Certified Ethical Hacker (CEH)

This class was created by Brainscape user Christoph Todd. Visit their profile to learn more about the creator.

Decks in this class (66)

Common Terms
Hack value,
Vulnerability,
Exploit
76  cards
Zero Day Attack
What is a zero day attack,
1st step,
2nd step
6  cards
Miscellaneous Computer Processes (stuff I find and look up along the way)
Speculative execution
1  cards
Daisy Chaining
What is daisy chaining
1  cards
1st Quiz
Five major elements that should b...,
If a hacker finds something worth...,
If the system security is increas...
6  cards
The Motivations of a Hacker - (Overview ?)
What is a security threat,
What is a security attack,
Why bother understanding the moti...
7  cards
Cloud Computing Threats in depth
What does data loss refer to in r...,
What does attack on sensitive inf...,
What does attack on sensitive inf...
5  cards
Advanced Persistent Threats in depth
What is an advanced persistent th...,
What are the steps that generally...
2  cards
Viruses and Worms in depth
What is a virus,
What is a worm
2  cards
Ransomware in depth
What is ransomware
1  cards
Mobile Threats in depth
General premises
1  cards
Modern Age Information Warfare in depth
General premises,
What is information warfare,
What are the information warfare ...
4  cards
Insider Attacks in depth
General premises,
Companies generally try to preven...
2  cards
Phishing
What is phishing
1  cards
Web Application Threats in depth
General premises
1  cards
Classification of Threats: Network Threats
What is a network,
What are some examples of network...
2  cards
Host Threats
What is a host threat,
Examples of host threats
2  cards
Application Threats
What is an application threat,
What are some examples of applica...
2  cards
Classification of Attacks
Basic principles,
Examples operating system attacks,
What does it take to protect a sy...
8  cards
Botnets
Botnets
1  cards
Laws, Standards, and Regulations
Payment card industry data securi...,
Payment card industry data securi...,
Health insurance portability and ...
7  cards
2nd Quiz
Security threat,
Security attack,
Network threats host threats appl...
10  cards
Types of Hackers
What is a hacker,
Classifications of hackers
2  cards
What is Ethical Hacking and what is it's Purpose ?
What is ethical hacking,
What is the purpose of ethical ha...,
When convincing a company why eth...
3  cards
Scope of Ethical Hacking
The three primary guidelines of e...
1  cards
Hacking Stages
What is the initial phase,
What is the second phase,
What is the third phase
5  cards
3rd Quiz
Hackers who use their knowledge a...,
Hackers who use their knowledge a...,
Hackers who use their knowledge a...
11  cards
Information Assurance
What is information assurance,
What does integrity refer to,
What does availability refer to
8  cards
Security Controls
Eisa information security managem...,
Enterprise information security a...
2  cards
Network Zoning
Network zoning broad premises,
What does network zoning do,
Properties of a security zone are
4  cards
Defense in Depth
Defense in depth layers,
Physical,
Perimeter
12  cards
What Sort of Things Do Policies Regulate ?
Encryption,
Access control,
Authentication
14  cards
Workplace Security Policies and Examples
Note worthy premises,
Access control policy,
Remote access policy
12  cards
Physical Security Controls and Risk
Preventive controls,
Detective controls,
Deterrent controls
7  cards
Risk Management
Definition of risk management,
The objectives of risk management,
The steps to take when conducting...
3  cards
Threat Modeling and Incident Management
Self note: from minute 9:00 of this video and onward until the next quiz, I'm just gonna try absorbing as much information as I can w/out taking notes as a ways of maybe decreasing my overall workload. So, if this doesn't work out, you know where you left off: 9 minutes into Lecture: Threat Modeling and Incident Management.
4  cards
UBA - User Behavior Analytics and Network Security Controls
User behavior analytics definition,
General notes,
Network security controls objective
3  cards
Access controls
Types of access controls,
Those four describers ermin told ...
2  cards
Identification Authentication Authorization Accounting and IAM
Identification,
Authentication,
Authorization
5  cards
Data Leakage
Data leakage definition,
Insider threats and external threats
2  cards
Data Backup
Data backup definition,
General notes,
Step one of data backup strategy
12  cards
Data Recovery
Definition of data recovery,
General notes
2  cards
What is penetration testing ?
Definition of penetration testing,
General notes
2  cards
What does a good penetration test consist of ?
Activities that make up a good pe...
1  cards
Why do a penetration test ?
Lil list,
Significant side notes
2  cards
Pre-Attack Phase: Contracts
Videos header,
Important notes
2  cards
Audit vs Vulnerability Assessment vs Penetration Test
Security audit,
Vulnerability assessment,
Penetration testing
3  cards
Red vs Blue Team !
Role of the blue team,
Role of the red team,
General notes
3  cards
Types of Penetration Testing
Ermins graph,
General notes,
What does black box testing refer to
5  cards
Pre-Attack Phase: Rules of Engagement
Rules of engagement definition,
General notes
2  cards
Pre-Attack Phase: Understanding your Client's requirements
Video header,
General notes
2  cards
Pre-Attack Phase: Scope of a Penetration Test
General notes,
Deliverables,
Functionality
4  cards
Pre-Attack Phase: Information Gathering
General notes
1  cards
Pre-Attack Phase: Two Types of Information Gathering
Two types of reconnaissance,
On the subject of active passive ...,
On the subject of whois
3  cards
Attack Phase
Attack phase definition,
The four marks to hit when penetr...
2  cards
Attack Phase: Penetrating the Perimeter
Methods used to test firewalls,
Methods used to enumerate devices...,
General notes
3  cards
Attack Phase: Target Acquisition
Techniques used in order to acqui...,
General notes
2  cards
Attack Phase: Privilege Escalation
Methods you can use to escalate y...,
General notes
2  cards
Attack Phase: Execute, Implant, Retract.
General notes
1  cards
Post-Attack Phase
Description and details pertainin...
1  cards
Security Testing Methodologies
Description,
Two types of testing methodologies,
Examples of proprietary methodolo...
11  cards
Quiz solutions: Penetration testing
0  cards
About Footprinting
Definition,
General notes
2  cards
Hacker State of Mind
What is a hackers perspective as ...
1  cards
Search Engine and Online Resources
First things to do at the beginni...,
General notes
2  cards
Search Engine and Online Resources
General notes
1  cards

More about
Certified Ethical Hacker (CEH)

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Christoph Todd's Certified Ethical Hacker (CEH) flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Certified Ethical Hacker (CEH)
  • 16 decks
  • 82 flashcards
  • 71 learners
Decks: Introduction To Ethical Hacking Ethics A, Footprinting And Social Engineering, Scanning And Enumeration, And more!
CEH - Certified Ethical Hacking
  • 1 decks
  • 21 flashcards
  • 4 learners
Decks: Chapter 2 Reconnaissance Footprinting, And more!
Certified Ethical Hacker
  • 1 decks
  • 29 flashcards
  • 1 learners
Decks: Security Basics, And more!
Make Flashcards