SlideShare a Scribd company logo
1 of 18
Agenda
Who is a Certified Ethical Hacker?
Why become a Ethical Hacker?
How to become a Certified Ethical Hacker?
CEH v10: What’s new?
CEH v10: How to prepare?
CEH v10: Job Roles & Salary
CEH v10: Exam Overview
Who is Ethical
Hacker?
An ethical hacker, also known as a White Hat Hacker, is a computer
and networking expert who systematically attempts to penetrate a
computer system or network on behalf of its owners for the purpose
of finding security vulnerabilities that a malicious hacker could
potentially exploit.
Roles &
Responsibilities
Working with developers to advise on
security needs and requirements
Updating security policies &
procedures
Providing training as part of a company’s
security awareness and training program.
Providing recommendations on how to
mitigate vulnerabilities
Why Become a
Ethical Hacker?
“To beat a hacker, you
need to think like a
hacker”.
New job opportunities
with high salaries &
generous benefits
You get to challenge
hackers with malicious
intent
Make computer systems,
network and web-
applications “HACKER-
PROOF”
How to Get
Started?
Bachelor’s
Degree
Work
Experience
Get
Certified
How to Get
Started?
Bachelor’s
Degree
Work
Experience
Relevant work experience in
computer technology is also
usually required:
• System Analyst
• Network Administrator
• Network Security
Professional
Degree in subject are such as
Computer Science,
Cybersecurity, Information
Security
How to Get
Started?
Certifications
Certified Ethical Hacking
Certification(CEH v10)
Live Interactive Sessions
Taught by Industry Professionals
Aligned to CEH v10
Industry Relevant Use Cases
Life Time Access
How to Get
Started?
Certifications
Certified Ethical Hacking
Certification(CEH v10)
Inform the public that credentialed individuals meet or exceed the
minimum standard
Reinforce ethical hacking as a unique and self-regulating profession
Establish and govern minimum standards for credentialing professional
information security specialists in ethical hacking measures
What’s new in
CEH v10?
New model on IOT
Devices
Updated Vulnerability
Analysis
Focusses about attacks
on AI, Cloud & ML
Updated Malware
Analysis
Mobile Security
Tool
Certified Ethical
Hacker Exam:
Basics
Total
questions:
125
CEH Practical:
Number of Practical
Challenges: 20
Duration: 6 hours
Passing Score: 70%
Score details:
70% or more to
pass
Exam Format :
Computer Based,
Multiple Choice
Exam Timing: 4
hours(240
minutes)
CEH Exam:
Eligibility
Requirements
1 Attend official CEH Training
2 Documented Security Experience
CEH Exam:
Skills Measured
Sniffing
Networks
Orchestrate
Attacks
Cryptography
Network
Concepts
Programming
CEH Exam:
Skills Measured
Technical Skills
Operating System Virtuoso
Social Engineering
Understanding common
cyber attacks
DDoS & SQL-Injection
Wireless Networks
Cloud Computing
System Hacking
Session Hijacking
Softs Skills
Problem Solving Abilities
Communication Skills
Inductive Reasoning
Analytical Thinking
Logical Skills
Psychological Insights
CEH Exam: How
to Prepare?
01
Review the skills
required for exam
02
Solve complex tasks &
see if you encounter
any challenges
03
Practice until you no
longer experience
them
Hands-on experience with the technology is required to successfully pass
Explore preparation materials, opt for online course & take practice tests
Job Roles for
Certified Ethical
Hacker
Network
Engineer
Penetration
Tester
Infosec
Manager
Forensics Analyst
IT Security Auditor
Security Consultant
Security
Specialist
PENETRATION
TESTING
Security
Analyst
Cybersecurity
Engineer
How much will
a CEH make?
Entry-Level
$89,000
Junior(5-10)
$100,000 - $
120,000
Senior(+10)
$120,000+
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

More Related Content

More from Edureka!

More from Edureka! (20)

How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
 
ITIL® Tutorial for Beginners | ITIL® Foundation Training | Edureka
ITIL® Tutorial for Beginners | ITIL® Foundation Training | EdurekaITIL® Tutorial for Beginners | ITIL® Foundation Training | Edureka
ITIL® Tutorial for Beginners | ITIL® Foundation Training | Edureka
 
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | Edureka
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | EdurekaDifference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | Edureka
Difference between ITIL v3 and ITIL 4 | ITIL® Foundation Training | Edureka
 
Jenkins vs Bamboo | Differences Between Jenkins and Bamboo | Edureka
Jenkins vs Bamboo | Differences Between Jenkins and Bamboo | EdurekaJenkins vs Bamboo | Differences Between Jenkins and Bamboo | Edureka
Jenkins vs Bamboo | Differences Between Jenkins and Bamboo | Edureka
 
What Is Digital Marketing? | Digital Marketing Tutorial | Edureka
What Is Digital Marketing? | Digital Marketing Tutorial | EdurekaWhat Is Digital Marketing? | Digital Marketing Tutorial | Edureka
What Is Digital Marketing? | Digital Marketing Tutorial | Edureka
 
What is JUnit? | Edureka
What is JUnit? | EdurekaWhat is JUnit? | Edureka
What is JUnit? | Edureka
 
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | EdurekaMachine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
 
Web Development Projects | Web Dev Project Ideas For Beginners | Edureka
Web Development Projects | Web Dev Project Ideas For Beginners | EdurekaWeb Development Projects | Web Dev Project Ideas For Beginners | Edureka
Web Development Projects | Web Dev Project Ideas For Beginners | Edureka
 
What's new in python 3.8? | Python 3.8 New Features | Edureka
What's new in python 3.8? | Python 3.8 New Features | EdurekaWhat's new in python 3.8? | Python 3.8 New Features | Edureka
What's new in python 3.8? | Python 3.8 New Features | Edureka
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

CEH v10 (Certified Ethical hacking) | Ethical Hacking Training | Edureka

  • 1.
  • 2. Agenda Who is a Certified Ethical Hacker? Why become a Ethical Hacker? How to become a Certified Ethical Hacker? CEH v10: What’s new? CEH v10: How to prepare? CEH v10: Job Roles & Salary CEH v10: Exam Overview
  • 3. Who is Ethical Hacker? An ethical hacker, also known as a White Hat Hacker, is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
  • 4. Roles & Responsibilities Working with developers to advise on security needs and requirements Updating security policies & procedures Providing training as part of a company’s security awareness and training program. Providing recommendations on how to mitigate vulnerabilities
  • 5. Why Become a Ethical Hacker? “To beat a hacker, you need to think like a hacker”. New job opportunities with high salaries & generous benefits You get to challenge hackers with malicious intent Make computer systems, network and web- applications “HACKER- PROOF”
  • 7. How to Get Started? Bachelor’s Degree Work Experience Relevant work experience in computer technology is also usually required: • System Analyst • Network Administrator • Network Security Professional Degree in subject are such as Computer Science, Cybersecurity, Information Security
  • 8. How to Get Started? Certifications Certified Ethical Hacking Certification(CEH v10) Live Interactive Sessions Taught by Industry Professionals Aligned to CEH v10 Industry Relevant Use Cases Life Time Access
  • 9. How to Get Started? Certifications Certified Ethical Hacking Certification(CEH v10) Inform the public that credentialed individuals meet or exceed the minimum standard Reinforce ethical hacking as a unique and self-regulating profession Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures
  • 10. What’s new in CEH v10? New model on IOT Devices Updated Vulnerability Analysis Focusses about attacks on AI, Cloud & ML Updated Malware Analysis Mobile Security Tool
  • 11. Certified Ethical Hacker Exam: Basics Total questions: 125 CEH Practical: Number of Practical Challenges: 20 Duration: 6 hours Passing Score: 70% Score details: 70% or more to pass Exam Format : Computer Based, Multiple Choice Exam Timing: 4 hours(240 minutes)
  • 12. CEH Exam: Eligibility Requirements 1 Attend official CEH Training 2 Documented Security Experience
  • 14. CEH Exam: Skills Measured Technical Skills Operating System Virtuoso Social Engineering Understanding common cyber attacks DDoS & SQL-Injection Wireless Networks Cloud Computing System Hacking Session Hijacking Softs Skills Problem Solving Abilities Communication Skills Inductive Reasoning Analytical Thinking Logical Skills Psychological Insights
  • 15. CEH Exam: How to Prepare? 01 Review the skills required for exam 02 Solve complex tasks & see if you encounter any challenges 03 Practice until you no longer experience them Hands-on experience with the technology is required to successfully pass Explore preparation materials, opt for online course & take practice tests
  • 16. Job Roles for Certified Ethical Hacker Network Engineer Penetration Tester Infosec Manager Forensics Analyst IT Security Auditor Security Consultant Security Specialist PENETRATION TESTING Security Analyst Cybersecurity Engineer
  • 17. How much will a CEH make? Entry-Level $89,000 Junior(5-10) $100,000 - $ 120,000 Senior(+10) $120,000+
  • 18. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training