CEH(EC COUNCIL) Online Training
Background
- networking technologies (e.g., hardware, infrastructure)
- web technologies (e.g., web 2.0, skype)
- systems technologies
- communication protocols
- malware operations
- mobile technologies (e.g., smart phones)
- telecommunication technologies
- backups and archiving (e.g., local, network)
Analysis/Assessment
- data analysis
- systems analysis
- risk assessments
- technical assessment methods
Security
- systems security controls
- application/file server
- firewalls
- cryptography
- network security
- physical security
- threat modeling
- verification procedures (e.g., false positive/negative validation)
- social engineering (human factors manipulation)
- vulnerability scanners
- security policy implications
- privacy/confidentiality (with regard to engagement)
- biometrics
- wireless access technology (e.g., networking, RFID, Bluetooth)
- trusted networks
- vulnerabilities
- network/host based intrusion
- network/wireless sniffers (e.g., WireShark, Airsnort)
- access control mechanisims (e.g., smart cards)
- cryptography techniques (e.g., IPsec, SSL, PGP)
- programming languages (e.g. C++, Java, C#, C)
- scripting languages (e.g., PHP, Java script)
- boundary protection appliances
- network topologies subnetting
- port scanning (e.g., NMAP)
- domain name system (DNS)
- routers/modems/switches
- vulnerability scanner (e.g., Nessus, Retina)
- vulnerability management and protection systems (e.g., Foundstone, Ecora)
- opera ting environments (e.g., Linux, Windows, Mac)
- antivirus systems and programs
- log analysis tools
- security models
- exploitation tools
- database structures
- cryptography
- public key infrastructure (PKI)
- Security Architecture (SA)
- Service Oriented Architecture
- information security incident
- N-tier application design
- TCP/IP networking (e.g., network routing)
- security testing methodology
Regulation/Policy
- security policies
- compliance regulations (e.g., PCI)
Ethics
- professional code of conduct
- appropriateness of hacking
No comments:
Post a Comment