This class was created by Brainscape user Kodama Chameleon. Visit their profile to learn more about the creator.

Decks in this class (55)

Hacking Methodology
List the ceh methodology,
Ceh hacking sub methodologies,
Define gaining access
8  cards
Windows Authentication
Define sam,
Sam locations,
Define ntlm
6  cards
CEH v11 EC-Council Certification Overview
Ec council requirements,
Ceh criteria
2  cards
Basic Cybersecurity Concepts
5 elements of cybersecurity,
Define confidentiality,
Define integrity
6  cards
Attacker Motives, Goals, and Objectives
Hacker motivations
1  cards
Attack Classifications
5 attack types,
Define passive attacks,
Define active attacks
7  cards
Information Warfare
Types of information warfare,
Explain c2 warfare,
Explain intelligence based warfare
11  cards
Network Sniffing Basics
Promiscuous mode,
Sniffing tools,
Types of sniffing
13  cards
DHCP Sniffing Attacks
Define dhcp,
Explain the dora process,
Dhcp attacks
3  cards
ARP Poisoning
Define arp,
Command to view arp table,
Arp attacks
5  cards
DNS Poisoning
Windows dns process,
Common dns attacks,
Dns cache poisoning tools
3  cards
Sniffing Defenses
Sniffing defenses,
Switch defenses,
Dns defenses
3  cards
Steganography Tools and Techniques
Define a cover file,
Steganography tools,
Difference between steganography ...
4  cards
Covering Your Tracks
Covering tracks methods,
Disabling auditing,
Clearing logs
4  cards
Wireless Hacking
Mac spoofing tools,
Mac spoofing commands,
Deauth attack commands
4  cards
Wireless Hacking Countermeasures
Wireless attack countermeasures,
Password complexity considerations,
Define nac
3  cards
Nmap TCP Connect Scan
Define nmap tcp connect scan,
Steps of the tcp 3 way handshake,
Nmap tcp connect scan command
5  cards
Nmap Stealth Scan
Define nmap stealth half open or ...,
Nmap stealth scan command,
Nmap stealth scan cons
4  cards
Nmap Inverse TCP Scan
Define inverse tcp scan,
Inverse tcp scan command,
Define xmas scan
8  cards
Nmap ACK Scan
Define nmap ack scan,
Nmap ack scan mechanics,
Nmap ack scan command
8  cards
Hacking Phases & Concepts
Define hacking,
Who are hackers,
Hacker categories
3  cards
Ethical Hacking Concepts
Define ethical hacking,
Restrictions,
Common technical skills
4  cards
SQL Injection & SQLMap
Sql injection capabilities
1  cards
SQL Injection Testing with SQLMap
Sql injection tools,
Sqlmap database name arguments,
Sql command to write to a file
4  cards
Session Hijacking Concepts
Define session hijacking,
Session hijacking vulnerabilities,
Session hijacking types
4  cards
Network Level Session Hijacking
Explain blind session hijacking,
Explain udp session hijacking,
Explain tcp session hijacking
5  cards
Application Level Session Hijacking
Explain mitm sniffing attacks,
Explain mitb attacks,
Cross site scripting attack types
10  cards
Session Hijacking Countermeasures
Session hijacking countermeasures,
Session hijacking detection methods,
Session hijacking prevention methods
6  cards
Geolocation Recon
Facility considerations,
Physical recon tools
2  cards
Social Networking Recon
Social media ceh valuable informa...,
Social media tools
2  cards
Job Board Recon
Job board relevant information
1  cards
Deep and Dark Webs Recon
Define the surface web,
Define the deep web,
Define the dark web
5  cards
Cloud Computing Concepts
Types of cloud services,
Define iaas,
Define paas
19  cards
Container Concepts
Define a container,
Container benefits,
5 tier container architecture
6  cards
Hacking Cloud Services
Cloud vulnerability scanners,
Define s3,
S3 enumeration
6  cards
Cloud Security Controls
Standard security controls,
Cloud specific security controls,
Kubernettes security controls
5  cards
Nmap IDLE/IPID Scan
Define a zombie,
Idle ipid scan step 1,
Idle ipid scan step 2
5  cards
Nmap UDP Scan
Explain udp scanning,
Nmap udp scan command,
Nmap udp scanning con
4  cards
Nmap SCTP scan
Define sctp,
Sctp handshake parts,
Nmap init scan command
4  cards
Nmap IPv6 List and Version Scans
Nmap ipv6 option,
Nmap version scan option
2  cards
Vulnerability Assessment Concepts and Resources
Define vulnerability assessment va,
Va tools,
Define cvss
7  cards
Vulnerability Management Life Cycle
Va life cycle steps,
Va pre assessment phase,
Vulnerability assessment phase
4  cards
Vulnerability Classification
Vulnerability classifications
1  cards
Password Attack Basics
Define password cracking,
Non technical password attacks,
Online active password attacks
7  cards
Password Extraction and Cracking
Password hash extraction tools,
Responder listening command,
Hash cracking tools
5  cards
Password Cracking Enhancement Techniques
Explain a combinator attack,
Explain a prince attack,
Explain a toggle case attack
4  cards
Malware Concepts and Components
Define malware,
Infection methods,
Malware components
3  cards
Advanced Persistent Threats
Define apt,
Apt characteristics,
6 phases of apt
3  cards
Trojans
Types of trojans,
Define malware wrappers,
Anti virus evasion methods
4  cards
Viruses and Worms
Define a virus,
Define a worm,
Viruses or worm symptoms
5  cards
Web Application Attacks & Vulnerabilities
Define a web application,
Define soap,
Define wsdl
10  cards
OWASP Top 10 Web Application Attacks 2017
Define owasp,
Owasp top 10
2  cards
Cryptography Concepts
Types of cryptography,
Define gak,
Types of cipers
5  cards
Crypto Algorithms and Implementations
Symmetric algorithms,
Asymmetric algorithms,
Types of hashes
8  cards
Cryptography Tools
Cryptography tools
1  cards

More about
CEH v11

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Kodama Chameleon's CEH v11 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CEH V11
  • 7 decks
  • 270 flashcards
  • 250 learners
Decks: Mod1 Intro To Ethical Hacking, Mod2 Footprinting And Recon, Mod3 Scanning Networks, And more!
CEH v10
  • 25 decks
  • 772 flashcards
  • 1059 learners
Decks: Module 1 Intro To Ethical Hacking, Module 2 Footprinting And Reconnaissance, Module 3 Scanning Networks, And more!
CEH v11 Revision
  • 15 decks
  • 558 flashcards
  • 39 learners
Decks: Essential Knowledge, Security In Cloud Computing, Linux, And more!
Make Flashcards