14.11.2012 Views

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Page 10<br />

http://www.eccouncil.org<br />

Course Outline v6<br />

Module 1: Introduction to Ethical Hacking<br />

� Problem Defi nition -Why Security?<br />

� Essential Terminologies<br />

� Elements of Security<br />

� The Security, Functionality and Ease of Use Triangle<br />

� Case Study<br />

� What does a Malicious Hacker do?<br />

o Phase1-Reconnaissaance<br />

o Phase2-Scanning<br />

• Reconnaissance Types<br />

o Phase3-Gaining Access<br />

o Phase4-Maintaining Access<br />

o Phase5-Covering Tracks<br />

� Types of Hacker Attacks<br />

o Operating System attacks<br />

o Application-level attacks<br />

o Shrink Wrap code attacks<br />

o Misconfi guration attacks<br />

� Hacktivism<br />

� Hacker Classes<br />

� Security News: Suicide Hacker<br />

� Ethical Hacker Classes<br />

EC-Council

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!