Do you need to earn your Certified Ethical Hacker (CEH v10) certification? If so, you’ve come to the right place.
Hi, my name is Ric Messier, and I’m an information security (IS) expert with decades of professional experience as a programmer, system administrator, network engineer, security engineering manager, VoIP engineer, and consultant. I’m also an adjunct instructor at Harvard University and bestselling tech book author who has personally trained thousands to pass various IS certification exams including CEH.
The CEH is an entry point to part of the broad world of information security. This course covers the range of topics that are covered in the CEH certification. This includes:
the importance of ethics
basic testing methodology
social engineering attacks
web application testing
The importance of ethical hacking isn’t in the breaking, it’s in the fixing. To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization.
The CEH is a very dense exam. It covers a very broad range of material. This course will be a good resource for you to understand not only the material but the breadth of the material. As EC-Council expects you to have two years of experience before you can even register to take the exam, I don’t expect this course alone will be enough for you to pass the test. Hands-on experience will help a lot. While this course is an excellent way to start preparing for the exam, I will also mention other resources you can use to set yourself up for success.
There is a lot to learn, so let’s get started!
Certified Ethical Hacker and CEH are registered trademarks with EC-Council. Their use here is not an indication that any of the material here is authorized or endorsed by EC-Council.
- Assess technical vulnerabilities for the potential for exploitation
- Apply a code of ethics to testing situations
- Perform technical vulnerability assessments
- Determine appropriate remediations for vulnerabilities
- Operate tools and utilities used in security testing
- Describe a basic penetration testing methodology
- Compare differences between testing methodologies that exist
- Identify appropriate testing tools
- Assess a testing request to identify the scope and remain within that scope