SMU Certified Ethical Hacker
SMU Certified Ethical Hacker
192BCO300A-O
Student Name :
Start Date :
End Date :
Overview
This course provides learners with an introduction to ethical hacking. learners will also learn about
footprinting and reconnaissance, scanning networks, enumeration, system hacking, trojans and
backdoors, viruses and worms, sniffing, social engineering, denial of service, session hijacking, hacking
webservers, hacking web applications, SQL injection, hacking wireless networks, hacking mobile
platforms, evading IDS, firewalls, and honeypots, buffer overflow, cryptography, and penetration
testing.
Certification
The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from
a vendor-neutral perspective.
About the Exam:
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
Outline:
Southern Methodist University – CAPE / 6185 Airline Road / Dallas, TX 75275 / PH: (214) 768.1192 FAX: (214) 768.1192
Robert Hurst / cape_studentveterans@smu.edu /
https://contsturegister.smu.edu/wconnect/CourseStatus.awp?&course=162BCO300A-O
Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers
vulnerable.
Detailed coverage and labs in Module 18: Cryptography.
Shellshock CVE-2014-6271
Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as
Linux and OS X.
Detailed coverage and labs in Module 11: Hacking Webservers
Poodle CVE-2014-3566
POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a
service, allowing them to control your account without needing your password.
Case study in Module 18: Cryptography
Hacking Using Mobile Phones
CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing,
DDoS attack, etc.) using mobile phones
Courseware covers latest mobile hacking tools in all the modules
Coverage of latest Trojan, Virus, Backdoors
Courseware covers Information Security Controls and Information
Security Laws and Standards
Labs on Hacking Mobile Platforms and Cloud Computing
More than 40 percent new labs are added from Version 8
More than 1500 new/updated tools
CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
It also focuses on addressing the existing threats to operating environments dominated by Windows 7,
Windows 8, and other operating systems (backward compatibility)
Instructor:
This class supported by an Educational Mentor. Our educational mentors have worked or are working in
the subject they mentor. Educational Mentors reviews student work, student progress, and interacts
with students as needed. They respond to any questions or concerns you might have, as well as
encouraging and motivating you to succeed.
Southern Methodist University – CAPE / 6185 Airline Road / Dallas, TX 75275 / PH: (214) 768.1192 FAX: (214) 768.1192
Robert Hurst / cape_studentveterans@smu.edu /
https://contsturegister.smu.edu/wconnect/CourseStatus.awp?&course=162BCO300A-O