100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Certified Ethical Hacker Study Guide $14.98   Add to cart

Exam (elaborations)

Certified Ethical Hacker Study Guide

 0 view  0 purchase
  • Course
  • Institution

As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Cer...

[Show more]

Preview 4 out of 439  pages

  • July 28, 2022
  • 439
  • 2021/2022
  • Exam (elaborations)
  • Unknown
avatar-seller
Covers all Exam Objectives for CEHv6

Includes Real-World Scenarios, Hands-On Exercises, and
Leading-Edge Exam Prep Software Featuring:

• Custom Test Engine
• Hundreds of Sample Questions
• Electronic Flashcards
• Entire Book in PDF




CEH





Certified
Ethical Hacker
STUDY GUIDE
Exam 312-50 Kimberly Graves
Exam EC0-350



SERIOUS SKILLS.

,
, CEH: Certified Ethical Hacker Study Guide
CEH (312-50) Objectives
Objective Chapter
Ethics and Legality
Understand ethical hacking terminology 1
Define the job role of an ethical hacker 1
Understand the different phases involved in ethical hacking 1
Identify different types of hacking technologies 1
List the 5 stages of ethical hacking 1
What is hacktivism? 1
List different types of hacker classes 1
Define the skills required to become an ethical hacker 1
What is vulnerability research? 1
Describe the ways of conducting ethical hacking 1
Understand the legal implications of hacking 1
Understand 18 U.S.C. § 1030 US Federal Law 1
Footprinting
Define the term footprinting 2
Describe information gathering methodology 2
Describe competitive intelligence 2
Understand DNS enumeration 2
Understand Whois, ARIN lookup 2
Identify different types of DNS records 2
Understand how traceroute is used in footprinting 2
Understand how email tracking works 2
Understand how web spiders work 2
Scanning
Define the terms port scanning, network scanning, and vulnerability scanning 3
Understand the CEH scanning methodology 3
Understand Ping Sweep techniques 3
Understand nmap command switches 3
Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN scans 3
List TCP communication flag types 3
Understand war dialing techniques 3
Understand banner grabbing and OF fingerprinting techniques 3
Understand how proxy servers are used in launching an attack 3
How do anonymizers work? 3
Understand HTTP tunneling techniques 3
Understand IP spoofing techniques 3




525203bperfcard.indd 1 3/17/10 6:16:01 PM

, Objective Chapter
Enumeration
What is enumeration? 3
What is meant by null sessions? 3
What is SNMP enumeration? 3
What are the steps involved in performing enumeration? 3
System Hacking
Understanding password cracking techniques 4
Understanding different types of passwords 4
Identifying various password cracking tools 4
Understand escalating privileges 4
Understanding keyloggers and other spyware technologies 4
Understand how to hide files 4
Understanding rootkits 4
Understand steganography technologies 4
Understand how to cover your tracks and erase evidence 4
Trojans and Backdoors
What is a Trojan? 5
What is meant by overt and covert channels? 5
List the different types of Trojans 5
What are the indications of a Trojan attack? 5
Understand how “Netcat” Trojan works 5
What is meant by “wrapping”? 5
How do reverse connecting Trojans work? 5
What are the countermeasure techniques in preventing Trojans? 5
Understand Trojan evading techniques 5
Sniffers
Understand the protocol susceptible to sniffing 6
Understand active and passive sniffing 6
Understand ARP poisoning 6
Understand Ethereal capture and display filters 6
Understand MAC flooding 6
Understand DNS spoofing techniques 6
Describe sniffing countermeasures 6
Denial of Service
Understand the types of DoS Attacks 7
Understand how DDoS attack works 7
Understand how BOTs/BOTNETs work 7
What is a “Smurf” attack? 7
What is “SYN” flooding? 7
Describe the DoS/DDoS countermeasures 7




Exam specifications and content are subject to change at any time without prior
notice and at the EC-Council’s sole discretion. Please visit EC-Council’s website
(www.eccouncil.org) for the most current information on their exam content.




525203bperfcard.indd 2 3/17/10 6:16:02 PM

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller supportmutiglobeapp. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.98. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.98
  • (0)
  Add to cart