CEH Sample
CEH Sample
CEH Sample
CERTIFIED
ETHICAL
HACKING
v12 (312-50)
Presented By : Mohnish Sakharam Chitte
Table Of Content
01 Module 1
Introduction To Ethical Hacking.
02 Module 2
Footprinting And Reconnaissance.
03 Module 3
Scanning Networks.
Module 4
04 Enumeration.
05 Module 5
Vulnerability Analysis.
What Is Ethical Hacking?
Ethical hacking, also known as penetration testing or white-hat hacking, It is a
practice of identifying vulnerabilities and weaknesses in computer systems,
networks, and applications.
Hacking Terminology
Hack Value
Vulnerability
Zero Day Attack
Daisy Chaining
Exploit
Payload
Botnet
Types Of Attack
Operating System
Application Level
Misconfiguration
Shrink-Wrap Code
Classification Of Attacks
Passive Attack
Active Attack
Close In Attack
Insider Attack
Distribution Attack
Devices Of Networking
Repeater Switch
Regenerate Signal Before Frames, Multi Casting, Data
Become Weak , Physical Link Layer
Layer
Hub Router
Packets, Connect Two or
Passive,Active,
More Devices, Network
Intelligent
Layer
Bridge Brouter
Divides LAN into multiple Combo of Bridge And
segments. Router