CEH-in-bullet-points
CEH-in-bullet-points copied to clipboard
💻 Certified ethical hacker summary in bullet points
Certified ethical hacker in bullet points
- This repo contains study notes for Certified Ethical Hacker exam.
- The notes are comprehensive and written with goal of covering all exam areas.
- It includes many real-life tips and tricks to keep practical value in the content.
- Combines and summarizes a lot of education materials from many different sources.
- I passed the exam with 119/125 score with these notes.
- 💡 A good way is using material is using the search function extensively, there are many cross references throughout the material to help you navigate, feel free to ignore them if you're reading for the first time.
- Good luck & enjoy studying! ☕
- ✨ Contributions of any kind are welcome!
Symbols
-
There are some symbols used throughout the documentation:
Symbol Description 💡 Best practice or practical tips ❗ An important limitation, challenge or an exception 📝 Common exam area 🤗 Fact / trivia (most likely unrelated to the exam)
Content
- Introduction
- Information security
- Information security overview
- Security threats and attacks
- Information security controls
- Information security controls overview
- Risk management
- Incident management
- Network security
- Security policies
- Physical security
- Data leakage backup and recovery
- Identity access management (IAM)
- Threat intelligence and forensics
- Laws, standards and regulations
- Hacking
- Hacker types
- Hacking stages
- Penetration testing
- Penetration testing overview
- Penetration testing phases
- Information security
- Footprinting
- Footprinting overview
- Search engines and online resources
- WHOIS, GeoIpLocation and DNS interrogation
- Email footprinting
- Website footprinting
- Network footprinting
- Scanning networks
- Scanning networks overview
- TCP/IP basics
- Scanning tools
- Scanning techniques
- Bypassing IDS and firewall
- Banner grabbing
- Enumeration
- Enumeration Overview
- DNS enumeration
- Vulnerabilities
- Vulnerability analysis
- Common vulnerabilities
- Automated penetration testing tools
- System hacking
- Cracking passwords
- Cracking passwords overview
- Microsoft authentication
- Password cracking tools
- Linux basics
- Escalating privileges
- Executing applications
- Hiding files
- Covering tracks
- Cracking passwords
- Malware overview
- Malware overview
- Trojans
- Viruses
- Malware analysis
- Sniffing
- Sniffing overview
- Sniffing tools
- Sniffing attacks
- Sniffing attacks overview
- Spoofing attacks
- ARP poisoning
- Wireless networks
- Wireless networks overview
- AAA protocols
- Wireless threats and attacks
- Wireless security tools
- Bluetooth
- Social engineering
- Social engineering overview
- Social engineering types
- Firewalls IDS and Honeypots
- Intrusion detection system (IDS)
- Intrusion detection system (IDS) overview
- Evading IDS
- Firewall
- Firewall overview
- Evading firewalls
- Honeypot
- Intrusion detection system (IDS)
- Web servers
- Hacking web servers
- Web server threats and attacks
- Web applications
- Hacking web applications
- OWASP top 10 threats
- Denial of service
- Session hijacking
- SQL injection
- SQL injection overview
- SQL injection types
- Cryptography
- Cryptography overview
- Encryption algorithms
- Hashing algorithms
- Communication
- Encrypting communication
- Tunneling protocols
- Encrypting disk
- Cryptanalysis
- Cloud
- Cloud computing
- Cloud security
- Container security
- Mobile platforms
- Mobile hacking
- Mobile attack vectors
- Mobile attacks
- IoT and OT
- IoT overview
- IoT security
- Exam readiness
↑
Support
- ⭐️ Simplest way to say thanks is just to it a star 🤩
- ❤️ To show more support:
- ✨ Contributions of any kind are welcome!
↑