Certified Ethical Hacker CEH, one of the most important certification programs in the field of cyber security, is here with its new version v12! We have compiled the updates that come with the new version in our blog post for you. First of all, let's examine the 5 stages of ethical hacking together.
5 Stages of Ethical Hacking
Certified Ethical Hacker v12 is the most comprehensive cybersecurity program available to create knowledgeable and skilled ethical hackers. This is what makes CEH v12 unique compared to other industry certifications as it is currently the most comprehensive cybersecurity program. It provides hands-on coverage of the 5 stages of ethical hacking in today's various technologies. Knowing these 5 stages of ethical hacking is essential for any organization, and the more you know what a hacker is capable of, the more you can stay one step ahead of attacks.
1 - Reconnaissance refers to the preparatory phase in which an attacker tries to gather information about a target before launching an attack.
2 - During the scanning phase, different tools are used to gather information about websites, networks or file systems to detect security vulnerabilities.
3 - Gaining Access is where an attacker gains access to a system or application on a network or computer.
4 - Maintaining Access can also be called persistence. This allows the attacker to continue to access the target even if the machine is rebooted or the user is logged off.
5 - Covering Tracks: After gaining access to a target, leaving no artifacts is crucial to ensure that you, as an attacker, do not leave a trace. This may include deleting logs, removing any tools, scripts or applications installed on the target.
Understanding and practicing the 5 stages of ethical hacking we've explained above will get you started thinking like a hacker to ensure you or your organization don't fall victim to cyber attacks!
What's New in CEH v12
CEH v12 is a revamped program that teaches you everything you need to know about ethical hacking through training, labs, assessment, mock engagement, and even a series of global hacking competitions.
The New Learning Framework of CEH v12
CEH v12 has designed a new learning framework that uses a 4-step methodology that includes: Learn, Certify, Engage, and Compete.
This learning approach allows participants passing the CEH v12 program to have an in-depth learning experience with hands-on labs that provide comprehensive training, preparing participants for the certification exam. With this unique learning framework that CEH v12 offers to cybersecurity professionals, you can improve yourself.
4-Step Learning Framework for CEH v12
CEH v12 combines training, hands-on learning labs, certification assessments, practice in cyberspaces, cyber competitions around the new learning framework. This learning framework consists of 4 phases: Learn, Certify, Engage and Compete.
1. Learn CEH v12
The CEH v12 training program consists of 20 modules covering a wide range of technologies, tactics and procedures that provide potential ethical hackers with the essential knowledge they need to succeed.
Every tactic, objectives and tools discussed in the training are supported by step-by-step labs in a virtualized environment. With more than 220 laboratories and lab technologies, you can have extensive hands-on practice to learn and apply the knowledge you have acquired.
2. Certify CEH v12
The Certified Ethical Hacker certification is among the most trusted certifications worldwide and is a key measurement of concepts in ethical hacking and security testing.
Each of the certified participants is scrutinized by industry practitioners who ensure that their certification maps conform to current industry requirements. This exam undergoes regular psychometric assessment to ensure a fair and accurate measurement of the candidate's knowledge in the field of ethical hacking.
After completing the CEH exam, you also have the opportunity to upgrade your credentials. The practical exam duration is 6 hours, consisting of 20 practical challenges. If you pass the exam successfully, you will earn the CEH Master title, which will put you one step ahead of your peers.
3. Engage CEH v12
The 4-phase participation in CEH v12 requires participants to think critically and apply the knowledge and skills acquired in the training. Participants will display and capture a series of flags at each stage in the EC-Council's new Cyber Range, demonstrating the live application of skills and abilities in a results-neutral environment.
While performing real-world ethical hacking tasks in the 3rd stage of learning, engage, you will apply the following 5 stages to ethical hacking:
- Gaining access
- Maintaining access
- Covering your tracks
4. Compete CEH v12
New in CEH v12, the competitive phase provides monthly CEH Global Challenges, CEH Web Applications, OT, IoT, SCADA and Capture the Flag style competitions that expose you to a variety of modern technologies and platforms.
Target-based flags are designed around the ethical hacking process that evaluates the critical thinking abilities of Certified Ethical Hackers, keeping their skills up to date. Flag capture competitions are held online in the EC-Council's Cyber Range.
Competitors race against time in scenario-based interactions against full-blown network and application environments with operating systems, real networks, real tools and real vulnerabilities.
Important Updates in CEH v12
- New Learning Framework: 1. Learn 2. Certify 3. Engage 4. Compete
- Compete: New challenges every month!
- 100% compliance with the NICE 2.0 Framework
- Based on comprehensive industry-wide job task analysis
- Hands-on Learning Labs
- Practice Range
- Global C|EH community competitions
- Cheat sheet
- Coverage of the latest malware
- Lab-intensive program (every learning objective is demonstrated using labs)
- Hands-on program (50% of training time is dedicated to labs)
- Lab environments that simulate real-time environments
- Covers the latest hacking tools (based on Windows, macOS, and Linux)
- Latest OS covered and a patched testing environment
- Updated versions of tool screenshots, tool listing slides, and countermeasure slides
- MITRE ATT&CK framework
- Diamond model of intrusion analysis
- Techniques for establishing persistence
- Evading NAC and endpoint security
- Fog computing
- Edge computing
- Grid computing