CEH Syllabus Outline | learn to be a hacker




Ethical hackers

Employed by companies to perform penetration tests.

Legal attempt to break into a company’s network to find its weakest link

Tester only reports findings, does not solve problems.

Security test.

More than an attempt to break in; also includes analyzing company’s security policy and procedures.

Tester offers solutions to secure or protect the network.


Hackers :- Access computer system or network without authorization

Breaks the law; can go to prison

Crackers :- Break into systems to steal or destroy data

U.S. Department of Justice calls both hackers

Ethical hacker :- Performs most of the same activities but with owner’s permission. 


Script kiddies or packet monkeys

Young inexperienced hackers.

Copy codes and techniques from knowledgeable hackers.

Experienced penetration testers write programs or scripts using these languages

Practical Extraction and Report Language (Perl), C, C++, Python, JavaScript, Visual Basic, SQL, and many others

Script

Set of instructions that runs in sequence.

This class alone won’t make you a hacker, or an expert.

It might make you a script kiddie.

It usually takes years of study and experience to earn respect in the hacker community.

It’s a hobby, a lifestyle, and an attitude.

A drive to figure out how things work.

White box model

Tester is told everything about the network topology and technology.

Network diagram.

Tester is authorized to interview IT personnel and company employees.

Makes tester’s job a little easier.







Black box model

Company staff does not know about the test
Tester is not given details about the network
Burden is on the tester to find these details
Tests if security personnel are able to detect an attack.


Certification programs available in almost every area of network security Basics: 

CompTIA Security+ (CNIT 120)
Network+ (CNIT 106 or 201)




CEH Syllabus Outline

 


The Certified Ethical Hacker (CEH) syllabus typically covers the following topics:


  1. Introduction to Ethical Hacking

  2. Footprinting and Reconnaissance

  3. Scanning Networks

  4. Enumeration

  5. Vulnerability Analysis

  6. System Hacking

  7. Malware Threats

  8. Sniffing

  9. Social Engineering

  10. Denial-of-Service

  11. Session Hijacking

  12. Hacking Webservers, Web Application and SQL Injection

  13. Hacking Wireless Networks

  14. Hacking Mobile Platforms

  15. IoT Hacking

  16. Cloud Computing

  17. Cryptography


Please note that the syllabus may be subject to change and vary depending on the provider thank you for visiting our site ❤️








Post a Comment

Previous Post Next Post

Contact Form