my CEH - Certified Ethical Hacker

This class was created by Brainscape user Roger Pharr. Visit their profile to learn more about the creator.

Decks in this class (19)

Chapter 1 Introduction to Ethical Hacking
Hackers need 3 things to carry ou...,
Types of hackers,
Pen testing
22  cards
Chapter 0 Random Terms
Security engineering,
Information systems,
Network
10  cards
Chapter 2 System Fundamentals
Network topologies,
Bus topology,
Token
36  cards
Chapter 3 Cryptography
Nonrepudiation,
Symmetric cryptography,
Assymetric cryptography
19  cards
Chapter 4 Footprinting & Reconnaissance
Phase 1 of the ethical hacking pr...,
Phase 2,
Phase 3
25  cards
Important Tools by steps
Locating databases on the nw,
Wifi,
Evading ids ips firewalls etc
6  cards
Chapter 5 Scanning Networks
Generally found in scanning phase is,
Wardialing,
Wardriving
20  cards
Chapter 6 Enumeration
1 extracting info from email ids,
3 using brute force attacks on di...,
4 exploiting snmp
39  cards
Chapter 7: System Hacking
Passive online attack techniques 3,
Active online attack techniques,
Dna
17  cards
Chapter 8: Trojans, Viruses, Worms, & Covert Channels
Covert channels,
Malware the law 3,
Viruses
26  cards
Chapter 9: Sniffers
Promiscuous mode,
Active vs passive sniffing,
Hw protocol analyzers
16  cards
Chapter 10 Social Engineering
Behaviors or signs useful in extr...,
Why does social engineering work 5,
How to stop social engineering
7  cards
Chapter 11: DoS
Dos goal,
Buffer overflow,
C functions signs of buffer overflow
24  cards
Chapter 12: Session Hijacking
3 ways of determining the session id,
Spoofing vs hijacking,
Attack vs passive attacks
14  cards
Chapter 13: Web Servers & Web Apps
Web application,
Server administrators,
Nw administrators
26  cards
Chapter 14: SQL Injection
Sql,
Sql injection,
Batch execution
24  cards
Chapter 15: Wireless Networking
Cons to wifi,
Characteristics of wifi,
Techniques to managing a connection
35  cards
Chapter 16 Evading IDSs, Firewalls, and Honepots
Ids,
Nids vs packet sniffer,
Four types of ids each of these p...
27  cards
Chapter 17: Physical Security
Physical security is often overlo...,
Second physical security issue theft,
Techniques to stop dumpster divin...
13  cards

More about
my CEH - Certified Ethical Hacker

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Roger Pharr's my CEH - Certified Ethical Hacker flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CEH - Certified Ethical Hacker
  • 22 decks
  • 585 flashcards
  • 1454 learners
Decks: Chapter 1 Introduction To Ethical Hackin, Chapter 0 Random Terms, Chapter 2 System Fundamentals, And more!
Ethical Hacker
  • 22 decks
  • 585 flashcards
  • 330 learners
Decks: Chapter 1 Introduction To Ethical Hackin, Chapter 0 Random Terms, Chapter 2 System Fundamentals, And more!
Make Flashcards