Home      Signup      Courses      Sign-In
 

  Please login to Enroll or Access the course.  
  Summary Page: Certified Ethical Hacker (CEH): Enumeration and Cryptography

Certified Ethical Hacker (CEH): Enumeration and Cryptography






During the enumeration phase of an attack, the attacker creates active connections to an organization's network environment and performs directed queries to gain additional information. In this course, we look at enumeration and the types of enumeration an attacker can perform. We also look at encryption and the technologies and protocols used. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fourth in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.


Network and information security professionals


1.5

Enumeration

  • recognize the steps of the enumeration phase of an attack
  • match the tool to the type of hosts it can enumerate
  • match the enumeration tool to the network protocol it operates over
  • match the enumeration countermeasure to the protocol it protects
  • Cryptography

  • identify characteristics of symmetric and asymmetric encryption
  • match the encryption algorithm to its characteristics
  • match the components of Public Key Infrastructure to their descriptions
  • match the attack on cryptographic systems to its description

  • sp_ceth_a04_it_enus

     

     
    Home      Signup      Courses      Sign-In
     

      UN Global Alliance for ICT and Development ESKILLS360 IS A UN GAID FLAGSHIP INITIATIVE