Skip to content

anggrdwjy/cehv12-training

Repository files navigation

Overview

Module 1. Methodology Certified Ethical Hacker

  • A. Explain Information Security Concepts

    • Elements of Information Security
    • Motives, Goals, And Objectives of Information Security Attacks
    • Classification of Attacks
    • Information Warfare
  • B. Explain Hacking Methodologies and Frameworks

    • Hacking Methodologies and Frameworks
    • CEH Hacking Methodology (CHM)
    • Cyber Kill Chain Methodology
    • Tactics, Techniques, and Procedures (TTPs)
    • Adversary Behavioral Identification
    • Indicators of Compromise (IoCs)
    • Categories of Indicators of Compromise
    • MITRE ATT&CK Framework
    • Diamond Model of Intrusion Analysis
    • Additional Event Meta-Features
    • Extended Diamond Model
  • C. Explain Hacking Concepts and Diiferent Hacker Classes

    • Hacking Concepts
    • What is Hacking?
    • Who is a Hacking?
    • Hacker Classes
  • D. Explain Ethical Hacking Concepts and Scope

    • Ethical Hacking Concepts
    • What is Ethical Hacking?
    • Why Ethical Hacking is Necessary
    • Reasons Why Organizations Recruit Ethical Hackers
    • Scope and Limitiations of Ethical Hacking
    • Skills of an Ethical Hacker
  • E. Summarize the Techniques used in Information Security Controls

    • Information Security Controls
    • Information Assurance (IA)
    • Continual/Adaptive Security Strategy
    • Defense-in-Depth
    • What is Risk?
    • Risk Matrix
    • Risk Management
    • Cyber Threat Intelligence
    • Types of Threat Intelligence
    • Threat Intelligence Lifecycle
    • Threat Modelling
    • Incident Managment
    • Incident Handling and Response
    • Role of AI and ML in Cybersecurity
    • How Do AI and ML Prevent Cyber Attacks?
  • F. Explain the Importance of Applicable Security Laws and Standards

    • Information Security Laws and Standards

Module 2. Footprinting and Reconnaissance

Module 3. Scanning Networks

Module 4. Enumeration

Module 5. Vulnerability Analysis

Module 6. System Hacking

Module 7. Malware Threats

About

Certified Ethical Hacking Methodology and Lab Training v12

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors