SHIFT

--- Sjoerd Hooft's InFormation Technology ---

User Tools

Site Tools


q:q312-50
Differences

This shows you the differences between two versions of the page.

Link to this comparison view

q:q312-50 [2016/08/13 20:43] (current)
sjoerd created
Line 1: Line 1:
 += CEH 312-50: Certified Ethical Hacker =
  
 +The 312-50 Certified Ethical hacker exam has the following format:
 +
 +* CEH: Certified Ethical Hacker exam code: 312-50
 +* CEH Exam Type: Computer based, Multiple choice format
 +* CEH Time Limit: 4 hours (240 minutes)
 +* CEH Exam Length: 125 questions
 +* CEH Exam Cost: $500 USD
 +* Passing Score: 70%
 +
 += Modules =
 +
 +== Module 1 : Introduction to Ethical Hacking ==
 +* Hacking: the Evolution ​
 +* So, What Is an Ethical Hacker? ​
 +
 +== Module 2: System Fundamentals ==
 +* Exploring Network Topologies ​
 +* Working with the Open Systems Interconnection Model 
 +* Dissecting the TCP/IP Suite 
 +* IP Subnetting ​
 +* Hexadecimal vs. Binary ​
 +* Exploring TCP/IP Ports 
 +* Understanding Network Devices ​
 +* Working with MAC Addresses ​
 +* Intrusion Prevention and Intrusion Detection Systems ​
 +* Network Security ​
 +* Knowing Operating Systems ​
 +* Backups and Archiving ​
 +
 +== Module 3: Cryptography ==
 +* Cryptography:​ Early Applications and Examples ​
 +* Cryptography in Action ​
 +* Understanding Hashing ​
 +* Issues with Cryptography ​
 +* Applications of Cryptography ​
 +
 +== Module 4: Footprinting ==
 +* Understanding the Steps of Ethical Hacking ​
 +* What Is Footprinting? ​
 +* Terminology in Footprinting ​
 +* Threats Introduced by Footprinting ​
 +* The Footprinting Process ​
 +
 +== Module 5: Scanning ==
 +* What Is Scanning? ​
 +* Checking for Live Systems ​
 +* Checking the Status of Ports 
 +* The Family Tree of Scans 
 +* OS Fingerprinting ​
 +* Countermeasures ​
 +* Vulnerability Scanning ​
 +* Mapping the Network ​
 +* Using Proxies ​
 +
 +==Module 6: Enumeration ==
 +* A Quick Review ​
 +* What Is Enumeration? ​
 +* About Windows Enumeration ​
 +* Linux Basic 
 +* Enumeration with SNMP 
 +* Unix and Linux Enumeration ​
 +* LDAP and Directory Service Enumeration ​
 +* Enumeration Using NTP 
 +* SMTP Enumeration
 +
 +== Module 7: System Hacking ==
 +* Up to This Point 
 +* System Hacking ​
 +
 +== Module 8: Malware ==
 +* Malware ​
 +* Overt and Covert Channels ​
 +
 +== Module 9: Sniffers ==
 +* Understanding Sniffers ​
 +* Using a Sniffer ​
 +* Switched Network Sniffing ​
 +
 +== Module 10: Social Engineering ==
 +* What Is Social Engineering? ​
 +* Social Networking to Gather Information? ​
 +* Commonly Employed Threats ​
 +* Identity Theft 
 +
 +== Module 11: Denial of Service ==
 +* Understanding DoS 
 +* Understanding DDoS DoS Tools
 +* DDoS Tools 
 +* DoS Defensive Strategies ​
 +* DoS Pen-Testing Considerations ​
 +
 +== Module 12: Session Hijacking == 
 +* Understanding Session Hijacking ​
 +* Exploring Defensive Strategies ​
 +
 +== Module 13: Web Servers and Applications ==
 +* Exploring the Client-Server Relationship ​
 +
 +== Module 14: SQL Injection ==
 +* Introducing SQL Injection ​
 +
 +== Module 15: Hacking Wi-Fi and Bluetooth ==
 +* What Is a Wireless Network? ​
 +
 +== Module 16: Mobile Device Security ==
 +* Mobile OS Models and Architectures ​
 +* Goals of Mobile Security ​
 +* Device Security Models ​
 +* Countermeasures ​
 +
 +== Module 17: Evasion ==
 +* Honeypots, IDSs, and Firewalls ​
 +
 +== Module 18: Cloud Technologies and Security ==
 +* What Is the Cloud? ​
 +
 +==Module 19: Physical Security ==
 +* Introducing Physical Security ​
 +
 +{{tag>​qexam qq}}
q/q312-50.txt ยท Last modified: 2016/08/13 20:43 by sjoerd