CEHv9 Course Introduction - USALearning

Transcription

CEHv9 Course IntroductionTable of ContentsCertified Ethical Hacker v9 . 2Course Objectives . 3Gap Area . 4About the Exam. 5EC-Council Resources . 6Notices . 7Page 1 of 7

Certified Ethical Hacker v9Certified Ethical Hackerv9Module 1: IntroductionSoftware Engineering InstituteCarnegie Mellon UniversityPittsburgh, PA 152131**001 Instructor: Hi. Welcome to theCertified Ethical Hacker Training,Version Nine.Page 2 of 7

Course ObjectivesCourse ObjectivesIntent Provides a review of the 20 CEHv9 functional areas Supplement preparation for the CEHv9 certification ExamFunctional AreasIntroduction toEthical HackingTrojans &BackdoorsSession HijackingHacking MobilePlatformsFoot printing &ReconnaissanceEvading IDS,Firewalls, andHoneypotsHackingWebserversCloud ComputingScanningNetworksSniffingHacking WebApplicationsCryptographyEnumerationSocial EngineeringSQL InjectionPenetration TestingSystem HackingDenial of ServiceHacking WirelessNetworksViruses & OtherMalware2**002 There are twenty functionalareas for the Certified Ethical Hackerexam. Slight changes from previousversions of the exam. First off, thebuffer overflow section is completelygone. That's not to say that you canforget all of your knowledge aboutbuffer overflows because it is stillpresent in the other modules. New toversion nine is cloud computing, abrand new module. And the mobiledevices section has also beenexpanded under hacking mobileplatforms. Those are really the bigchanges for the exam on versionnine.Page 3 of 7

Gap AreaGap AreaTo fully prepare for the exam, consider and use other sources!This training is not designed to go from zero to hero!3**003 I do want to stress that do notuse this training to solely prepareyou for the exam. Go to othersources. Get some certificationpreparation books. There are someknowledge that we will not cover inthis training. Those other knowledgesources can help fill those gaps.Page 4 of 7

About the ExamAbout the ExamCEH 312-50Delivered by VUE and ECC4 Hours125 Multiple-Choice questionsPassing score: 70%, or 88 questionsDepartment of Defense Approved: Computer Network Defense Service Provider (CNDSP) Analyst, Infrastructure Support, Incident Responder, Auditor4**004 The overall structure of theexam has not changed, it is still 125questions over the space of fourhours. Passing is 70 percent or 88questions. And the certified ethicalhacker exam is Department ofDefense approved for these roles.Page 5 of 7

EC-Council ResourcesEC-Council ResourcesThese can help you focus your studies! Certified Ethical Hacker ds/2016/06/CEH-Handbook-v2.0.pdf Recommend reviewing the handbook for exam information- Retakes and Extensions- Special Accommodations- Certificate Renewal Certified Ethical Hacker ads/2016/02/CEH-Exam-Blueprint-v2.0.pdf5**005 The EC council is theorganization that sponsors the ethicalhacker examination. They do have ahandbook and a blueprint availablefor your reference. And thehandbook details things like retakes,special accommodations, certificaterenewal. As of this recording, you dohave to maintain your certificationevery three years with 120continuing education credits.However, the EC council reserves theright to make updates to that at anytime. So please refer back to theirresources in order to keep current onthe current requirements.Page 6 of 7

NoticesNoticesCopyright 2016 Carnegie Mellon UniversityThis material is based upon work funded and supported by the Department of Defense under ContractNo. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software EngineeringInstitute, a federally funded research and development center.Any opinions, findings and conclusions or recommendations expressed in this material are those of theauthor(s) and do not necessarily reflect the views of the United States Department of Defense.NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERINGINSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITYMAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTERINCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE ORMERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL.CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITHRESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.[DISTRIBUTION STATEMENT D] Distribution authorized to the Department of Defense and U.S. DoDcontractors only (administrative or operational use) (2016-05-01). Other requests shall be referred toDISA/RME.Carnegie Mellon and CERT are registered marks of Carnegie Mellon University.DM-00041046**006 Thank you.Page 7 of 7

Provides a review of the 20 CEHv9 functional areas Supplement preparation for the CEHv9 certification Exam Functional Areas Introduction to Ethical Hacking Trojans & Backdoors Session Hijacking Hacking Mobile Platforms Foot printing & Reconnaissance Evading IDS, Firewalls, and Honey