CEH Summarized --
Simple Exam Guide 2021
MANK
Contents
0. Introduction .................................................................................................................................. 14
Fundamental Security Concepts ............................................................................................... 14
Security, Functionality and Usability balance .................................................................... 15
Types of Hackers........................................................................................................................... 15
Hacking Vocabulary ..................................................................................................................... 16
Threat Categories ......................................................................................................................... 17
Attack Vectors ............................................................................................................................... 18
Attack Types .................................................................................................................................. 19
1. Operating System ................................................................................................................ 19
2. Application Level.................................................................................................................. 19
3. Misconfiguration .................................................................................................................. 19
4. Shrink-Wrap Code................................................................................................................ 19
Vulnerabilities ............................................................................................................................... 20
Vulnerability Categories ......................................................................................................... 21
Pen Test Phases (CEH) ................................................................................................................. 21
The Five Stages of Ethical Hacking .......................................................................................... 22
1. Reconnaissance..................................................................................................................... 22
2. Scanning & Enumeration ................................................................................................... 22
3. Gaining Access ...................................................................................................................... 22
4. Maintaining Access .............................................................................................................. 23
5. Covering Tracks .................................................................................................................... 23
Three Types of Active Defense .................................................................................................. 23
Information Assurance (IA) ........................................................................................................ 23
Information Security Management Program ........................................................................ 24
EISA - Enterprise Information Security Architecture ........................................................... 24
Physical Security Controls .......................................................................................................... 25
Types of Security Controls ..................................................................................................... 26
Managing the Risk ....................................................................................................................... 26
Risk matrix ................................................................................................................................. 26
Risk Management ..................................................................................................................... 27
Phases of Risk Management .................................................................................................. 27
Threat Modeling ....................................................................................................................... 29
Security Policies ............................................................................................................................ 29
Security Policy - Examples.......................................................................................................... 30
Security Policiy - Types ............................................................................................................... 31
Security Policy - Creation Steps ................................................................................................ 31
Incident Management Process .................................................................................................. 31
Incident Response Team Duties ............................................................................................ 32
SIEM - Security Information and Event Management ..................................................... 32
Identity and Access Management ............................................................................................ 36
1. Identification ......................................................................................................................... 36
2. Authentication ...................................................................................................................... 37
3. Authorization concepts ...................................................................................................... 37
4. Accouting ............................................................................................................................... 37
Access Controls Models .......................................................................................................... 37
Data Loss Prevention (DLP)........................................................................................................ 39
Data Backup ................................................................................................................................... 39
Backup Strategies ..................................................................................................................... 40
3 Backup methods .................................................................................................................... 40
Penetration Test - Basics............................................................................................................. 42
Law Categories .............................................................................................................................. 42
Laws and Standards: .................................................................................................................... 42
OSSTM Compliance .................................................................................................................. 42
PCI-DSS ....................................................................................................................................... 43
ISO 27001 ................................................................................................................................... 43
ISO 27002 AND 17799 ............................................................................................................. 44
HIPAA .......................................................................................................................................... 44
SOX............................................................................................................................................... 44
DMCA .......................................................................................................................................... 44
FISMA .......................................................................................................................................... 44
NIST-800-53 ............................................................................................................................... 44
FITARA......................................................................................................................................... 44
COBIT ........................................................................................................................................... 44
GLBA ............................................................................................................................................ 45
CSIRT............................................................................................................................................ 45