Certified Ethical Hacker v13 - Master All 20 Core Modules
CIA Triad, hacker types, 5-phase methodology, legal and ethical considerations
Passive and active reconnaissance, OSINT, Google dorking, information gathering tools
Port scanning techniques, Nmap commands, network discovery, steganography detection
Service enumeration, NetBIOS, SNMP, LDAP, SMTP vulnerability identification
CVSS scoring, vulnerability scanners, assessment methodologies, penetration testing
Password attacks, privilege escalation, backdoors, rootkits, and covering tracks
Virus, worms, trojans, ransomware analysis, malware detection and prevention
Network traffic analysis, packet capture tools, protocols vulnerabilities
Human-based attacks, phishing, pretexting, psychological manipulation techniques
DoS and DDoS attacks, botnets, traffic flooding, mitigation strategies
TCP hijacking, session prediction, man-in-the-middle attacks
IDS evasion techniques, firewall bypassing, honeypot detection
Web server vulnerabilities, attack methodologies, server hardening
OWASP Top 10, SQL injection, XSS, CSRF, web application security testing
Database attacks, blind SQL injection, union-based attacks, prevention techniques
WiFi security protocols, WEP/WPA attacks, rogue access points
iOS and Android security, mobile malware, app security testing
IoT device vulnerabilities, firmware analysis, RF attacks, smart home security
Cloud security models, container attacks, serverless vulnerabilities
Encryption algorithms, hash functions, PKI, cryptanalysis techniques
Experience the most comprehensive way to study for your Certified Ethical Hacker certification. Swipe through expertly crafted study cards covering all 20 EC-Council modules with real-world attack scenarios.
Enable JavaScript to access the full interactive experience.