CEH Module 1: Introduction to Ethical Hacking

<- Back to CEH Certification Main Page

ceh-intro-to-ethical-hacking.jpg
  • Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
  • Information Security Overview
    • Case Study
      • eBay Data Breach
      • Google Play Hack
      • The Home Depot Data Breach
    • Year of the Mega Breach
    • Data Breach Statistics
    • Malware Trends in 2014
    • Essential Terminology
    • Elements of Information Security
    • The Security, Functionality, and Usability Triangle
  • Information Security Threats and Attack Vectors
    • Motives, Goals, and Objectives of Information Security Attacks
    • Top Information Security Attack Vectors
    • Information Security Threat Categories
    • Types of Attacks on a System
      • Operating System Attacks
        • Examples of OS Vulnerabilities
      • Misconfiguration Attacks
      • Application-Level Attacks
        • Examples of Application-Level Attacks
      • Shrink Wrap Code Attacks
    • Information Warfare
  • Hacking Concepts, Types, and Phases
    • What is Hacking
    • Who is a Hacker?
    • Hacker Classes
    • Hacking Phases
      • Reconnaissance
      • Scanning
      • Gaining Access
      • Maintaining Access
      • Clearing Tracks
  • Ethical Hacking Concepts and Scope
    • What is Ethical Hacking?
    • Why Ethical Hacking is Necessary
    • Scope and Limitations of Ethical Hacking
    • Skills of an Ethical Hacker
  • Information Security Controls
    • Information Assurance (IA)
    • Information Security Management Program
    • Threat Modeling
    • Enterprise Information Security Architecture (EISA)
    • Network Security Zoning
    • Defense in Depth
    • Information Security Policies
      • Types of Security Policies
      • Examples of Security Policies
      • Privacy Policies at Workplace
      • Steps to Create and Implement Security Policies
      • HR/Legal Implications of Security Policy Enforcement
    • Physical Security
      • Physical Security Controls
    • Incident Management
      • Incident Management Process
      • Responsibilities of an Incident Response Team
    • What is Vulnerability Assessment?
      • Types ofVulnerability Assessment
      • Network Vulnerability Assessment Methodology
      • Vulnerability Research
      • Vulnerability Research Websites
    • Penetration Testing
      • Why Penetration Testing
      • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
      • Blue Teaming/Red Teaming
      • Types of Penetration Testing
      • Phases of Penetration Testing
      • Security Testing Methodology
      • Penetration Testing Methodology
  • Information Security Laws and Standards
    • Payment Card Industry Data Security Standard (PCI-DSS)
    • ISO/IEC 27001:2013
    • Health Insurance Portability and Accountability Act (HIPAA)
    • Sarbanes Oxley Act (SOX)
    • The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
    • Cyber Law in Different Countries

<- Back to CEH Certification Main Page

RELATED COURSES