text
stringlengths
0
108
tools that may be used.
The subject matter of the CEH exam is very technical. This is not a field in which you
can get by with theoretical knowledge. You will need to have had experience with the
methods and tools that are covered within the subject matter for the CEH exam. What you
may also have noticed here is that the modules all fall within the different stages mentioned
earlier. While you may not necessarily be asked for a specific methodology, you will find
that the contents of the exam do generally follow the methodology that the EC-Council
believes to be a standard approach.
About the Exam
The CEH exam has much the same parameters as other professional certification exams.
You will take a computerized, proctored exam. You will have 4 hours to complete
125 questions. That means you will have, on average, roughly 2 minutes per question.
The questions are all multiple choice. The exam can be taken through the ECC Exam
Center or at a Pearson VUE center.
Should you wish to take your certification even further, you could go after the CEH
Practical exam. For this exam you must perform an actual penetration test and write a
report at the end of it. This demonstrates that in addition to knowing the body of material
covered by the exam, you can put that knowledge to use in a practical way. You will be
expected to know how to compromise systems and identify vulnerabilities.
In order to pass the exam, you will have to correctly answer questions, though the
actual number of questions you have to answer correctly will vary. The passing grade varies
depending on the difficulty of the questions asked. The harder the questions that are asked
out of the complete pool of questions, the fewer questions you need to get right to pass the
exam. If you get easier questions, you will need to get more of the questions right to pass.
There are some sources of information that will tell you that you need to get 70 percent of
the questions right, and that may be okay for general guidance and preparation as a rough
low-end marker. However, keep in mind that when you sit down to take the actual test at
the testing center, the passing grade will vary.
The good news is that you will know whether you passed before you leave the testing
center. You will get your score when you finish the exam and you will also get a piece of
paper indicating the details of your grade. You will get feedback associated with the differ-
ent scoring areas and how you performed in each of them.
Who Is Eligible
Not everyone is eligible to sit for the CEH exam. Before you go too far down the road, you
should check your qualifications. Just as a starting point, you have to be at least 18 years of
age. The other eligibility standards are as follows:
■ ■ Anyone who has versions 1–7 of the CEH certification. CEH certification (or exam?) is
ANSI certified now, but early versions of the exam were available before the certifica-
tion. Anyone who wants to take the ANSI-accredited certification who has the early
version of the CEH certification can take the exam.
■ ■ Minimum of two years of related work experience. Anyone who has the experience
will have to pay a non-refundable application fee of $100.
■ ■ Have taken an EC-Council training.
If you meet these qualification standards, you can apply for the certification, along with
paying the fee if it is applicable to you (if you take one of the EC-Council trainings, the fee
is included). The application will be valid for three months.
Exam Cost
In order to take the certification exam, you need to pay for a Pearson VUE exam
voucher. The cost of this is $1,199. You could also obtain an EC-Council voucher for
$950, but that requires that you have taken EC-Council training and can provide a
Certificate of Attendance.
About EC-Council
The International Council of Electronic Commerce Consultants is more commonly
known as the EC-Council. It was created after the airplane attacks that happened
against the United States on 9/11/01. The founder, Jay Bavisi, wondered what would
happen if the perpetrators of the attack decided to move from the kinetic world to the
digital world. Even beyond that particular set of attackers, the Internet has become
a host to a large number of people who are interested in causing damage or stealing
information. The economics of the Internet, meaning the low cost of entry into the
business, encourage criminals to use it as a means of stealing information, ransoming
data, or other malicious acts.
The EC-Council is considered to be one of the largest certifying bodies in the world.
They operate in 145 countries and have certified more than 200,000 people. In addition to
the CEH, the EC-Council also administers a number of other IT-related certifications. They
manage the following certifications:
■ ■ Certified Network Defender (CND)
■ ■ Certified Ethical Hacker (CEH)
■ ■ Certified Ethical Hacker Practical
■ ■ EC-Council Certified Security Analyst (ECSA)
■ ■ EC-Council Certified Security Analyst Practical
■ ■ Licensed Penetration Tester (LPT)
■ ■ Computer Hacking Forensic Investigator (CHFI)
■ ■ Certified Chief Information Security Officer (CCISO)
One advantage to holding a certification from the EC-Council is that the orga-
nization has been accredited by the American National Standards Institute (ANSI).
Additionally, and perhaps more importantly for potential certification holders, the
certifications from EC-Council are recognized worldwide and have been endorsed by
governmental agencies like the National Security Agency (NSA). The Department of
Defense Directive 8570 includes the CEH certification. This is important because hav-
ing the CEH certification means that you could be quickly qualified for a number of
positions with the United States government.
The CEH certification provides a bar. This means that there is a set of known standards.
In order to obtain the certification, you will need to have met at least the minimal standard.
These standards can be relied on consistently. This is why someone with the CEH certifica-
tion can be trusted. They have demonstrated that they have met known and accepted stan-
dards of both knowledge and professional conduct.
Using This Book
This book is structured in a way that foundational material is up front. With this approach,
you can make your way in an orderly fashion through the book, one chapter at a time.
Technical books can be dry and difficult to get through sometimes, but it’s always my goal
to try to make them easy to read and hopefully entertaining along the way. If you already
have a lot of experience, you don’t need to take the direct route from beginning to end. You
can skip around as you need to. No chapter relies on any other. They all stand alone with
respect to the content. However, if you don’t have the foundation and try to jump to a later
chapter, you may find yourself getting lost or confused by the material. All you need to do
is jump back to some of the foundational chapters.
Beyond the foundational materials, the book generally follows a fairly standard meth-
odology when it comes to performing security testing. This methodology will be further
explained in Chapter 1. As a result, you can follow along with the steps of a penetration
test/ethical hacking engagement. Understanding the outline and reason for the methodol-