A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
It tests your skills in uncovering vulnerabilities that can be exploited by a malicious attacker. A CEH certification prepares you to match a black hat hacker’s techniques and creativity while equipping you with an in-depth understanding of hacking tools, evolving attack vectors, and preventative countermeasures.
Certified ethical hackers obtain permission from the asset owners before scrutinizing it for vulnerabilities and ensure that the outcomes remain confidential. The journey of becoming a certified ethical hacker begins with passing the CEH (ANSI) exam. Once you do, you can opt to take the CEH practical, a six-hour practical exam. When a professional is CEH certified and clears the CEH practical, they are recognized as a CEH Master.(Will Write my personal experience once completing the forth coming exams)
Ways to become a CEH
To become a certified ethical hacker, you need to pass the CEH exam that consists of a total of 125 multiple choice questions. You have a time limit of four hours to complete the examination.
EC-Council maintains the integrity of the certification exams by providing it as different question banks. These question banks are analyzed through beta testing for a suitable sample group under the supervision of security experts. It helps in ensuring that the questions asked in the exam have real-world applications in addition to academic significance. The governing body determines the difficulty rating of each question, and based on that, the cutoff is evaluated. Usually, it’s in the range of 60% to 80%, depending on the set of questions you get.
Regarding the eligibility criteria for attempting the CEH certification exam, you have two options. First, you can complete an official EC-Council training at an accredited training center, approved academic institution, or via the iClass platform. In this case, you can challenge the EC-Council certification exam without going through the application process.
The second option for CEH certification eligibility needs you to have at least two years of experience in the information security domain as a prerequisite. If you have the relevant experience, you can submit your application along with a fee of $100 (non-refundable). In the application form, you’ll have to list your manager’s details, who would act as verifiers in the application process. The application usually takes around a period of five to 10 working days once the verifier responds to the EC-Council’s request for information.
Once you decide to achieve the certification, you need a concrete plan for training as well as practice. Choose the best source for training. Its highly recommend choosing offline classroom training if you are a student or novice in cybersecurity. Usually, you can complete training in 3-4 months or less. The reason for recommending an offline course is that meeting other like-minded learners and professionals will help you develop the ethical hacker mindset. You can get in touch with proper mentors, people with similar mind-sets and take advantage of group study which can reveal many unknown issues, incidents, and examples. Of course, this will cost you more, but you can’t learn to swim without getting wet.
Get your hands on Experience with ilabs !
The plus point of the latest version of CEH v11 is that it is more focused, practical based and scenario-based with the latest content that equips students with hands-on skills. Remember, security is all about practice and implementation rather than a bunch of documents and do’s and don’ts checklist. While gaining the credential you will learn about methods and tools that you can use to protect the organization such as security implementations, testing, and monitoring. Just bookish knowledge won’t help there. We recommend that spending at least 2 hours daily practice apart from training will improve your skills dramatically.
While we did mention above not to be bookish, books are a treasure trove of knowledge and even for clearing the CEH you must do a thorough read of the recommended books. You can religiously follow study guides and clear your concept on every topic in a very descriptive manner. This will answer all your “What and Why” in terms of cybersecurity and ethical hacking. Of course, this is world-class content and therefore you will get exact definitions, descriptions, and diagrams for almost all topics. We recommend studying at least 1 hour daily to get clear on all topics during the training.
Study groups – Community
In my experience , i studied solely for day and nights nearly 4 months .Study groups will polish your knowledge and skills for CEH topics. There are many study groups you can join where you can resolve your queries, clear your doubts, take help to learn something, and help others too. This will help you to stay in the company of like-minded people and you will get to learn fast.
It is recommended not to share any personal/sensitive information. Beware of any unknown person who asks for sensitive information like your IP address, location, personal information, or anything apart from CEH courseware.
Its recommend making a study group with the people you know who are also attempting the exam. You can take the help of your trainer or mentor to manage this group. Be active and participate in group activities like quizzes or group discussions.
Keep learning is the key element of CEH training. Brush up your knowledge for the exam perspective as that is your main goal to become certified. For this, you need to learn how to give the exam and what type of questions are asked. You may face a lot of weird-looking or twisted or tricky questions with confusing multiple answers. Therefore, once you are done with your CEH training and you have knowledge of all topics, you need to test it like a mock drill of the war zone. There are many sources available where you can practice the exam questions. This platform will help you to understand the methods to ace the exam questions and complete them within the required timeframe.
Here sharing some links to practice for your exams
CEH ASSESSMENT- NEW 2022! CEHv11. Tests with complete explanations. Be an EC-Council Certified Ethical Hacker! -Udemy Course with nearly 500 Questions
CEH Study Guide – Learn the Courseware in depth and make notes of key points, this will help to review before exam
Apart from this, you can follow blogs, industry experts, and relevant videos for more understanding and guidance.
Module 1 : Introduction To Ethical Hacking
Ethical hacking and information security controls, laws, and standards. Pen tests, security audit, vulnerability assessment, and penetration testing roadmap.
- CIA Triad
- Hacking LifeCycle
- Cyber Kill Chain
- Security Audit Compliance
Module 2 : Footprinting and Reconnaissance
Footprinting refers to the process of collecting information about a target network and its environment, which helps in evaluating the security posture of the target organization’s IT infrastructure. It also helps to identify the level of risk associated with the organization’s publicly accessible information. Footprinting can be categorized into passive footprinting and active footprinting:
- Passive Footprinting:
Involves gathering information without direct interaction. This type of foot printing is principally useful when there is a requirement that the information-gathering activities are not to be detected by the target.
- Active Foot printing:
Involves gathering information with direct interaction. In active foot printing, the target may recognize the ongoing information gathering process, as we overtly interact with the target network.
Module 3 : Scanning Networks
Network scanning is the process of gathering additional detailed information about the target by using highly complex and aggressive reconnaissance techniques. The purpose of scanning is to discover exploitable communication channels, probe as many listeners as possible, and keep track of the responsive ones.
Types of scanning:
- Port Scanning: Lists open ports and services
- Network Scanning: Lists the active hosts and IP addresses
- Vulnerability Scanning: Shows the presence of known weaknesses
Module 4 : Enumeration
Enumeration creates an active connection with the system and performs directed queries to gain more information about the target. It extracts lists of computers, usernames, user groups, ports, OSes, machine names, network resources, and services using various techniques. Enumeration techniques are conducted in an intranet environment.
- Perform NetBIOS Enumeration
- Perform SNMP Enumeration
- Perform LDAP Enumeration
- Perform DNS Enumeration
- Perform NFS Enumeration
- Perform SMB Enumeration
- Perform Enumeration using tools
Module 5 : Vulnerability Analysis
Detect security gaps in an organization’s network infrastructure, communication channels, and computer systems. Vulnerability assessment plays a major role in providing security to any organization’s resources and infrastructure from various internal and external threats. To secure a network, an administrator needs to perform patch management, install proper antivirus software, check configurations, solve known issues in third-party applications, and troubleshoot hardware with default configurations. All these activities together constitute vulnerability assessment. Network vulnerability scanning can be categorized into active scanning and passive scanning:
- Common Weakness Enumeration (CWE)
- Common Vulnerabilities and Exposures (CVE)
- National Vulnerability Database (NVD)
- Common Vulnerability Scoring System (CVSS)
Module 6 : System Hacking
System hacking methodologies, Steganography, steganalysis attacks, and covering tracks to discover network and system vulnerabilities.
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
Module 7 : Malware Threats
Types of malwares (Trojan, virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
- Identify malware components used to download the malicious code
- Recognize the components of malicious software
- Identify the characteristics of an APT attack
- Identify the phases of an APT attack
- recognize the purpose of APT groups
- Identify the different types of trojan malware
- Identify the malware deployment types
- Identify the trojan type that includes running the real program in addition to the malicious code
- Recognize techniques used to avoid trojan detection
- Identify malicious software that requires human interaction to replicate to a system
- Identify the phases of the virus lifecycle
- Recognize the malware type that self-replicates
Module 8 : Sniffing
Networks are constantly sending data to deliver messages and keep network services working, but those data packets may contain sensitive information like passwords. In this course, you’ll examine how an attacker can gain access to sensitive data through packet sniffing. You’ll learn how attackers can manipulate DHCP, which can allow them to then intercept target host communications. Next, you’ll explore how attackers can manipulate ARP by taking advantage of the default functions of the ARP protocol. You’ll move on to examine how attackers trick users into sharing personal information through DNS poisoning. Finally, you’ll learn about common security controls that allow networks to communicate, while still adding layers of scrutiny, control, and obfuscation
- Identify the different attacks an attacker can use to access sensitive data through network switches
- Recognize the physical ways attacks can access sensitive data
- Recognize the types of packets sniffing attackers can use to access sensitive data
- Use network attacks to bypass network switches in order to sniff packets
- Identify how using a rogue DHCP server can be used to intercept target host communications
- Recognize how attackers can manipulate DHCP on client systems
- Describe how to defend against attackers manipulating the Address Resolution Protocol (ARP) table
- Identify how attackers can manipulate the ARP table
- Recognize and manipulate the Address Resolution Protocol (ARP) table
- Describe how to view the DNS cache on a local system
- Identify the attack techniques that can be used against DNS
- Recognize how attackers trick users into accessing an invalid host via DNS poisoning
- Identify security controls that can be employed to add layers of security that can derail many sniffing attacks
- Recognize common security controls and settings that can be added to derail many sniffing attacks
Module 9 : Social Engineering
The most insecure point in a network is not the network hosts, but the end user that works with it. In this course, you’ll explore the concepts and tactics of social engineering attacks, where the end user becomes the vulnerable system. The most dangerous attack can come from inside your network. You’ll also examine insider threats, including why they’re effective, their organization impacts, and why they’re difficult to detect and defend against. Identity theft is one of the most common and lucrative avenues of attack. To complete this course, you’ll learn the basic concepts, motives, and goals behind identity theft attacks.
- Identify the impact to an organization that compromised by social engineering attacks
- Recognize characteristics of a social engineering attack
- Recognize the phases of a social engineering attack
- Recognize the types of social engineering attacks
- Identify common scenarios involving insider threats
- Identify suspicious activity that could identify an insider threat
- Recognize the different types of insider threats
- Identify signs of identity theft
- Recognize the reasons for identity theft
Module 10 : Denial-of-Service
Denial of Service attacks can be very disruptive to an organization both monetarily and reputationally. In this course, you’ll explore Denial of Service and Distributed Denial of Service attacks, as well as common DoS techniques and categories and common tools used to perform them. Next, you’ll examine volumetric DoS attacks, which are one of the more common types deployed by attackers. These include UDP flood, Ping of Death, Smurf, and Pulse Wave. Finally, you’ll learn about protocol-based DoS attacks, including SYN floods, ACK floods, and fragmentation attacks.
- Identify the tools used to perform a denial-of-service attack
- Identify the types of denial of service (DoS) attacks
- Identify a command to perform a ping of death attack
- Recognize the command to issue to perform a UDP flood attack
- Recognize the different volumetric attack types
- Identify the command to perform a SYN flood attack
- Identify the different types of DoS attacks
- Recognize the different types of flood attacks
Module 11 : Session Hijacking
Techniques to discover network-level session management, authentication/authorization, cryptographic weaknesses, and countermeasures. identify the tools needed to intercept a web request, provide a session ID to the browser, and analyze the session ID, to see how easy it is to predict. Recognize various types of session attacks. Identify attack types on SSL and TLS, and describe how to perform a MITM attack, to assist a hijacked session.
- Identify the tool to intercept web request
- Identify the tool to provide a session ID to the browser
- Define the various attacks on sessions
- Describe the tool used to analyze the session ID to see how easy it is to predict
- Describe how to perform a MITM attack to help with session hijacking
- Identify attack types on SSL and TLS
Module 12 : Evading IDS, firewalls, and Honeypots
Firewall, IDS, and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
- Describe the techniques that can be used to evade IDS/IPS
- Recognize the different alert types of deployed IDS/IPS solutions
- Recognize the function of intrusion detection and prevention systems (IDS/IPS)
- Describe how firewalls are used as a security countermeasure
- Describe how firewalls can be configured as a security countermeasure
- Describe techniques that are commonly used to bypass firewalls
- Describe the types of honeypots that can be used to build better defenses
- Identify how honeypots can be used to protect your organization
Module 13 : Hacking Web Servers
Attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
- Describe the function of a web server and it common components
- Identify security controls that can help mitigate possible vulnerabilities
- Recognize where web server configuration files and common components are stored
- Describe the common web server attacks
- Recognize the directory traversal web server attack pattern
- Recognize tools that can be used to perform common web server attacks
- Work with the http response splitting web server attack
- Describe the tools used for each step of the web server attack methodology
- Identify the components of the web server attack methodology
- Recognize common web server attack methodology techniques
Module 14 : Hacking Web Applications
Web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in web applications and countermeasures.
- Describe techniques and technologies used by web applications
- Describe techniques for testing and protecting web applications
- Recognize defenses that can be used to protect web applications
- Recognize the details of web applications
- Describe an owasp top 10 web application attack and how to protect against it
- Describe how an owasp top 10 web application attack works
- Distinguish between the owasp top 10 web application attacks
- Recognize the owasp top 10 web application attacks
- Describe unvalidated redirects and forwards
- Recognize how to mitigate unvalidated redirects and forwards
Module 15 : SQL injection attacks
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
- Describe how to find spots where SQL Injection could be attempted against a web application that stores and delivers data
- Identify the type of SQL injection attack used gain web applications that store and deliver data
- Recognize the security controls and defenses that can be used to prevent SQL Injection attacks
- Recognize the types of SQL injection attacks
- Describe how error-based sqli can be tested for
- Identify ways to exploit sqli vulnerabilities
- Recognize how to use error-based sqli to enumerate the database
- Describe the time-based blind sqli method that can be used to access information on a remote system
- Recognize the types of blind-based sqli that can be used to access sensitive information
Module 16 : Hacking Wireless Networks
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
- Describe the Wi-Fi authentication types
- Identify the types of Wi-Fi antennas
- Recognize the common Wi-Fi standards
- Recognize the features of the Wi-Fi encryption schemes
- Describe threats to wireless technologies
- Identify threats to wireless technologies used by attackers
- Recognize the Rogue AP threat to wireless technologies
- Identify tools that help with wireless discovery and mapping
- Recognize tools used for doing wireless attacks
- Use tools to do wireless discovery, mapping, traffic analysis and attacks
Module 17 : Hacking Mobile Platforms
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. One of the main reasons that attackers are successful against mobile devices is due to the difficulty in managing them
- Describe OWASP Top 10 Mobile Risks
- Identify the OWASP defined Top 10 Mobile Risks to mobile devices
- Recognize the attack surface related to mobile devices
- Recognize the mobile risks as defined by OWASP
- Describe debugging and access tools available for Android devices
- Identify security and risk associated with rooting an Android device
- Identify sources of information for the Android environment
- Recognize common android vulnerability and attack tools
- Identify defenses associated with ios devices
- Identify jailbreaking types associated with ios devices
- Recognize attack vectors associated with ios devices
- Recognize tools that could be used as attack vectors with ios devices
- Identify how mobile device management should be deployed along with security policies
- Identify security issues around BYOD and mobile device management
- Identify the need and capabilities of mobile device management
- Recognize the tools and software available to do mobile device management
Module 18 : IoT and OT hacking
Internet-of-Things (IoT) devices make our lives convenient and that makes them more prevalent every day. Threats to IoT and OT platforms and learn how to defend IoT and OT devices securely.
- Describe IoT and recognize its main components
- Describe the IoT architectural components
- Identify the IoT protocols used for deployment
- Recognize the communication models used in IoT
- Describe common IoT threats
- Identify OWAP Top 10 IoT threats and vulnerabilities
- Recognize the attack surface for IoT devices
- Describe common IoT attacks
- Identify hacking tools and methods for hacking IoT devices
- Identify tools used for attacking IoT devices
- Recognize common attacks that can cause harm via IoT devices
Module 19 : Cloud Computing
Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools.
- Describe the different cloud computer types
- Describe the different cloud computer types of responsibility areas
- Identify the cloud service deployment models
- Recognize the different cloud storage architectures
- Describe containers and orchestration
- Describe the five-tier container architecture
- Identify common security challenges for container technologies
- Describe attack methods for accessing or enumerating cloud services
- Identify tools to enumerate amazon s3
- Recognize common security vulnerability and assessment tools
- Recognize tools used for gaining access to sensitive information
- Identify security controls for protecting cloud environments
- Recognize common security controls and online tools that can help with protecting cloud accounts, containers, and orchestration
- Recognize common security controls for cloud environments that can help you protect cloud accounts
Module 20 : Cryptography
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Encryption is one of the best security controls available for defending computer networks and data, and cryptography plays a vital role in this process
- Describe the purpose of cryptography
- Describe the types of cryptography
- Identify the commonly used types of cryptography
- Describe common algorithms and implementations used by various crypto systems
- Identify the strengths of commonly implemented hash functions
- Recognize common encryption and hashing functions and their uses
- Recognize the common encryption algorithms and their types
- Recognize tools that can aid in securing sensitive data on desktops
- Recognize tools that will aid you in securing your sensitive data on servers
So, start your journey on becoming a certified cyber security professional with the CEH course and credential. As with anything else, practice makes perfect, and you will become better as an ethical hacker with practice. Work hard and you will achieve your CEH certification at the very first attempt.