Number of Questions | 125 |
Test Duration | 4 Hours |
Test Format | Multiple Choice |
Hacking
Explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
Emerging Attack Vector
An attack vector is a way for an attacker or hacker to gain access to a computer or network server in order to deliver a payload or malicious outcome. Hackers can use attack vectors to exploit system vulnerabilities, including the human factor.
Enumeration
Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system.
Malware Reverse Engineering
The process of reverse engineering malware entails taking a captured executable (a standalone executable or a library file, such as a DLL) and performing the computer equivalent of an MRI.
Cloud Computing
Cloud computing refers to the on-demand availability of computer system resources, particularly data storage and computing power, without the user's direct active management. The term is commonly used to describe data centers that are accessible to a large number of users via the Internet.
Hacking Web Applications
A web application is a program or piece of software that runs in a web browser to carry out specific tasks. Any web application consists of several layers: the web server, the application's content hosted on the web server, and the backend interface layer that integrates with other applications. The architecture of a web application is scalable and contains components with high availability.
Operating Technology
The term "operational technology" refers to hardware and software that detects or causes a change in industrial equipment, assets, processes, and events through direct monitoring and/or control.
WAP3 (Encryption and cracking)
WPA3 solves the problem by utilizing "individualized data encryption." When you connect to an open Wi-Fi network, the traffic between your device and the Wi-Fi access point is encrypted, even if you do not enter a passcode at the time of connection.
Course outline
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks