back

CEH v10

Certified Ethical Hacker v1039 H 33 M

More than ever, companies are hiring ethical hackers to analyze, test, and secure assets. Learn how to become a Certified Ethical Hacker in this course.

This course has a virtual lab
This course has a practice test
Episodes
Episodes
  • Introduction
    • Overview
    • Intro to Ethical Hacking: Threats
    • Intro to Ethical Hacking: Threats Part 2
    • Intro to Ethical Hacking: Hacking Concepts
    • Intro to Ethical Hacking: Hacking Concepts Part 2
    • Intro to Ethical Hacking: Security Controls
    • Intro to Ethical Hacking: Security Controls Part 2
    • Intro to Ethical Hacking: Security Controls Part 3
    • Intro to Ethical Hacking: Security Controls Part 4
    • Intro to Ethical Hacking: Security Controls Part 5
    • Intro to Ethical Hacking: Pentesting
    • Intro to Ethical Hacking: Laws and Standards
  • Information Gathering and Vulnerability Identification
    • Footprinting
    • Footprinting Part 2
    • Footprinting Part 3
  • Attacks and Exploits
    • Host Discovery
    • Scanning with Nmap
    • Scanning with Nmap Part 2
    • ProxyChains
  • Enumeration
    • Enumeration
  • Vulnerability Analysis
    • Vulnerability Analysis Concepts
    • Vulnerability Analysis Tools
  • System Hacking
    • Password Attacks
    • Password Attacks Part 2
    • Password Attacks Part 3
    • Password Attacks Part 4
    • Password Attacks Part 5
    • Privilege Escalation
    • Privilege Escalation Part 2
    • Privilege Escalation Part 3
    • Covert Data Gathering
    • Hidden Files
    • Covering Tracks
  • Malware Threats
    • Malware Threats cehv10
    • Malware Threats Part 2
    • Malware Threats Part 3
  • Sniffing
    • Network Sniffing
    • Network Sniffing Part 2
  • Social Engineering
    • Social Engineering
    • Social Engineering Part 2
    • Social Engineering Part 3
  • Denial of Service
    • Denial of Service
    • Denial of Service Part 2
    • Denial of Service Part 3
  • Session Hijacking
    • Session Hijacking
    • Session Hijacking Part 2
    • Session Hijacking Part 3
  • Evading IDS, Firewalls, and Honeypots
    • Evading IDS, Firewalls and Honeypots
    • Evading IDS, Firewall and Honeypots Part 2
    • Evading IDS, Firewall and Honeypots Part 3
    • Evading IDS, Firewall and Honeypots Part 4
    • Evading IDS, Firewall and Honeypots Part 5
  • Hacking Web Servers
    • Hacking Web Servers
  • Hacking Web Applications
    • Common Web App Threats
    • Common Web App Threats Part 2
    • Common Web Apps Threats Part 3
    • Common Web App Threats Part 4
    • Practical Web App Hacking
    • Practical Web App Hacking Part 2
    • Practical Web App Hacking Part 3
  • SQL Injection
    • SQL Concepts
    • SQL Injection Types
    • Other SQLi and Tools
  • Hacking Wireless Networks
    • Wireless Hacking Concepts
    • Wireless Hacking: Tools
    • Wireless Hacking: Tools Part 2
    • Wireless Hacking: Common Threats
    • Wireless Hacking: Common Threats Part 2
    • Wireless Hacking: Cracking WEP
    • Wireless Hacking: Cracking WPA/WPA2
  • Hacking Mobile Platforms
    • Mobile Hacking
  • IoT Hacking
    • IoT Concepts
    • IoT Concepts Part 2
    • IoT Attacks
    • IoT Attacks Part 2
    • IoT Attacks Part 3
  • Cloud Computing
    • Cloud Computing Concepts
    • Cloud Computing Concepts Part 2
    • Cloud Computing Attacks
    • Cloud Computing Attacks Part 2
  • Cryptography
    • Cryptography Concepts
    • Cryptography Concepts Part 2
    • Cryptography Concepts Part 3
    • Cryptography Concepts Part 4
    • Cryptography Concepts Part 5
    • Cryptography Concepts Part 6
    • Cryptography Attacks

Overview

9 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

EC-Council's Certified Ethical Hacker(CEH) course is meant to give the student a foundational knowledge and skillset to be an asset to their current organization as a security analyst or become an effective member of a security team engaged in offensive security testing and vulnerability assessments. In this course you'll learn about specific topics including: Intro to Ethical Hacking, Information gathering through foot-printing and reconnaissance techniques, network and system scanning, service enumeration, vulnerability discovery and analysis, system hacking, malware, social engineering, web application hacking, SQL Injection, Wireless, Mobile, IoT, and more.

[MUSIC] Hello, and thank you for watching ITProTV. We're gonna be talking with Daniel Lowrie about CEHv10. Hey Daniel, nice to have you here. >> Nice to be here. >> Can you tell us what CEHv10 is all about? >> Sure, CEH version 10, obviously, is the latest iteration of the Certified Ethical Hacker Courseware and exam that they have available from EC council is meant to validate and improve your skills as far as the security specialist goes. That's where you want to think. Using certified ethical hacker or a type of a penetration tester as a foundational certification for people that want to get into the business as a security practitioner. It's a very well respected and very widely used certification. I believe it is also a government approved. So, if you're looking to get into that set of things it could be helpful here, or to just validate your skills as a security practitioner. >> And who is CEH v10 targeted towards? >> CEH is targeted toward the person whose been in the business a little while, they've probably worked as an administrator in some way, shape, or form, either in systems or networks or both. Maybe done a little bit of DevOps kind of thing. But you do need to have a foundational knowledge of networks and systems, ranging from Microsoft through Linux, Apple, mobile platforms as well. You don't want to come into this cold turkey people have done it, but they don't really recommend that because of how much knowledge they assume that you'll have going into this exam. So somebody who has been an administrator for a while. >> Very good very good. Now is there a certification available for this course? >> Yes, it is certified ethical hackers so yeah, definitely there. >> What I think. >> There is a certain involved with this and it's a bit of a bear don't kid yourself on that. But you follow this series we'll definitely get you the information that you need. But once you're ready to take the exam, you're ready to sit that get that certification in your hand. So that you can prove to a potential employers or your current employer that you have the skills necessary to become their security practitioner. You can definitely seek that exam. Let's go to EC council and let's see some particulars about this exam. >> Yeah. >> I've already brought the website up for us here just at the EC council. I've gone to the certified eithical hacker certification webpage. Shows you an example of what the certification looks like. It's always nice to see what it is that you'll be able to hold in your hands. Kind of give you a rundown about this. It will give you kind of what we're talking about now, what they expect from you, what you can expect from it as far as knowledge, assumed knowledge that you should already have, knowledge that you'll learn, and things that you're gonna have to cover on the exam. It tells you the purpose of the CEH credential is to establish and govern minimum standards for credentialing professional information security specialists and ethical hacking measures, inform the public, great stuff. This is really the meat and potatoes, though, right here. That's what you want to know about the exam. The number of questions? 125. But the good news is they give you four hours in which to take the exam. I've taken the exam, it's a slog, you're gonna be there a minute, so be prepared for that. Eat a healthy breakfast and go in rested. >> [LAUGH] >> Have a sharp number two pencil, no you won't need that, but hey, [LAUGH] they'll provide all that. >> You never know. >> That's right. The test format is multiple choice, so some saving grace there for those of us that love multiple choice exams. Let's see, the test delivery is done through ECC or the EC Council, or Pearson Vue. It tells you the exam prefix, so if you do need to sign up for it, you know exactly which exam to go for. This is the 312-50 ECC exam and it's also the 312-50 as well for Pearson Vue. So regardless of which testing body you sign up through, it's gonna be the exact same test number, okay? All right, it tells us here the passing score in order to maintain the high integrity of our certification, EC Council exams provided multiple forms, different question blanks. Each form is carefully analyzed through beta testing. But really, what we're looking for down here, scores can range from 60 to 85%, a per exam form basis, depending on which exam form is challenged. So it might range from you might be able to pass with a 60, you might be able to pass with an 85, just depends on the exam form that they give you. So kinda giving you a, I don't know what I gotta do, so I gotta really bring my a game for this. And that's what they wanna do, that's the whole purpose to that. Is to make sure that the people that do pass the exam really do have the knowledge necessary to pass, okay? Then now you know a little bit about the exam. Let's go over to the application process here, the Application Eligibility Process. So if you're self studying, you did not take EC Council official training, then you will need to prove some eligibility for the exam. This is option two under the CEH ANSI of this home right there. And you can see that web link right there, cert.eccouncil.org/application-process-el- igibility.html. Okay. And now, we can kind of get a little closer look at what that entails. Oops, I am going the wrong way with my zoom. There we go, now I can just scroll. [LAUGH] So here we go. Certification title, this is option 2 for those who did not take official certification training, information security related experience, two years. You have to prove some form of experience, being the minimum of two years of that experience, okay? You have a remit, a non-refundable eligibility application fee of $100. And this is like it says, non-refundable. So once you submit your application for the exam, you submit that with a bucks, if you are ineligible for any reason, you do not get the $100 back. It is theirs to keep. You submit an eligibility application form, receive a formal approval which you will get back from EC Council. And then here's the exam voucher price as of the filming of this right here. This is if you go through Pearson Vue, and this is if you go through EC Council. So it's gonna cost you a few bones, but you're investing into your future as a security practitioner, so there you go. And then you can go to the link and it's got links on the right hand side over there, kind of behind my head. There you go. And you can follow those so that you can purchase your exam vouchers. Okay that being said, definitely want to peruse to this eligibility process form. I'm not gonna take that much time with doing that. I'll let you read that. But it will lay out all the different criteria for you to be eligible for the EC Council CEH exam. Once you feel confident that you will pass that eligibility, you can fill out that form, this is what it looks like right here and then submit it to EC Council. And you will hear back from them once they've deemed you eligible and schedule your exam. Once you done that, you sit the exam, pass the exam, get the certification, put it on your resume. >> Thanks Daniel. Now what topics are covered CEHv10? >> We cover a variety of different topics from basically the hacking methodology from start to finish. They are going to take you through learning about footprinting and enumeration. Delve into a little bit of scanning using different scanning. Things like nMap, using web application scanners, vulnerability scanners. You're gonna learn about a lot about web application hacking per se, getting into that. Web application hacking is very popular thing to do, because everybody's got a website nowadays, and it's an easy way to get after a target as a penetration tester. Kind of walk you through the methodologies that are involved in that. We're gonna walk you through mobile, we're gonna walk you through IDS and IPS evasion techniques. We're gonna take you basically from soup to nuts of each phase of hacking. Removing our tracks, trying to stay under the radar, how can we do that? All the different frameworks and tools that we're gonna use. They are various and sundry. There will be plenty of them to be had. And we're gonna show you how these things work. We're gonna take your through different types of attacks. How do I do a SQL injection? You will learn that. And not just a fundamental way, we will apply that type of methodology and actually hack a system using these different techniques and tools. So, it'll be a lot of fun. I can't wait, and I hope you guys will join us and enjoy everything that we show you and learn a lot. That's my hope. >> Thanks Daniel. No stone unturned. So CEHv10 sounds like something you might be interesting in and it should be. Make sure you watch every episode. And by the way, it'll be in the course library. Lots of information there beyond that. But thank you for joining us and thank you for watching ITPro TV which is binge worthy. I'm Zach Memos. >> I'm Daniel Lowrie. >> Bye bye. [MUSIC]

Just you? Training a whole team? There's an ITProTV plan that fits.

With more than 4,000 hours of engaging video training for IT professionals, you'll find the courses you and your team need to stay current and get the latest certifications.