0% found this document useful (0 votes)
41 views7 pages

CEH Sample

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 7

Cybervault Securities Solutions Pvt. Ltd.

CERTIFIED
ETHICAL
HACKING
v12 (312-50)
Presented By : Mohnish Sakharam Chitte
Table Of Content
01 Module 1
 Introduction To Ethical Hacking.

02 Module 2
 Footprinting And Reconnaissance.

03 Module 3
 Scanning Networks.

Module 4
04  Enumeration.

05 Module 5
 Vulnerability Analysis.
What Is Ethical Hacking?
Ethical hacking, also known as penetration testing or white-hat hacking, It is a
practice of identifying vulnerabilities and weaknesses in computer systems,
networks, and applications.

Who are Ethical Hacker?


Ethical hackers use their skills and knowledge to help organizations enhance their
security and protect against potential cyber threats.
Types of Hackers
 White Hat Hacker
 Grey Hat Hacker
 Black Hat Hacker
 Script Kiddie
 State Sponsored
 Hacktivist
 Suicide Hacker

Hacking Terminology
 Hack Value
 Vulnerability
 Zero Day Attack
 Daisy Chaining
 Exploit
 Payload
 Botnet
Types Of Attack
Operating System
Application Level
Misconfiguration
Shrink-Wrap Code

Classification Of Attacks
Passive Attack
Active Attack
Close In Attack
Insider Attack
Distribution Attack
Devices Of Networking
Repeater Switch
Regenerate Signal Before Frames, Multi Casting, Data
Become Weak , Physical Link Layer
Layer

Hub Router
Packets, Connect Two or
Passive,Active,
More Devices, Network
Intelligent
Layer

Bridge Brouter
Divides LAN into multiple Combo of Bridge And
segments. Router

You might also like