Certified Ethical Hacking Certification

Certified Ethical Hacking Certification

home_course_ceh

Certified Ethical Hacking Certification  Exam :

  • Exam ID: 312-50 (ECC EXAM), 312-50 (VUE)
  • Number of Questions: 125
  • Item Types: Multiple Choice
  • Exam time: 240 Mins.
  • Passing score: 70%
  • Price: $885 USD

Syllabus for Ethical Hacking Certification Exam

Background 4%
  • Networking Technologies (hardware, infrastructure)
  • Web Technologies (e.g., web 2.0, skype)
  • Systems Technologies
  • Communication Protocols
  • Malware operations
  • Mobile Technologies (e.g., smart phones )
  • Telecommunication on technologies
  • Backups and archiving (e.g., local, network)
Analysis /Assessment 13%
  • Data analysis
  • Systems analysis
  • Risk assessments
  • Technical assessment methods
Security 25%
  • Systems security controls
  • Application/file server
  • Firewalls
  • Cryptography
  • Network security
  • Physical security
  • Threat modeling
  • Verification procedures (e.g.false positive/negative validation)
  • Social engineering (human factors manipulation)
  • Vulnerability s canners
  • Security policy implications
  • Privacy/confidentiality (with regard to engagement)
  • Biometrics
  • Wireless access technology (e.g., networking, RFID, Bluetooth)
  • Trusted networks
  • Vulnerabilities
Tools / Systems / Programs 32%
  • Network/host based intrusion
  • Network/wireless sniffers (e.g., WireShark, Airsnort)
  • Access control mechanisims (e.g.,smart cards )
  • Cryptography techniques (e.g., IPsec, SSL, PGP)
  • Programming languages (e.g. C++, Java, C#, C)
  • Scripting languages (e.g., PHP, Java script)
  • Boundary protection appliances
  • Network topologies
  • Subnetting
  • Port scanning (e.g., NMAP)
  • Domain name system (DNS)
  • Routers /modems /switches
  • Vulnerability s canner (e.g., Nessus , Retina)
  • Vulnerability management and protection systems (e.g., Founds tone, Ecora)
  • Operating environments (e.g., Linux, Windows , Mac)
  • Antivirus systems and programs
  • Log analysis tools
  • Security models
  • Exploitation tools
  • Database structures
Procedures /Methodologies 20%
  • Cryptography
  • Public key infrastructure (PKI)
  • Security Architecture (SA)
  • Service Oriented Architecture
  • Information security incident
  • N- Tier application design
  • TCP/IP networking (e.g., network routing)
  • Security testing methodology
Regula on/Policy 4%
  • Security policies
  • Compliance regulations (e.g., PCI)
Ethics 2%
  • Professional code of conduct
  • Appropriateness of hacking

Drop us a query

Course Features

Get Practical and Well focused training from Top IT Industry experts.

Get Routine assignments based on learning from previous classes.

Live project, during or after the completion of the syllabus.

Lifetime access to the learning management system including Class recordings, presentations, sample code and projects

Lifetime access to the support team (available 24/7) in resolving queries during and after the course completion

Get certification after the course completion.

Scholarship Exam +91-9711526942 whatsapp

Testimonials