App Hacking Methodology
Analyze Web Applications
Attack Authentication Mechanism
Authorization Attack Schemes
Session Management Attack
Perform Injection Attacks
Attack Data Connectivity
Secure Application Development and Deployment
Development of Life Cycle Models
Secure DevOps
Version Control and Change Management
Provisioning and De-Provisioning
Secure Coding Techniques
Code Quality and Testing
Verification
Validation
Compiled vs Runtime Code
An Overview of Federated Identities
Server-based Authentication
Token-based Authentication
Federation
Security Assertion Mark-up Language (SAML)
OAuth
Important Considerations for Best Practices
Encoding Schemes
URL Encoding
Practice Questions


Chapter 15: SQL Injection
Technology Brief
SQL Injection Concepts
The scope of SQL Injection
How SQL Query Works
Types of SQL Injection
In-band SQL Injection
Inferential SQL Injection (Blind Injection)
Out-of-band SQL Injection
SQL Injection Methodology
Information Gathering and SQL Injection Vulnerability Detection
Launch SQL Injection Attacks
Advanced SQL Injection
Evasion Techniques
Types of Signature Evasion Techniques
Countermeasures
Lab 15- 1: Using IBM Security AppScan Standard
Practice Questions


Chapter 16: Hacking Wireless Networks
Technology Brief
Wireless Concepts
Wireless Networks
Wireless Terminologies
Extension to a Wired Network
Wireless Standards
Wi-Fi Technology
Wi-Fi Authentication Modes
Wi-Fi Authentication with Centralized Authentication Server
Wireless 802. 1x – EAP Authentication Flow
Wi-Fi Chalking
Types of Wireless Antenna
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wi-Fi Discovery
GPS Mapping
Wireless Traffic Analysis
Launch Wireless Attacks
Bluetooth Hacking
Bluetooth Attacks
Bluetooth Countermeasures
Wireless Intrusion Prevention Systems (WIPS)
Wi-Fi Security Auditing Tool
Lab 16- 1: Hacking a Wi-Fi Protected Access Network using Aircrack-ng
Countermeasures
Practice Questions


Chapter 17: Hacking Mobile Applications
Technology Brief
Mobile Platform Attack Vectors
OWASP Top 10 Mobile Threats
Mobile Attack Vector
Vulnerabilities and Risks on Mobiles
Hacking Android OS
Device Administration API
Root Access/Android Rooting
Android Phone Security Tools
Hacking iOS
Jailbreaking iOS
Types of Jailbreaking
Jailbreaking Techniques
Jailbreaking Tools
Hacking Windows Phone OS
Windows Phone
Hacking BlackBerry
BlackBerry Operating System
BlackBerry Attack Vectors
Mobile Device Management (MDM)
MDM Deployment Methods
Bring Your Own Device (BYOD)
BYOD Architecture Framework
Mobile Security Guidelines
Practice Questions


Chapter 18: IoT Hacking
Technology Brief
The Concept of Internet of Things (IoT)
IoT Communication Models
Understanding IoT Attacks
OWASP Top 10 IoT Vulnerabilities
IoT Attack Areas
IoT Attacks
IoT Hacking Methodology
Information Gathering
Vulnerability Scanning
Launch Attack
Gain Access
Maintain Attack
Countermeasures:
Practice Questions


Chapter 19: Cloud Computing
Technology Brief
Types of Cloud Computing Services
Cloud Deployment Models
NIST Cloud Computing Reference Architecture
Cloud Computing Benefits
Understanding Virtualization
Cloud Computing Threats
Data Loss/Breach
Abusing Cloud Services
Insecure Interface and APIs
Cloud Computing Attacks
Service Hijacking with Social Engineering Attacks
Service Hijacking with Network Sniffing
Session Hijacking with XSS Attacks
Session Hijacking with Session Riding
Domain Name System (DNS) Attacks
Side Channel Attacks or Cross-guest VM Breaches
Cloud Security
Cloud Security Control Layers
Responsibilities in Cloud Security
Resiliency and Automation Strategies
Automation/Scripting
Templates
Master Image
Non-Persistence
Elasticity
Scalability
Distributive Allocation
Redundancy
Fault Tolerance
High Availability
RAID
Mind Map
Cloud Security Tools
Core CloudInspect
CloudPassage Halo
Practice Questions


Chapter 20: Cryptography
Technology Brief
Cryptography Concepts
Cryptography
Types of Cryptography
Government Access to Keys (GAK)
Encryption Algorithms
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
RC4, RC5, RC6 Algorithms
The DSA and Related Signature Schemes
RSA (Rivest Shamir Adleman)
Lab 20- 1: Example of an RSA Algorithm
Message Digest (One-Way Hash) Functions
Message Digest Function: MD5
Secure Hashing Algorithm (SHA)
Secure Hash Algorithm 2 (SHA-2)
Hashed Message Authentication Code (HMAC)
SSH (Secure Shell)
Cryptography Tools
MD5 Hash Calculators
Lab 20-2: Calculating MD5 using HashCalc Tool
Hash Calculators for Mobile:
Cryptography Tools
Lab 20-3: Advanced Encryption Package 20 14
Public Key Infrastructure (PKI)
Public Key Infrastructure
Public and Private Key Pair
Certificate Authorities (CA)
Email Encryption
Digital Signature
SSL (Secure Sockets Layer)
SSL and TLS for Secure Communication
Pretty Good Privacy (PGP)
Disk Encryption
Cryptography Attacks
Practice Questions
Answers
Acronyms
References
About Our Products

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) certification, and as well as many others certification schemes, that are offered in over 87 countries globally.

EC-Council mission is to validate information security professionals having necessary skills and knowledge required in a specialized information security domain that helps them avert a cyber-war, “should the need ever arise”. EC-Council is committed to withholding the highest level of impartiality and objectivity in its practices, decision making, and authority in all matters related to certification.

EC-Council Certification Tracks

Ceh Tracks

How does CEH Certification Help?

The purpose of the CEH credential is to:

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

About the CEH Exam
  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 3 12-50 (ECC EXAM), 3 12-50 (VUE)

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but lawfully and legitimately to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

What is Certified Ethical Hacker?

Information security is always a great challenge for networks and systems. Data breach statistics estimated millions of records stolen every day which evolved the need for Security. Almost each and every organization in the world demands security from identity theft, information leakage and the integrity of their data. The role and skills of Certified Ethical Hacker are becoming more significant and demanding than ever. Certified Ethical Hacking (CEH) ensures the delivery of knowledge regarding fundamental and advanced security threats, evasion techniques from intrusion detection system and countermeasures of attacks as well as up-skill you to penetrate platforms to identify vulnerabilities in the architecture.

Get 20% instant discount when shared to your social account

*Product must be added in cart to apply coupon

Buy Now

Course Materials

Complete Blueprint, Practice Labs, Quick Reference Sheet, Certificate & 150+ Practice Questions Quiz

Send a Message