Description
Exam Name: Certified Ethical Hacker v13
Exam Code: 312-50
Related Certification(s): Eccouncil Certified Ethical Hacker CEH Certification
Certification Provider: Eccouncil
Actual Exam Duration: 240 Minutes
Number of 312-50 practice questions in our database: 614
Expected 312-50 Exam Topics, as suggested by Eccouncil :
- Module 1: Introduction to Ethical Hacking: This module covers ethical hacking fundamentals such as elements of information security, Chain Methodology, Hacker Classes, Risk Management, DSS, HIPPA, and SOX.
- Module 2: Foot Printing and Reconnaissance: In this module, candidates are tested for performing footprinting on the target network, and performing website, email, whois, and DNS footprinting. Other topics include Advanced Google Hacking Techniques, Deep and Dark Web Footprinting, Website Mirroring, Traceout Analysis, and other tools.
- Module 3: Scanning Networks: The topics covered in this module include network scanning, host discovery, port scanning, OS Discovery, and packet Fragmentation.
- Module 4: Enumeration: The current domain covers NetBIOS Enumeration, SNMP, NFS, SMTP Enumeration and also covers DNS Cache Snooping and VoIP Enumeration.
- Module 5: Vulnerability Analysis: It covers vulnerability research, assessment, management and lifecycle, classification, and assessment tools.
- Module 6: System Hacking: This section covers password cracking, wire sniffing, buffer overflow, keylogger, spyware, anti-keyloggers, rootKits, post-exploitation, and covering tracks.
- Module 7: Malware Threats: This section covers Malware components, APT, Trojan, Virus, Ransomware, Worms, Virus detection, and Anti-trojan software.
- Module 8: Sniffing: This module covers sniffing, MAC flooding, MAC Spoofing, DNS Poisoning tools, and Sniffing tools.
- Module 9: Social Engineering: This section of the exam covers social engineering types, Phishing, insider threats, and identity theft.
- Module 10: Denial-of-Service: This section covers DoS Attacks, DDos Attacks, Botnets, DoS/DDoS Attack Tools, DoS Protection Tools.
- Module 11: Session Hijacking: This section covers types of session hacking, Spoofing, client-side attacks, session replay attacks, CRIME attacks, and Hijacking tools.
- Module 12: Evading IDS, Firewalls, and Honeypots: This section covers intrusion detection systems, firewall types, intrusion prevention, intrusion detection tools, Evading NAC Endpoint security, IDS/Firewall Evading Tools, and Honeypot detection tools.
- Module 13: Hacking Web Servers: This section covers web server operations, web server attacks, DNS Server Hijacking, website defacement, Web Cache Positioning Attack, web server security tools, and patch management tools.
- Module 14: Hacking Web Applications: This section covers web applications architecture, web application threats, application security risks, web shell, web API Hacking Methodology.
- Module 15: SQL Injection: In this section, topics covered SQJ injection, SQJ Injection methodology, tools signature evasion, and injection detection tools.
- Module 16: Hacking Wireless Networks: This section covers wireless terminology, wireless networks, encryption, wireless threats, Wi-Fi encryption cracking, Bluetooth hacking, Wi-Fi security auditing, and Bluetooth security tools.
- Module 17: Hacking Mobile Platforms: This section covers Mobile Platform Attack Vectors, App sandboxing, SMS Phishing attacks, hacking Android devices, and mobile security tools.
- Module 18: IoT and OT Hacking: In this section, topics covered IoT Architecture, IoT Communication, top ten IoT threats, ICS and SCADA, OT Vulnerabilities, and OT Security Tools.
- Module 19: Cloud Computing: This section covers types of cloud computing, cloud deployment, Fog and Edge computing, cloud service providers, serverless computing, and cloud attacks.
- Module 20: Cryptography: This section covers cryptography, Encryption Algorithms, Cryptography tools, disk encryption, and Key Stretching.
Reviews
There are no reviews yet.