Certified Ethical Hacking Certification

Certified Ethical Hacking Certification

home_course_ceh

Certified Ethical Hacking Certification  Exam :

  • Exam ID: 312-50 (ECC EXAM), 312-50 (VUE)
  • Number of Questions: 125
  • Item Types: Multiple Choice
  • Exam time: 240 Mins.
  • Passing score: 70%
  • Price: $885 USD

Syllabus for Ethical Hacking Certification Exam

Background 4%
  • Networking Technologies (hardware, infrastructure)
  • Web Technologies (e.g., web 2.0, skype)
  • Systems Technologies
  • Communication Protocols
  • Malware operations
  • Mobile Technologies (e.g., smart phones )
  • Telecommunication on technologies
  • Backups and archiving (e.g., local, network)
Analysis /Assessment 13%
  • Data analysis
  • Systems analysis
  • Risk assessments
  • Technical assessment methods
Security 25%
  • Systems security controls
  • Application/file server
  • Firewalls
  • Cryptography
  • Network security
  • Physical security
  • Threat modeling
  • Verification procedures (e.g.false positive/negative validation)
  • Social engineering (human factors manipulation)
  • Vulnerability s canners
  • Security policy implications
  • Privacy/confidentiality (with regard to engagement)
  • Biometrics
  • Wireless access technology (e.g., networking, RFID, Bluetooth)
  • Trusted networks
  • Vulnerabilities
Tools / Systems / Programs 32%
  • Network/host based intrusion
  • Network/wireless sniffers (e.g., WireShark, Airsnort)
  • Access control mechanisims (e.g.,smart cards )
  • Cryptography techniques (e.g., IPsec, SSL, PGP)
  • Programming languages (e.g. C++, Java, C#, C)
  • Scripting languages (e.g., PHP, Java script)
  • Boundary protection appliances
  • Network topologies
  • Subnetting
  • Port scanning (e.g., NMAP)
  • Domain name system (DNS)
  • Routers /modems /switches
  • Vulnerability s canner (e.g., Nessus , Retina)
  • Vulnerability management and protection systems (e.g., Founds tone, Ecora)
  • Operating environments (e.g., Linux, Windows , Mac)
  • Antivirus systems and programs
  • Log analysis tools
  • Security models
  • Exploitation tools
  • Database structures
Procedures /Methodologies 20%
  • Cryptography
  • Public key infrastructure (PKI)
  • Security Architecture (SA)
  • Service Oriented Architecture
  • Information security incident
  • N- Tier application design
  • TCP/IP networking (e.g., network routing)
  • Security testing methodology
Regula on/Policy 4%
  • Security policies
  • Compliance regulations (e.g., PCI)
Ethics 2%
  • Professional code of conduct
  • Appropriateness of hacking

Drop us a query

Testimonials

user
user
user
user
user
user