Ethical Hacking (CEH Preparation)

Master the core techniques and technologies of penetration testing and ethical hacking and assess the security posture of systems in a lawful manner. The Ethical Hacking (CEH Preparation) Practice Test will help you learn the critical topics covered on the CEH exam.

1 hour 30 minutes
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »


The CyberVista Ethical Hacking (CEH) practice test will teach someone the knowledge to take EC-Council’s Certified Ethical Hacker (CEH) certification test which is a requirement for pentesters or anyone involved with testing or pentesting information systems. The purpose of a CEH is a professional who knows how to look for weaknesses and vulnerabilities in an information system like a malicious attacker but has permission of the company to find these weaknesses.

The practice test is intended for students of Intermediate level and takes an average of 4 hours to complete. The practice test assesses your knowledge of packet sniffing, social engineering, planting a backdoor, mapping networks among other skills, and is targeted toward the exploitation analyst or vulnerability assessment analyst NIST work role.

Upon successful completion of the Ethical Hacking (CEH) practice test the student will have the knowledge of mapping networks, packet sniffing, social engineering and planting a backdoor.

Skill/Ability Breakdown

Students will learn about packet sniffing, which is using a variety of tools in order to collect information or traffic about an information system to use to look for weaknesses or vulnerabilities.

Students will also learn that Social engineering is the human skill to collect information about information systems, networks, and company information in order to be able to gain access to said information systems such as phishing, whaling, escalating privileges, etc.

Students will learn planting a backdoor is a key component of ethical hacking which allows the attacker to be able to access the information system without the system owner, custodian or guards to realize once access has been gained.

Students will learn mapping networks is another key component of an ethical hacker and goes hand in hand with packet sniffing to know the layout of the system and where the weaknesses and vulnerabilities exist to exploit.

Packet sniffing is a key part of exploitation or vulnerability assessment analysts, and is built-upon/builds to collect pertinent information about the system. Social engineering is a key part of exploitation or vulnerability assessment analyst, and is built-upon/builds to collect information in order to exploit the system. Planting a backdoor is a key part of exploitation or vulnerability analyst, and is built-upon/builds to exploit application vulnerabilities. Mapping networks is a key part of exploitation or vulnerability assessment analyst, and is built-upon/builds to collect information to exploit of an information system.

What's next? Take Cybrary's ethical hacking course!


Connect the pieces

Completing a Practice Test is one thing, mastering the skill is another.

Master the skill and take this practice test in an expertly designed Course.

Learning Partner
Certification Body
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.