• EC Council
  • 2016
  • 3219 صفحه
  • 430 مگابایت
  • انگلیسی
Module 01Introduction to Ethical Hacking
Module 02Footprinting and Reconnaissance
Module 03Scanning Networks
Module 04Enumeration
Module 05Vulnerability Analysis
Module 06System Hacking
Module 07Malware Threats
Module 08Sniffing
Module 09Social Engineering
Module 10Denial-of-Service
Module 11Session Hijacking
Module 12Evading IDS, Firewalls, and Honeypots
Module 13Hacking Web Servers
Module 14Hacking Web Applications
Module 15SQL Injection
Module 16Hacking Wireless Networks
Module 17Hacking Mobile Platforms
Module 18IoT Hacking
Module 19Cloud Computing
Module 20Cryptography

 

The value of C|EH lies in its practical application. In 18 domains, students are exposed to business risks and the potential damages that can occur due to negligence. Students will be able to make informed decisions regarding the level of risk a company can face if it chooses to address a security concern.