CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.
CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
Domains:
- Background
- Analysis / Assessment
- Security
- Tools / Systems / Programs
- Procedures / Methodology
- Regulation / Policy
- Ethics
Hoặc luyên tập với các chủ đề bên dưới
Network and Communication Technologies
Câu hỏi (En):33
|Câu hỏi (Vi):1
- Networking technologies (e.g., hardware, infrastructure)
- Web technologies (e.g., web 2.0, skype)
- Systems technologies
- Communication protocols
- Telecommunication technologies
- Mobile technologies (e.g., smartphones)
- Wireless terminologies
- Cloud computing
- Cloud deployment models
Information Security Threats and Attack Vectors
Câu hỏi (En):64
|Câu hỏi (Vi):0
- Malware (e.g., Trojan, virus, backdoor, worms)
- Malware operations
- Information security threats and attack vectors
- Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
- Botnet
- Cloud computing threats and attacks
- Mobile platform attack vectors
- Cryptography attacks
Information Security Technologies
Câu hỏi (En):73
|Câu hỏi (Vi):7
- Information security elements
- Information security management (e.g. IA, Defense-in-Depth, incident management)
- Security trends
- Hacking and ethical hacking
- Vulnerability assessment and penetration testing
- Cryptography
- Encryption algorithms
- Wireless encryption
- Bring Your Own Device (BYOD)
- Backups and archiving (e.g., local, network)
- IDS, firewalls, and honeypots
Information Security Assessment and Analysis
Câu hỏi (En):22
|Câu hỏi (Vi):0
- Data analysis
- Systems analysis
- Risk assessments
- Vulnerability assessment and penetration testing
- Technical assessment methods
- Network sniffing
- Malware analysis
Information Security Assessment Process
Câu hỏi (En):26
|Câu hỏi (Vi):0
- Footprinting
- Scanning (e.g., Port scanning, banner grabbing, vulnerability scanning, network discovery, proxy chaining, IP spoofing)
- Enumeration
- System hacking (e.g., password cracking, privilege escalation, executing applications, hiding files, covering tracks)
Information Security Controls
Câu hỏi (En):35
|Câu hỏi (Vi):0
- Systems security controls
- Application/file server
- IDS
- Firewalls
- Cryptography
- Disk Encryption
- Network security
- Physical security
- Threat modeling
- Biometrics
- Wireless access technology (e.g., networking, RFID, Bluetooth)
- Trusted networks
- Privacy/confidentiality (with regard to engagement)
Information Security Attack Detection
Câu hỏi (En):42
|Câu hỏi (Vi):1
- Security policy implications
- Vulnerability detection
- IP Spoofing detection
- Verification procedures (e.g., false positive/negative validation)
- Social engineering (human factors manipulation)
- Vulnerability scanning
- Malware detection
- Sniffer detection
- DoS and DDoS detection
- Detect and block rogue AP
- Evading IDS (e.g., evasion, fragmentation)
- Evading Firewall (e.g., firewalking, tunneling)
- Honeypot detection • Steganalysis
Information Security Attack Prevention
Câu hỏi (En):43
|Câu hỏi (Vi):1
- Defend against webserver attacks
- Patch management
- Encoding schemes for web application
- Defend against web application attacks
- Defend against SQL injection attacks
- Defend against wireless and Bluetooth attacks
- Mobile platforms security
- Mobile Device Management (MDM)
- BYOD Security
- Cloud computing security
Information Security Systems
Câu hỏi (En):33
|Câu hỏi (Vi):2
- Network/host based intrusion
- Boundary protection appliances
- Access control mechanisms (e.g., smart cards)
- Cryptography techniques (e.g., IPSec, SSL, PGP)
- Domain name system (DNS)
- Network topologies
- Subnetting
- Routers / modems / switches
- Security models
- Database structures
Information Security Programs
Câu hỏi (En):28
|Câu hỏi (Vi):0
- Operating environments (e.g., Linux, Windows, Mac)
- Anti-malware systems and programs (e.g., anti-keylogger, anti-spyware, anti-rootkit, anti-trojan, anti-virus)
- Wireless IPS deployment
- Programming languages (e.g. C++, Java, C#, C)
- Scripting languages (e.g., PHP, Javascript)
Information Security Tools
Câu hỏi (En):57
|Câu hỏi (Vi):2
- Network/wireless sniffers (e.g., Wireshark, Airsnort)
- Port scanning tools (e.g., Nmap, Hping)
- Vulnerability scanner (e.g., Nessus, Qualys, Retina)
- Vulnerability management and protection systems (e.g., Founds tone, Ecora)
- Log analysis tools
- Exploitation tools
- Footprinting tools (e.g., Maltego, FOCA, Recon-ng)
- Network discovery tools (e.g., Network Topology Mapper)
- Enumeration tools (e.g., SuperScan, Hyena, NetScanTools Pro)
- Steganography detection tools
- Malware detection tools
- DoS/DDoS protection tools
- Patch management tool (e.g., MBSA)
- Webserver security tools
- Web application security tools (e.g., Acunetix WVS)
- Web application firewall (e.g., dotDefender)
- SQL injection detection tools (e.g., IBM Security AppScan)
- Wireless and Bluetooth security tools
- Android, iOS, Windows Phone OS, and BlackBerry device security tools
- MDM Solutions
- Mobile Protection Tools
- Intrusion Detection Tools (e.g., Snort)
- Hardware and software firewalls (e.g., Comodo Firewall)
- Honeypot tools (e.g., KFSenser)
- IDS/Firewall evasion tools (e.g., Traffic IQ Professional)
- Packet fragment generators
- Honeypot Detection Tools
- Cloud security tools (e.g., Core CloudInspect)
- Cryptography tools (e.g., Advanced Encryption Package)
- Cryptography toolkit (e.g., OpenSSL)
- Disk encryption tools
- Cryptanalysis tool (e.g., CrypTool)
Information Security Procedures
Câu hỏi (En):32
|Câu hỏi (Vi):1
- Cryptography
- Public key infrastructure (PKI)
- Digital signature and Pretty Good Privacy (PGP)
- Security Architecture (SA)
- Service oriented architecture
- Information security incident
- N-tier application design
- TCP/IP networking (e.g., network routing)
- Security testing methodology
Information Security Assessment Methodologies
Câu hỏi (En):20
|Câu hỏi (Vi):1
- Web server attack methodology
- Web application hacking methodology
- SQL injection methodology and evasion techniques
- SQL injection evasion techniques
- Wireless and Bluetooth hacking methodology
- Mobile platform (Android, iOS, Windows Phone OS, and BlackBerry) hacking methodology
- Mobile Rooting and Jailbreaking
Information Security Policies/ Laws/Acts
Câu hỏi (En):13
|Câu hỏi (Vi):0
- Security policies
- Compliance regulations (e.g., PCI-DSS, SOX)
Ethics of Information Security
Câu hỏi (En):21
|Câu hỏi (Vi):0
- Professional code of conduct
- Appropriateness of hacking