EC-Council CEH (CEH v11) Exam Syllabus - EDUSUM

文章推薦指數: 80 %
投票人數:10人

EC-Council CEH Exam Summary: · EC-Council 312-50 Exam Syllabus Topics: · Information Security and Ethical Hacking Overview - 6% · Reconnaissance Techniques - 21%. Skiptomaincontent Skiptosearch LoginlinksLoginRegister toggle Primarymenu DellEMCCertificationCheckPointCertificationISC2CertificationIBMCertification...MicrosoftCertificationAVIXACertificationCryptoConsortiumCertificationGIACCertificationEC-CouncilCertificationCompTIACertificationISACACertificationLPICertificationPythonInstituteCertificationVeritasCertificationCIWCertification Secondarymenu Home»EC-CouncilCertification»EC-CouncilCEH(CEHv11)ExamSyllabus»EC-CouncilCEH(CEHv11)ExamSyllabus EC-CouncilCEH(CEHv11)ExamSyllabus UsethisquickstartguidetocollectalltheinformationaboutEC-CouncilCEH(312-50)Certificationexam.Thisstudyguideprovidesalistofobjectivesandresourcesthatwillhelpyouprepareforitemsonthe312-50EC-CouncilCertifiedEthicalHackerexam.TheSampleQuestionswillhelpyouidentifythetypeanddifficultylevelofthequestionsandthePracticeExamswillmakeyoufamiliarwiththeformatandenvironmentofanexam.YoushouldreferthisguidecarefullybeforeattemptingyouractualEC-CouncilCEHv11certificationexam. TheEC-CouncilCEHcertificationismainlytargetedtothosecandidateswhowanttobuildtheircareerinCyberSecuritydomain.TheEC-CouncilCertifiedEthicalHacker(CEH)examverifiesthatthecandidatepossessesthefundamentalknowledgeandprovenskillsintheareaofEC-CouncilCEHv11. EC-CouncilCEHExamSummary: ExamName EC-CouncilCertifiedEthicalHacker(CEH) ExamCode 312-50 ExamPrice $950(USD) Duration 240mins NumberofQuestions 125 PassingScore 70% Books/Training Courseware ScheduleExam PearsonVUE SampleQuestions EC-CouncilCEHSampleQuestions PracticeExam EC-Council312-50CertificationPracticeExam EC-Council312-50ExamSyllabusTopics: Topic Details InformationSecurityandEthicalHackingOverview-6% IntroductiontoEthicalHacking -InformationSecurityOverview -CyberKillChainConcepts -HackingConcepts -EthicalHackingConcepts -InformationSecurityControls -InformationSecurityLawsandStandards ReconnaissanceTechniques-21% FootprintingandReconnaissance -FootprintingConcepts -FootprintingMethodology -FootprintingthroughSearchEngines -FootprintingthroughWebServices -FootprintingthroughSocialNetworkingSites -WebsiteFootprinting -EmailFootprinting -WhoisFootprinting -DNSFootprinting -NetworkFootprinting -FootprintingthroughSocialEngineering -FootprintingTools -FootprintingCountermeasures ScanningNetworks -NetworkScanningConcepts -ScanningTools -HostDiscovery -PortandServiceDiscovery -OSDiscovery(BannerGrabbing/OSFingerprinting) -ScanningBeyondIDSandFirewall -DrawNetworkDiagrams Enumeration -EnumerationConcepts -NetBIOSEnumeration -SNMPEnumeration -LDAPEnumeration -NTPandNFSEnumeration -SMTPandDNSEnumeration -OtherEnumerationTechniques(IPsec,VoIP,RPC,Unix/Linux,Telnet,FTP,TFTP,SMB,IPv6,andBGPenumeration) -EnumerationCountermeasures SystemHackingPhasesandAttackTechniques-17% VulnerabilityAnalysis -VulnerabilityAssessmentConcepts -VulnerabilityClassificationandAssessmentTypes -VulnerabilityAssessmentSolutionsandTools -VulnerabilityAssessmentReports SystemHacking -SystemHackingConcepts -GainingAccess -CrackingPasswords -VulnerabilityExploitation -EscalatingPrivileges -MaintainingAccess -ExecutingApplications -HidingFiles -ClearingLogs MalwareThreats -MalwareConcepts -APTConcepts -TrojanConcepts -VirusandWormConcepts -File-lessMalwareConcepts -MalwareAnalysis -MalwareCountermeasures -Anti-MalwareSoftware NetworkandPerimeterHacking-14% Sniffing -SniffingConcepts -SniffingTechnique:MACAttacks -SniffingTechnique:DHCPAttacks -SniffingTechnique:ARPPoisoning -SniffingTechnique:SpoofingAttacks -SniffingTechnique:DNSPoisoning -SniffingTools -SniffingCountermeasures -SniffingDetectionTechniques SocialEngineering -SocialEngineeringConcepts -SocialEngineeringTechniques -InsiderThreats -ImpersonationonSocial -NetworkingSites -IdentityTheft -SocialEngineeringCountermeasures Denial-of-Service -DoS/DDoSConcepts -DoS/DDoSAttackTechniques -Botnets -DDoS -CaseStudy -DoS/DDoSAttackTools -DoS/DDoSCountermeasures -DoS/DDoSProtectionTools SessionHijacking  -SessionHijackingConcepts -ApplicationLevelSessionHijacking -NetworkLevelSessionHijacking -SessionHijackingTools -SessionHijackingCountermeasures EvadingIDS,Firewalls,andHoneypots -IDS,IPS,Firewall,andHoneypotConcepts -IDS,IPS,Firewall,andHoneypotSolutions -EvadingIDS -EvadingFirewalls -IDS/FirewallEvadingTools -DetectingHoneypots -IDS/FirewallEvasionCountermeasures WebApplicationHacking-16% HackingWebServers -WebServerConcepts -WebServerAttacks -WebServerAttackMethodology -WebServerAttackTools -WebServerCountermeasures -PatchManagement -WebServerSecurityTools HackingWebApplications -WebAppConcepts -WebAppThreats -WebAppHackingMethodology -FootprintWebInfrastructure -AnalyzeWebApplications -BypassClient-SideControls -AttackAuthenticationMechanism -AttackAuthorizationSchemes -AttackAccessControls -AttackSessionManagementMechanism -PerformInjectionAttacks -AttackApplicationLogicFlaws -AttackSharedEnvironments -AttackDatabaseConnectivity -AttackWebAppClient -AttackWebServices -WebAPI,WebhooksandWebShell -WebAppSecurity SQLInjection -SQLInjectionConcepts -TypesofSQLInjection - SQLInjectionMethodology -SQLInjectionTools -EvasionTechniques -SQLInjectionCountermeasures WirelessNetworkHacking-6% HackingWirelessNetworks -WirelessConcepts -WirelessEncryption -WirelessThreats -WirelessHackingMethodology -WirelessHackingTools -BluetoothHacking -WirelessCountermeasures -WirelessSecurityTools MobilePlatform,IoT,andOTHacking-8% HackingMobilePlatforms -MobilePlatformAttackVectors -HackingAndroidOS -HackingiOS -MobileDeviceManagement -MobileSecurityGuidelinesandTools IoTandOTHacking -IoTConcepts -IoTAttacks -IoTHackingMethodology -IoTHackingTools -IoTCountermeasures -OTConcepts -OTAttacks -OTHackingMethodology -OTHackingTools -OTCountermeasures CloudComputing-6% CloudComputing -CloudComputingConcepts -ContainerTechnology -ServerlessComputing -CloudComputingThreats -CloudHacking -CloudSecurity Cryptography-6% Cryptography -CryptographyConcepts -EncryptionAlgorithms -CryptographyTools -PublicKeyInfrastructure(PKI) -EmailEncryption -DiskEncryption -Cryptanalysis -Countermeasures ToensuresuccessinEC-CouncilCEHv11certificationexam,werecommendauthorizedtrainingcourse,practicetestandhands-onexperiencetoprepareforEC-CouncilCertifiedEthicalHacker(312-50)exam. SelectratingPoorOkayGoodGreatAwesome Rating:4.8/5(92votes) EC-CouncilCyberSecurityCertification|312-50CEH|312-50OnlineTest|312-50|EC-CouncilCEHCertification|CEHPracticeTest|CEHStudyGuide|312-50Syllabus|CEHBooks|CEHCertificationSyllabus|EC-CouncilCEHTraining|EC-Council312-50Books|CEHv11|CEHv11CertificationCost|EC-CouncilCEHv11Books|EC-CouncilCEHv11Certification LiveTestimonials Blogs Areagile,DevOpsandsimilarcertificationsworthit? TopBenefitsofCloudSecurityTrainingandCertification ShapeyourCareerPathwithHelpDeskInstitute(HDI)Certification BecomeaBigDataCertificatiedProfessionalToday HowimportantisDisasterRecoveryandBusinessContinuityCertificationsforYourCareer more     MoneyBackGuarantee Testimonial FAQs PrivacyPolicy TermsandConditions AboutUs JoinUs ContactUs Alltrademarks,servicemarks,tradenames,tradedress,productnamesandlogosappearingonthesitearethepropertyoftheirrespectiveowners. Thesitewww.edusum.comisinnowayaffiliatedwithanyoftheseCertificationProviders.Copyright©2022www.edusum.com.Allrightsreserved. pss_page|byDr.Radut



請為這篇文章評分?