Please enable JavaScript.
Coggle requires JavaScript to display documents.
Certified Ethical Hacker (Ethics and Legality (Identify different types of…
Certified Ethical Hacker
-
Footprinting
-
-
-
-
Understand Whois, ARIN lookup
-
-
-
-
Scanning
Define the terms port scanning, network scanning, and vulnerability scanning
-
-
-
Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN scans
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Wireless Hacking
Overview of WEP, WPA authentication systems, and cracking techniques
Overview of wireless sniffers and SSID, MAC spoofing
-
-
-
-
-
-
Evading IDS, Honeypots, and Firewalls
-
-
-
Cryptography
-
-
Overview of MD5, SHA, RC4, RC5, Blowfish algorithms
-