0% found this document useful (0 votes)
68 views2 pages

SMU Certified Ethical Hacker

This 80-hour Certified Ethical Hacker course costs $3,995 and takes 6 months to complete. It provides an introduction to ethical hacking and teaches skills like footprinting, scanning networks, enumeration, and system hacking. Students learn to hack wireless networks, web servers, web applications, and mobile platforms. The course prepares students to take the CEH certification exam, which is 125 multiple choice questions over 4 hours. It focuses on new attack vectors like cloud computing and mobile devices, and covers recent vulnerabilities like Heartbleed, Shellshock, and Poodle. Over 40% of the labs are new, covering hacking tools and mobile/cloud security. An educational mentor supports students and reviews their progress.

Uploaded by

javier cardenas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views2 pages

SMU Certified Ethical Hacker

This 80-hour Certified Ethical Hacker course costs $3,995 and takes 6 months to complete. It provides an introduction to ethical hacking and teaches skills like footprinting, scanning networks, enumeration, and system hacking. Students learn to hack wireless networks, web servers, web applications, and mobile platforms. The course prepares students to take the CEH certification exam, which is 125 multiple choice questions over 4 hours. It focuses on new attack vectors like cloud computing and mobile devices, and covers recent vulnerabilities like Heartbleed, Shellshock, and Poodle. Over 40% of the labs are new, covering hacking tools and mobile/cloud security. An educational mentor supports students and reviews their progress.

Uploaded by

javier cardenas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Certified Ethical Hacker

192BCO300A-O
Student Name :
Start Date :
End Date :

Program Clock Hours: 80 hours


Tuition: $3995.00
Duration: 6 months

Overview

This course provides learners with an introduction to ethical hacking. learners will also learn about
footprinting and reconnaissance, scanning networks, enumeration, system hacking, trojans and
backdoors, viruses and worms, sniffing, social engineering, denial of service, session hijacking, hacking
webservers, hacking web applications, SQL injection, hacking wireless networks, hacking mobile
platforms, evading IDS, firewalls, and honeypots, buffer overflow, cryptography, and penetration
testing.

Certification
The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from
a vendor-neutral perspective.
About the Exam:
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

Outline:

Focus on New Attack Vectors


Emphasis on Cloud Computing Technology
CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
Covers wide-ranging countermeasures to combat cloud computing attacks
Provides a detailed pen testing methodology for cloud systems to identify threats in advance
Emphasis on Mobile Platforms and Tablet Computers
CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and
covers countermeasures to secure mobile infrastructure
Coverage of latest development in mobile and web technologies
New Vulnerabilities Are Addressed
Heartbleed CVE-2014-0160

Southern Methodist University – CAPE / 6185 Airline Road / Dallas, TX 75275 / PH: (214) 768.1192 FAX: (214) 768.1192
Robert Hurst / cape_studentveterans@smu.edu /
https://contsturegister.smu.edu/wconnect/CourseStatus.awp?&course=162BCO300A-O
Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers
vulnerable.
Detailed coverage and labs in Module 18: Cryptography.
Shellshock CVE-2014-6271
Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as
Linux and OS X.
Detailed coverage and labs in Module 11: Hacking Webservers
Poodle CVE-2014-3566
POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a
service, allowing them to control your account without needing your password.
Case study in Module 18: Cryptography
Hacking Using Mobile Phones
CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing,
DDoS attack, etc.) using mobile phones
Courseware covers latest mobile hacking tools in all the modules
Coverage of latest Trojan, Virus, Backdoors
Courseware covers Information Security Controls and Information
Security Laws and Standards
Labs on Hacking Mobile Platforms and Cloud Computing
More than 40 percent new labs are added from Version 8
More than 1500 new/updated tools
CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
It also focuses on addressing the existing threats to operating environments dominated by Windows 7,
Windows 8, and other operating systems (backward compatibility)

Instructor:

This class supported by an Educational Mentor. Our educational mentors have worked or are working in
the subject they mentor. Educational Mentors reviews student work, student progress, and interacts
with students as needed. They respond to any questions or concerns you might have, as well as
encouraging and motivating you to succeed.

Southern Methodist University – CAPE / 6185 Airline Road / Dallas, TX 75275 / PH: (214) 768.1192 FAX: (214) 768.1192
Robert Hurst / cape_studentveterans@smu.edu /
https://contsturegister.smu.edu/wconnect/CourseStatus.awp?&course=162BCO300A-O

You might also like