CEH v10 Practice Test
500 q&a
What you’ll learn
-
Port scanning tools (e.g., Nmap, Hping)
-
Vulnerability detection
-
Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
-
SQL injection methodology and evasion techniques
-
Web application security tools (e.g., Acunetix WVS)
-
SQL injection detection tools (e.g., IBM Security AppScan)
-
Communication protocols
-
Port scanning tools (e.g., Nmap, Hping)
-
Vulnerability detection
-
Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
-
SQL injection methodology and evasion techniques
-
Web application security tools (e.g., Acunetix WVS)
-
SQL injection detection tools (e.g., IBM Security AppScan)
-
Communication protocols
-
Scanning (e.g., Port scanning, banner grabbing, vulnerability scanning, network discovery, proxy chaining, IP spoofing)
-
Cryptography
-
Cryptography toolkit (e.g., OpenSSL)
-
Web server attack methodology
-
Operating environments (e.g., Linux, Windows, Mac)
-
Encryption algorithms
-
System hacking (e.g., password cracking, privilege escalation, executing applications, hiding files, covering tracks)
-
Vulnerability scanning
-
Exploitation tools
-
Application/file server
-
Database structures
-
Wireless and Bluetooth hacking methodology
-
Wireless terminologies
-
Wireless encryption
-
Network/wireless sniffers (e.g., Wireshark, Airsnort)
-
Malware (e.g., Trojan, virus, backdoor, worms)
-
Botnet
-
Malware analysis
-
Network sniffing
-
Backups and archiving (e.g., local, network)
-
Data analysis
-
Log analysis tools
-
Cryptanalysis tool (e.g., CrypTool)
Requirements
-
Have two or more years of documented information security experience
-
Remit a non-refundable eligibility application fee of $100.00
-
Submit completed CEH Exam Eligibility Form including verification from employer
-
Upon approval EC-Council will email you a voucher number to register for the CEH exam
Who this course is for:
- Security officers
- Auditors
- Security professionals
- Site administrators
- Anyone who is concerned about the integrity of the network infrastructure.