Certified Ethical Hacking

Powerful Essays
Covers all Exam Objectives for CEHv6
Includes Real-World Scenarios, Hands-On Exercises, and Leading-Edge Exam Prep Software Featuring:

• Custom Test Engine • Hundreds of Sample Questions • Electronic Flashcards • Entire Book in PDF

CEH
STUDY GUIDE
Exam 312-50 Exam EC0-350



Certified Ethical Hacker
Kimberly Graves
SERIOUS SKILLS.

CEH: Certified Ethical Hacker Study Guide
CEH (312-50) Objectives Objective
Ethics and Legality Understand ethical hacking terminology Define the job role of an ethical hacker Understand the different phases involved in ethical hacking Identify different types of hacking technologies List the 5 stages of ethical hacking What is hacktivism? List different types of hacker classes Define the skills required to become an ethical hacker What is vulnerability research? Describe the ways of conducting ethical hacking Understand the legal implications of hacking Understand 18 U.S.C. § 1030 US Federal Law Footprinting Define the term footprinting Describe information gathering methodology Describe competitive intelligence Understand DNS enumeration Understand Whois, ARIN lookup Identify different types of DNS records Understand how traceroute is used in footprinting Understand how email tracking works Understand how web spiders work Scanning Define the terms port scanning, network scanning, and vulnerability scanning Understand the CEH scanning methodology Understand Ping Sweep techniques Understand nmap command switches Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN scans List TCP communication flag types Understand war dialing techniques Understand banner grabbing and OF fingerprinting techniques Understand how proxy servers are used in launching an attack How do anonymizers work? Understand HTTP tunneling techniques Understand IP spoofing techniques

Chapter
1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3

Objective
Enumeration What is enumeration? What is meant by null sessions? What is SNMP

You May Also Find These Documents Helpful

  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    Many people believe that a hacker is not a dangerous person and is not causing harm. What do you think? (1000 words)…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans,…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.…

    • 5250 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    3 3 3 3 4 4 4 4 4 4 4 5 5 5 5 6 6 6 6 7 8 1…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Gregg, M. (2006, June 9). Certified Ethical Hacker Exam Prep: Understanding Footprinting and Scanning. Pearson IT Certification.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Susanhudson

    • 45484 Words
    • 182 Pages

    1. 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 2 2.1 2.2 2.3 2.4 3 3.1 3.2…

    • 45484 Words
    • 182 Pages
    Powerful Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    1. In recent years, the concept of “ethical” hacking has grown in importance as more companies consider…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethical Hacking

    • 2861 Words
    • 12 Pages

    The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker can help.…

    • 2861 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Sikh Rehat Maryada

    • 10192 Words
    • 41 Pages

    1 2 2 2 3 3 3 3 3 3 6 6 6 8 8 8 8 9 9 9 9 10 10 10 11 11 11 11 12 12 12…

    • 10192 Words
    • 41 Pages
    Powerful Essays
  • Better Essays

    Cyber Terrorism

    • 2174 Words
    • 9 Pages

    In this research paper, I will prove that hackers gain power and publicity with crimes they commit through cyber space. And it is easy for even amateur hackers to gain information and money from powerful organization without any detection or suspicion. Hacking is also a costly and destructive force for people in Cyber Space. Cyber Terrorism is such a destructive force that our country lost millions of dollars to hacking terrorists from other countries.…

    • 2174 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Hair Oil Marketing Plan

    • 2252 Words
    • 10 Pages

    3 3 4 4 4 4 4 5 6 6 6 6 6 6 6 7 7 8 8 8 8 8 9 9 9 9 9 9 9 10 10 10 10 10 10 10 11…

    • 2252 Words
    • 10 Pages
    Powerful Essays