Includes Real-World Scenarios, Hands-On Exercises, and Leading-Edge Exam Prep Software Featuring:
• Custom Test Engine • Hundreds of Sample Questions • Electronic Flashcards • Entire Book in PDF
CEH
STUDY GUIDE
Exam 312-50 Exam EC0-350
™
Certified Ethical Hacker
Kimberly Graves
SERIOUS SKILLS.
CEH: Certified Ethical Hacker Study Guide
CEH (312-50) Objectives Objective
Ethics and Legality Understand ethical hacking terminology Define the job role of an ethical hacker Understand the different phases involved in ethical hacking Identify different types of hacking technologies List the 5 stages of ethical hacking What is hacktivism? List different types of hacker classes Define the skills required to become an ethical hacker What is vulnerability research? Describe the ways of conducting ethical hacking Understand the legal implications of hacking Understand 18 U.S.C. § 1030 US Federal Law Footprinting Define the term footprinting Describe information gathering methodology Describe competitive intelligence Understand DNS enumeration Understand Whois, ARIN lookup Identify different types of DNS records Understand how traceroute is used in footprinting Understand how email tracking works Understand how web spiders work Scanning Define the terms port scanning, network scanning, and vulnerability scanning Understand the CEH scanning methodology Understand Ping Sweep techniques Understand nmap command switches Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN scans List TCP communication flag types Understand war dialing techniques Understand banner grabbing and OF fingerprinting techniques Understand how proxy servers are used in launching an attack How do anonymizers work? Understand HTTP tunneling techniques Understand IP spoofing techniques
Chapter
1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3
Objective
Enumeration What is enumeration? What is meant by null sessions? What is SNMP