Ethical Hacking (CEH Preparation)

Overview

The CyberVista Ethical Hacking (CEH) practice test will teach someone the knowledge to take EC-Council’s Certified Ethical Hacker (CEH) certification test which is a requirement for pentesters or anyone involved with testing or pentesting information systems. The purpose of a CEH is a professional who knows how to look for weaknesses and vulnerabilities in an information system like a malicious attacker but has permission of the company to find these weaknesses.

The practice test is intended for students of Intermediate level and takes an average of 4 hours to complete. The practice test assesses your knowledge of packet sniffing, social engineering, planting a backdoor, mapping networks among other skills, and is targeted toward the exploitation analyst or vulnerability assessment analyst NIST work role.

Upon successful completion of the Ethical Hacking (CEH) practice test the student will have the knowledge of mapping networks, packet sniffing, social engineering and planting a backdoor.

Skill/Ability Breakdown

Students will learn about packet sniffing, which is using a variety of tools in order to collect information or traffic about an information system to use to look for weaknesses or vulnerabilities.

Students will also learn that Social engineering is the human skill to collect information about information systems, networks, and company information in order to be able to gain access to said information systems such as phishing, whaling, escalating privileges, etc.

Students will learn planting a backdoor is a key component of ethical hacking which allows the attacker to be able to access the information system without the system owner, custodian or guards to realize once access has been gained.

Students will learn mapping networks is another key component of an ethical hacker and goes hand in hand with packet sniffing to know the layout of the system and where the weaknesses and vulnerabilities exist to exploit.

Packet sniffing is a key part of exploitation or vulnerability assessment analysts, and is built-upon/builds to collect pertinent information about the system. Social engineering is a key part of exploitation or vulnerability assessment analyst, and is built-upon/builds to collect information in order to exploit the system. Planting a backdoor is a key part of exploitation or vulnerability analyst, and is built-upon/builds to exploit application vulnerabilities. Mapping networks is a key part of exploitation or vulnerability assessment analyst, and is built-upon/builds to collect information to exploit of an information system.

What's next? Take Cybrary's [ethical hacking course](https://www.cybrary.it/course/ethical-hacking/)!

Learning Partner
CyberVista