Certified Ethical Hacking (CEH v10) (Exam-312-50)

Passing CEH v10 has never been so easy, just follow these steps …

CEH v10 Exam 312-50, still follows the same MCQ (Multiple Choice Questionnaire) format. There are two new chapters added to this edition of exam viz., IoT Hacking and Vulnerability assessment.

Understanding the Exam Objective:

The exam objective is quite straightforward to ensure that the CEH Professional understands Information Security concepts and the related testing tools to further take up the challenges of Penetration tester or Ethical hacker.

How much does the exam cost?

This is a very crucial factor, as it costs a whooping $1199 (Exam voucher) + $100 (experience verification carried out by EC-Council). If you got the funds sorted then go for it, else abort 😀

Building the Ethical hacker’s Philosophy – “Think Like a Hacker”

One needs to understand how an attacker progresses to hack into a system and the best concept to start off this will be to understand how the Cyber Kill Chain works.

 

Cyber Kill Chain (CKC) overview video

Learn the tools for the Cyber Kill Chain phases

Once the Kill chain concept in well understood, one needs to understand the hacking tools. (Please remember, it’s illegal to run tools outside your test labs/environment and YOU are liable for wrong doings and could face criminal charges depending on the country’s jurisdiction).

The best testing suite undoubtedly is Kali Linux. It has suite of all the tools to learn hands on about each phase of the Cyber Kill Chain.

 

Collection of blogs to Pass CEH v10

I will cover a brief about all the below chapters so that you can have a firm base knowledge.

List of all the Chapters in scope for the exam:

  1. Foot Printing & Reconnaissance
  2. Scanning Network
  3. Enumeration
  4. Vulnerability Analysis
  5. System Hacking
  6. Malware Threats
  7. Sniffing
  8. Social Engineering
  9. Denial Of Service
  10. Session Hijacking
  11. Evading Firewalls, IDS & Honeypot technology
  12. Hacking Web Servers
  13. Hacking Web Applications
  14. SQL Injection
  15. Hacking Wireless Networks
  16. Hacking Mobile Platforms
  17. IoT Hacking
  18. Cloud Computing
  19. Cryptography

 

Revising the chapters

Once you understand the various infosec attacks and tools, it would make sense to revisit the CEH chapters and start preparing for the MCQs.

Good Luck 🙂