Friday, 19 July 2013

CEH(EC COUNCIL) Online Training | call us +917386622889

CEH(EC COUNCIL) Online Training

                                                                                                                                          CLICK HERE FOR ENQUIRY
Background
  • networking technologies (e.g., hardware, infrastructure)
  • web technologies (e.g., web 2.0, skype)
  • systems technologies
  • communication protocols
  • malware operations
  • mobile technologies (e.g., smart phones)
  • telecommunication technologies
  • backups and archiving (e.g., local, network)
Analysis/Assessment
  • data analysis
  • systems analysis
  • risk assessments
  • technical assessment methods
Security
  • systems security controls
  • application/file server
  • firewalls
  • cryptography
  • network security
  • physical security
  • threat modeling
  • verification procedures (e.g., false positive/negative validation)
  • social engineering (human factors manipulation)
  • vulnerability scanners
  • security policy implications
  • privacy/confidentiality (with  regard to engagement)
  • biometrics
  • wireless access technology (e.g., networking, RFID, Bluetooth)
  • trusted networks
  • vulnerabilities
  • network/host based intrusion
  • network/wireless sniffers (e.g., WireShark, Airsnort)
  • access control mechanisims (e.g., smart cards)
  • cryptography techniques (e.g., IPsec, SSL, PGP)
  • programming languages (e.g. C++,   Java, C#, C)
  • scripting languages (e.g., PHP, Java script)
  • boundary protection appliances
  • network topologies subnetting
  • port scanning (e.g., NMAP)
  • domain name system (DNS)
  • routers/modems/switches
  • vulnerability scanner (e.g., Nessus, Retina)
  • vulnerability management and protection systems (e.g., Foundstone, Ecora)
  • opera ting environments (e.g., Linux, Windows, Mac)
  • antivirus systems and programs
  • log analysis tools
  • security models
  • exploitation tools
  • database structures
  • cryptography
  • public key infrastructure (PKI)
  • Security Architecture (SA)
  • Service Oriented Architecture
  • information security incident
  • N-tier application design
  • TCP/IP networking (e.g., network routing)
  • security testing methodology
Regulation/Policy
  • security policies
  • compliance regulations (e.g., PCI)
Ethics
  • professional code of conduct
  • appropriateness of hacking

No comments:

Post a Comment