Course Outline
- Introduction (10 Questions)
- Security Fundamentals
- Security Testing
- Cyber Kill Chain
- Hacker and Cracker Descriptions
- Ethical Hackers
- Test Plans—Keeping It Legal
- Ethics and Legality
- Summary
- Labs
- Exam Preparation Tasks (20 Questions)
- Introduction (10 Questions)
- The Hacking Process
- The Ethical Hacker’s Process
- Information Security Systems and the Stack
- Summary
- Exam Preparation Tasks (20 Questions)
- Introduction (15 Questions)
- Footprinting
- Scanning
- Summary
- Labs
- Exam Preparation Tasks (20 Questions)
- Introduction (10 Questions)
- Enumeration
- System Hacking
- Summary
- Labs
- Exam Preparation Tasks (20 Questions)
- Introduction (18 Questions)
- Social Engineering
- Malware Threats
- Vulnerability Analysis
- Summary
- Exam Preparation Tasks (20 Questions)
- Introduction (10 Questions)
- Sniffers
- Session Hijacking
- Denial of Service and Distributed Denial of Service
- Summary
- Labs
- Exam Preparation Tasks (20 Questions)
- Introduction (10 Questions)
- Web Server Hacking
- Web Application Hacking
- Database Hacking
- Summary
- Labs
- Exam Preparation Tasks (20 Questions)
- Introduction (10 Questions)
- Wireless and Mobile Device Technologies
- Wi-Fi
- Summary
- Exam Preparation Tasks (10 Questions)
- Introduction (10 Questions)
- Intrusion Detection and Prevention Systems
- Firewalls
- Honeypots
- Summary
- Exam Preparation Tasks (20 Questions)
- Introduction (10 Questions)
- Cryptography History and Concepts
- Encryption Algorithms
- Public Key Infrastructure
- Email and Disk Encryption
- Cryptoanalysis and Attacks
- Security Protocols and Countermeasures
- Summary
- Labs
- Exam Preparation Tasks (20 Questions)
- Introduction (10 Questions)
- Cloud Computing
- IoT
- Botnets
- Summary
- Exam Preparation Tasks (12 Questions)
- CEH Certified Ethical Hacker Practice Test (124 Questions)
- Scheduling and Information (1 Question)
- Appendix A
- Glossary