LiveLab 312-50: Certified Ethical Hacker (CEH v9)-2018

$204.49 incl. vat

duration: 25 hours |

access duration: 180 days

Via this online Livelab Ethical Hacker, focused on EC-Council exam 312-50: Certified Ethical Hacker (CEH v9), you will get detailed practice experience with different techniques and methods to practice your skills on ethical hacking.

By doing the exercises and cases in a real environment you will improve your abilities and knowledge on multiple exam topics.

Among exercises you will find configuring of footprints, reconnaissance, scanning networks, device & dervice enumeration, keyloggers, system hacking concept and port, sniffers and far more.


You have working experience with using different methods and techniques to hack in an ethical way.


You have knowledge of the course Certified Ethical Hacker v9. If not followed check out our online course.

Target audience

Security Specialist

LiveLab 312-50: Certified Ethical Hacker (CEH v9)-2018

25 hours

Planting a Backdoor

  • Introduction
  • Exercise 1 - Working with Backdoor
  • Summary

Performing Malware Attacks

  • Introduction
  • Exercise 1 - Creating a Simple Virus
  • Exercise 2 - Determining Open Ports
  • Exercise 3 - Tracking Port Usage
  • Exercise 4 - Performing Port Redirection
  • Summary

Hacking Web Applications

  • Introduction
  • Exercise 1 - Working with Burp Suite and Firefox
  • Exercise 2 - Performing Cross-site Scripting (XSS) Attacks
  • Exercise 3 - Cracking Passwords for Web Applications and Websites
  • Summary

Vulnerability Scanner MBSA

  • Introduction
  • Exercise 1 - Introduction to Microsoft Baseline Security Analyser
  • Exercise 2 - Implementing Recommendations
  • Exercise 3 - Saving Microsoft Security Baseline Analyzer Reports
  • Exercise 4 - Reviewing Configuration Changes
  • Summary

Packet Sniffing

  • Introduction
  • Exercise 1 - Packet Sniffing for Passwords
  • Exercise 2 - Packet Sniffing for Image Capture and Extraction
  • Summary

Social Engineering Reconnaissance

  • Introduction
  • Exercise 1 - Social Engineering Reconnaissance
  • Summary

Working with IPSec

  • Introduction
  • Exercise 1 - Managing IPSec Negotiation Policies
  • Exercise 2 - Working with Security Association Rules in Windows Firewall with Advanced Security
  • Summary

Implementing Network-level Session Hijacking

  • Introduction
  • Exercise 1 - Performing Man-in-the-Middle (MITM) Attack
  • Summary

OS Fingerprinting

  • Introduction
  • Exercise 1 - OS Fingerprinting
  • Summary

Mapping Networks

  • Introduction
  • Exercise 1 - Working with Network Diagrams
  • Exercise 2 - Install and Configure ManageEngine OpManager
  • Summary

Configuring IDS and Honeypots

  • Introduction
  • Exercise 1 - Snort Installation
  • Exercise 2 - Test Snort
  • Exercise 3 - Configure and Re-Test Snort
  • Summary

Resetting Windows Passwords

  • Introduction
  • Exercise 1 - Working with Trinity Rescue Kit (TRK)
  • Summary

Analyzing Captured Traffic

  • Introduction
  • Exercise 1 - GeoIP Mapping
  • Exercise 2 - Packet Jumping
  • Exercise 3 - Statistics Menu
  • Exercise 4 - Firewall ACL Rule Creation
  • Summary

Using Enumeration Tools

  • Introduction
  • Exercise 1 - Performing Zone Transfers
  • Exercise 2 - Working with Remote Targets
  • Exercise 3 - Working with Finger Command
  • Summary

Cracking Kerberos

  • Introduction
  • Exercise 1 - Reading Kerberos Credentials
  • Summary

Performing Offline Attacks

  • Introduction
  • Exercise 1 - Extracting Hashes from a System
  • Exercise 2 - Cracking Extracted Hashes
  • Exercise 3 - Cracking Passwords
  • Summary

Performing a Check for Live Systems

  • Introduction
  • Exercise 1 - Identifying Live Systems
  • Summary

Implementing Scanning Techniques

  • Introduction
  • Exercise 1 - Scanning Networks using Nmap
  • Exercise 2 - Scanning Networks using hping3
  • Summary

Banner Grabbing

  • Introduction
  • Exercise 1 - Performing Banner Grabbing
  • Summary

Conduct Social Engineering Attack

  • Introduction
  • Exercise 1 - Use the Social Engineering Toolkit (SET) in Kali Linux
  • Summary

Encryption and Hashing

  • Introduction
  • Exercise 1 - Cryptographic Basics
  • Exercise 2 - Comparing Hashing Algorithms
  • Exercise 3 - Comparing Hash Values
  • Summary

Performing a Check for Open Ports

  • Introduction
  • Exercise 1 - Identifying Open Ports
  • Summary

Trojan Protection

  • Introduction
  • Exercise 1 - Use Malware and Trojan Analysis Tools
  • Exercise 2 - Monitor Ports and Processes
  • Exercise 3 - Monitor and Protect Files and Folders
  • Summary

Implementing Application-level Session Hijacking

  • Introduction
  • Exercise 1 - Viewing Cookie Information from Unencrypted Sites
  • Summary

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 


Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten


Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

frequently asked quesions

What is included?

Duration 25 hours
Certificate of participation Yes
Online access 180 days
Monitor Progress Yes
Examination possibleYes
Mobile ready Yes

Also included in world's #1 eLearning portal

Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Platform Access to our platform.
Service World's best service


Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!