Scroll to top button

CEH-V8 : Matt Walker’s All in One Course for the CEH Exam

MHE-CEH-V8
Matt Walker’s All in One Course for the CEH Exam
ISBN : 978-1-61691-697-8

Gain hands-on expertise in EC-Council CEH: Certified Ethical Hacker certification exam by CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition course. CEH is a vendor neutral credential designed for information security professionals to validate knowledge in Information Assurance (IA); information security management program; threat modeling; Enterprise Information Security Architecture (EISA); network security zoning; defense in depth; information security policies, physical security; incident management; vulnerability assessment, penetration testing, and much more.

Here's what you will get

The Certified Ethical Hacker exam is the pinnacle of the most desired information security training program. The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

Lessons
13+
Exercises
137+
Flashcards
414+
Glossary of terms
414+
Pre-assessment Questions
50+
Full Length Tests
2+
Exam FAQs
What is the exam registration fee?

The version 7 and version 8 exams costs US$500 for the actual test and $100 as a non-refundable fee for registration.

What is the format of the exam? Multiple Choice
How many questions are asked in the exam? The exam contains 125 questions.
What is the passing score? 70%

(on a scale of 0-1000)

What is the exam's retake policy?

If a candidate does not successfully pass an EC-Council exam, he/she can purchase ECC Exam center voucher to retake the exam at a discounted price.

  1. If a candidate is not able to pass the exam on the first attempt, no cooling or waiting period is required to attempt the exam for the second time (1st retake).
  2. If a candidate is not able to pass the second attempt (1st retake), a waiting period of 14 days is required prior to attempting the exam for the third time (2nd retake).
  3. If a candidate is not able to pass the third attempt (2nd retake), a waiting period of 14 days is required prior to attempting the exam for the fourth time (3rd retake).
  4. If a candidate is not able to pass the fourth attempt (3rd retake), a waiting period of 14 days is required prior to attempting the exam for the fifth time (4th retake).
  5. A candidate is not allowed to take a given exam more than five times in a 12 month (1 year) period and a waiting period of 12 months will be imposed before being allowed to attempt the exam for the sixth time (5th retake).
  6. Candidates who pass the exam are not allowed to attempt the same version of the exam for the second time.

EC-Council strongly advises candidate who fail the exam for the third time (2nd retake) to attend official hands-on training that covers the certification objectives. This is not applicable for LPT (Master) Exam.

EC-Council reserves the right to revoke the certification status of candidates who attempt the exam without abiding to EC-Council retake policy as stated above.

Which certification covers this exam?
What are the career opportunities after passing this exam?

  • Network Security Officer
  • Technical Writer
  • Authorized Hacker
  • Network Administrator
  • Security Administrator
  • Web Site Administrator

Here's what you will learn

  • Security 101
  • Introduction to Ethical Hacking
  • Lesson Review
  • Scanning Fundamentals
  • Enumeration
  • Lesson Review
  • Fundamentals
  • Sniffing Tools and Techniques
  • Evasion
  • Lesson Review
  • Getting Started
  • Cracking Passwords
  • Privilege Escalation and Executing Applications
  • Stealth
  • Lesson Review
  • Attacking Web Servers
  • Attacking Web Applications
  • Lesson Review
  • Wireless 101
  • Wireless Hacking
  • Lesson Review
  • The Malware Attacks
  • Remaining Attacks
  • Lesson Review
  • Cryptography and Encryption Overview
  • PKI, the Digital Certificate, and Digital Signatures
  • Encrypted Communication and Cryptography Attacks
  • Lesson Review
  • Social Engineering
  • Physical Security
  • Lesson Review
  • Methodology and Steps
  • Miscellaneous Information
  • Lesson Review
  • Vulnerability Research Sites
  • Footprinting Tools
  • Scanning and Enumeration Tools
  • System Hacking Tools
  • Cryptography and Encryption
  • Sniffing
  • Wireless
  • Trojans and Malware
  • IDS
  • Wireless
  • Web Attacks
  • Miscellaneous
  • Tools, Sites, and References Disclaimer

Copyright © 2002-2017 uCertify / All Rights Reserved.