has specified more than 80 objectives for the CEH-v6 certification exam, which are grouped under 26 modules. Following are some important areas in which an individual should possess good knowledge before taking the CEH-v6 312-50 Ethical Hacker exam:
- Understanding elements of security, security fundamentals, and security Testing.
 - Understanding seven-step information gathering process.
 - Performing information gathering, determining network range, identify active machines, finding open ports and applications, OS fingerprinting, and mapping the network.
 - Performing Google hacking.
 - Understanding Windows security and basic enumeration techniques.
 - Performing SNMP enumeration and Windows hacking
 - Performing email hacking.
 - Understanding Linux file structure and basic Linux commands.
 - Maintaining RootKit Access and Covering Tracks.
 - Securing Linux from attacks.
 - Understanding Trojans and how to use Trojans.
 - Using hardware and software keystroke loggers.
 - Using sniffers.
 - Understanding components of the Web infrastructure, scanning Web servers, and Web server hacking.
 - Performing SQL Injections.
 - Understanding wireless technologies, wireless security, and attacks.
 - Understanding IDS evasion techniques and tools.
 - Understanding firewalls, firewall operations, and firewall types.
 - Understanding honeypots, types of honeypots, and honeypots detection.
 - Performing buffer overflows, types of buffer overflows and countermeasures.
 - Understanding virus, virus transmission methods and virus infection types.
 - Understanding spyware, common spyware tools, and spyware countermeasures.
 - Understanding cryptographic algorithms, and performing cryptographic attacks.
 - Performing steganography.
 - Performing basic social engineering techniques.
 - Performing physical security.
 
                            
                                        
                                        
No Comments Yet
Be the first to share your thoughts on this post!