Another useful resource is the EC-Council's C|EH Candidate Handbook, available from their Downloads page. The direct link is https://cert.eccouncil.org/images/doc/CEH-Handbook-v2.0.pdf. It's a 55 page document with all the details you need to attempt the exam, including agreements you need to sign, accommodation requests (if needed), and continuing education requirements.
CEH - useful links
Hi all, somewhat delayed due to a lot going on at the moment.
I came across an excellent resource which some of you may already be familiar with: The Penetration Testing Execution Standard and supporting Technical Guidelines. Lots of great stuff there which supplements the list compiled above. There is also a Freemind version of an older version of the standard.
Here's a link to the newest Penetration testing distro, Cyborg Hawk
And thanks for all that you have done for us, Michala. We greatly appreciate it!
Thanks again for keeping the ITProTV forum filled with valuable information, all of you that keep this stuff going help to provide a great resource!
Edutainer Manager, ACI Learning [ITPRO]
*if the post has answered the question, mark as solved.
**All "answers" and responses are offered "as is" and my opinion. There is no implied service, support, or guarantee by ITProTV.
@Scott-Pitcock202 Sorry I'm not finished yet, I'm behind as I started a new job so my focus is there at the moment. Will come back to this when I get chance though.
@debra-j.--o Thanks for that Debra, added to the pen testing distro section
@Ronnie-Wong You're welcome. This is such a great resource with all the different courses for a very reasonable price that I think it's only fair to give something back as it were
This post is deleted!
Here is a list of good sites for your CEH tools and practice. I received this from a SANS poster or email - I forget.
This guy has developed more mind maps at the following link.
Hacking practice lab
Forensics practice lab
@D.-Rogers Thaks for those - some great mindmaps there. The SANS poster is pretty good for showing potential attack vectors to people too