C|EH MASTER

  • Home
  • Course Details

Course Description

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest Hacking Techniques, methodologies, tools, tricks and security measures. Unlike other theoretical training, you will be immersed in interactive sessions and there will be hands-on lab. You can explore the newly gained knowledge right away in your classroom by trying to test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems.

WHY C|EH MASTER

To be placed at the tip of your organization’s cyber spear, you must be confident, proficient in your job, and be at the top of your game. You must be able to think on your feet, act quickly, appropriately, and proportionally. Make a mistake and bad things can happen.

CEH Master gives you the opportunity to prove to your employer, your peers, and most importantly to yourself that you can in fact take on and overcome challenges found in everyday life as an Ethical Hacker. To prove this, though, we don’t give you exam simulations. We test your abilities with real-world challenges in a realworld environment, and with a time limit, just as you would find in your job.

Do you run towards danger? Do you take charge during unsettling and challenging times? Do you want to be the one your team can rely on to take the fight to the bad guys? If your answers are yes, prove yourself with CEH Master!

ABOUT THE C|EH PRACTICAL

CEH Practical is a six-hour, rigorous exam that requires you to demonstrate the application of Ethical Hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, web app hacking, etc. to solve a security audit challenge.

The hands-on exam will test you to your limits in unearthing vulnerabilities across major operating systems, databases, and networks. It is not a simulated exam. It mimics a real corporate network using live virtual machines, networks, and applications, designed to test your skills. You will be presented with various scenarios and will be asked to demonstrate the application of the knowledge acquired in the CEH course to find solutions to real-life challenges.

Furthermore, you will be given limited time, just like in the real world. The exam was developed by a panel of experienced SMEs and includes 20 real-life scenarios with questions designed to validate essential skills required in the Ethical Hacking domains as outlined in the CEH program.

Course Details

Exam Information

Exam#1 : C|EH Exam

  • Exam : 125 Questions
  • Exam Duration : 4 Hours
  • Format : Multiple Choice
  • Delivery : ECC EXAM, VUE
  • Exam Prefix : 312-50 (ECC EXAM), 312-50 (VUE)
  • Passing Score : 70%
Exam#2 : C|EH Practical
  • Questions : 20 Practical Challenges
  • Exam Duration : 6 Hours
  • Availability : Aspen – iLabs
  • Format : iLabs Cyber Range
  • Open Book : Just Like In The Real World!
  • Passing Score : 70%

Who Should Attend?

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Key Features In CEH Masters

C|EH (PRACTICAL) CREDENTIAL HOLDERS ARE PROVEN TO BE ABLE TO:

  • Demonstrate the understanding of attack vectors.
  • Perform network scanning to identify live and vulnerable machines in a network.
  • Perform OS banner grabbing, service, and user enumeration.
  • Perform system hacking, steganography, steganalysis attacks, and cover tracks.
  • Identify and use viruses, computer worms, and malware to exploit systems.
  • Perform packet sniffing.
  • Conduct a variety of web server and web application attacks including directory traversal, parameter tampering, XSS, etc.
  • Perform SQL injection attacks.
  • Perform different types of cryptography attacks.
  • Perform vulnerability analysis to identify security loopholes.

Related Courses

CEH - Certified Ethical Hacker
CEH - Certified Ethical Hacker

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing...

CHFI - Computer Hacking Forensic Investigator
CHFI - Computer Hacking Forensic Investigator

EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFI...