Ethical Hacker (CEH) Syllabus
Ethical Hacker (CEH) Syllabus
Course Details:
• Duration: 60 Hours.
• Certificates: CEH.
• Exams: 312-50.
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
Part 1: The Business and Legal Issues of Ethical Hacking
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
Chapter 3: Penetration Testing for Business
• Penetration Testing from a Business Perspective
• Penetration Test Approach and Results
• Valuating Assets
• Penetration Testing Steps Summarized
• Selecting a Penetration Testing Consulting Organization
• Justification of Penetration Testing through Risk Analysis
• Risk Analysis Process
• Typical Threats and Attacks
• Impact Determination
• Management Responsibilities in Risk Analysis Relating to Penetration Testing
Chapter 4: Footprinting
• Gathering Information
• Whois
• Nslookup
• Open Source Searching
• Locating the Network Range
• Determining the Network Range with ARIN
• Traceroute and TTL
• Email Tracking Programs
Chapter 5: Scanning
• Identifying Active Machines
• Ping:
• Ping Sweeps
• Ping Tools
• Identifying Open Ports and Available Services
• Port Scanning:
• TCP/UDP Scanning Types
• Determining the Operating System
• Scanning Tools
• Vulnerable Ports
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
• Port Scanning Issues
• Banner Grabbing
• War Dialing
• War Driving and War Walking:
• Wireless Scanners
• Wireless Packet Sniffers
• Fingerprinting:
• Passive Fingerprinting
• Mapping the Network
Chapter 6: Enumerating
• Protection Rings
• Windows Architecture
• Windows Security Elements
• SAM Database
• Local Security Authority Subsystem Service
• NetBIOS
• Active Directory (AD)
• Enumerating Techniques for Windows
• NetBIOS Enumerating
• Net View
• NBTSTAT
• Nbtscan
• User2sid and Sid2user
• Other Tools
• SNMP Enumeration
• SNMPutil
• Other SNMP Enumeration Tools
• DNS Zone Transfer
• Active Directory Enumeration
• Countermeasures
• NetBIOS Null Sessions
• SNMP Enumeration Countermeasures
• DNS Zone Transfer Countermeasures
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
Part 3: Attack Techniques and Tools
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
• Covert Communication
• Trusted Computer System Evaluation Criteria (TCSEC)
• Covert Storage Channel
• Covert Timing Channel
• Covert Communication Tools
• Port Redirection
• NetCat
• Reverse Telnet
• Datapipe
• Fpipe
• Rinetd
• Trojan Tools and Creation Kits
• Tini
• QAZ
• Donald Dick
• NetBus
• Back Orifice 2000
• SubSeven
• Other Notables
• Anti-Trojan Software and Countermeasures
• Windows File Protection (WFP)
• Tripwire
• Fport
• TCPView
• Process Viewer
• Inzider
• Sniffers
• Sniffing Exploits
• ARP Spoofing
• MAC Flooding
• DNS Spoofing or Poisoning
• Sniffing Tools
• Snort
• Dsniff
• Ethereal
• MAC Flooding Tools
• ARP Poisoning Tools
• Other Sniffing Tools
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
Chapter 9: Denial of Service Attacks and Session Hijacking
• Denial of Service/Distributed Denial of Service (DoS/DDoS)
• DOS Attacks
• DDoS Attacks
• Prevention of DoS Attacks
• Prevention of DDoS Attacks
• Session Hijacking
• The TCP/IP Protocol Stack
• Layered Protocol Roles
• Sequence Numbers
• Session Hijacking Steps
• Tools for Session Hijacking
• Protecting Against Session Hijacking
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
• Company Facility Controls and Issues
• Company Personnel Controls
• Environmental Controls
• Heating, Ventilation, and Air Conditioning (HVAC)
• Fire Safety Controls
• Access Controls
• Fax Machines
• Physical Facility Controls
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
Chapter 14: SQL Injection Vulnerabilities
• SQL Injection Testing and Attacks
• Preparing for an Attack
• Conducting an Attack
• Lack of Strong Typing
• Union Select Statements
• Acquiring Table Column Names
• Stored Procedures
• Extended Stored Procedures
• Server System Tables
• SQL Injection Prevention and Remediation
• Automated SQL Injection Tools
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
Part 5: Advanced Topics
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots
• Firewalls
• Firewall Types
• Proxy Firewall
• Packet Level Filtering Firewall
• Stateful Inspection Firewalls
• Hardware and Software Firewalls
• Firewall Architectures
• Packet-Filtering Routers
• Dual-Homed Hosts
• Screened Host
• Screened-Subnet Firewalls
• Firewall Identification
• Banner Grabbing
• Port Scanning
• Firewall Ports
• Scanning with TCP
• Scanning with UDP
• Firewalking
• Breaching and Bypassing Firewalls
• Hping
• Traceroute
• Covert Channeling
• ACK Tunneling
• HTTP Tunneling
• Firewall Backdoors
• Firewall Informer
• Intrusion Detection and Response
• Host-Based ID Systems
• Network-Based ID systems
• IDS Detection Methods
• Statistical Anomaly Detection
• Pattern Matching Detection
• Protocol Detection
• IDS Responses
• Using an IDS in a Switched Environment
• Evading IDSs
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ
• Tools for Evading and Testing IDSs
• Intrusion Prevention Systems
• SNORT 2.x
• Cisco Security Agent
• Incident Handling
• Computer Incident Response Team
• Incident Notification
• Honeypots
• Honeypot Applications
• Discovering Honeypots
02-7101462 ﻓﺎﻛﺲ,02- 7101461 ﻫﺎﺗﻒ, ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ-1ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ