certified ethical hacker (ceh)

This class was created by Brainscape user Christoph Todd. Visit their profile to learn more about the creator.

Decks in this class (66)

Common Terms
No deck description has yet been added by the author.
76  cards
Zero Day Attack
No deck description has yet been added by the author.
6  cards
Miscellaneous Computer Processes (stuff I find and look up along the way)
No deck description has yet been added by the author.
1  cards
Daisy Chaining
No deck description has yet been added by the author.
1  cards
1st Quiz
No deck description has yet been added by the author.
6  cards
The Motivations of a Hacker - (Overview ?)
No deck description has yet been added by the author.
7  cards
Cloud Computing Threats in depth
No deck description has yet been added by the author.
5  cards
Advanced Persistent Threats in depth
No deck description has yet been added by the author.
2  cards
Viruses and Worms in depth
No deck description has yet been added by the author.
2  cards
Ransomware in depth
No deck description has yet been added by the author.
1  cards
Mobile Threats in depth
No deck description has yet been added by the author.
1  cards
Modern Age Information Warfare in depth
No deck description has yet been added by the author.
4  cards
Insider Attacks in depth
No deck description has yet been added by the author.
2  cards
Phishing
No deck description has yet been added by the author.
1  cards
Web Application Threats in depth
No deck description has yet been added by the author.
1  cards
Classification of Threats: Network Threats
No deck description has yet been added by the author.
2  cards
Host Threats
No deck description has yet been added by the author.
2  cards
Application Threats
No deck description has yet been added by the author.
2  cards
Classification of Attacks
No deck description has yet been added by the author.
8  cards
Botnets
No deck description has yet been added by the author.
1  cards
Laws, Standards, and Regulations
No deck description has yet been added by the author.
7  cards
2nd Quiz
No deck description has yet been added by the author.
10  cards
Types of Hackers
No deck description has yet been added by the author.
2  cards
What is Ethical Hacking and what is it's Purpose ?
No deck description has yet been added by the author.
3  cards
Scope of Ethical Hacking
No deck description has yet been added by the author.
1  cards
Hacking Stages
No deck description has yet been added by the author.
5  cards
3rd Quiz
No deck description has yet been added by the author.
11  cards
Information Assurance
No deck description has yet been added by the author.
8  cards
Security Controls
No deck description has yet been added by the author.
2  cards
Network Zoning
No deck description has yet been added by the author.
4  cards
Defense in Depth
No deck description has yet been added by the author.
12  cards
What Sort of Things Do Policies Regulate ?
No deck description has yet been added by the author.
14  cards
Workplace Security Policies and Examples
No deck description has yet been added by the author.
12  cards
Physical Security Controls and Risk
No deck description has yet been added by the author.
7  cards
Risk Management
No deck description has yet been added by the author.
3  cards
Threat Modeling and Incident Management
Self note: from minute 9:00 of this video and onward until the next quiz, I'm just gonna try absorbing as much information as I can w/out taking notes as a ways of maybe decreasing my overall workload. So, if this doesn't work out, you know where you left off: 9 minutes into Lecture: Threat Modeling and Incident Management.
4  cards
UBA - User Behavior Analytics and Network Security Controls
No deck description has yet been added by the author.
3  cards
Access controls
No deck description has yet been added by the author.
2  cards
Identification Authentication Authorization Accounting and IAM
No deck description has yet been added by the author.
5  cards
Data Leakage
No deck description has yet been added by the author.
2  cards
Data Backup
No deck description has yet been added by the author.
12  cards
Data Recovery
No deck description has yet been added by the author.
2  cards
What is penetration testing ?
No deck description has yet been added by the author.
2  cards
What does a good penetration test consist of ?
No deck description has yet been added by the author.
1  cards
Why do a penetration test ?
No deck description has yet been added by the author.
2  cards
Pre-Attack Phase: Contracts
No deck description has yet been added by the author.
2  cards
Audit vs Vulnerability Assessment vs Penetration Test
No deck description has yet been added by the author.
3  cards
Red vs Blue Team !
No deck description has yet been added by the author.
3  cards
Types of Penetration Testing
No deck description has yet been added by the author.
5  cards
Pre-Attack Phase: Rules of Engagement
No deck description has yet been added by the author.
2  cards
Pre-Attack Phase: Understanding your Client's requirements
No deck description has yet been added by the author.
2  cards
Pre-Attack Phase: Scope of a Penetration Test
No deck description has yet been added by the author.
4  cards
Pre-Attack Phase: Information Gathering
No deck description has yet been added by the author.
1  cards
Pre-Attack Phase: Two Types of Information Gathering
No deck description has yet been added by the author.
3  cards
Attack Phase
No deck description has yet been added by the author.
2  cards
Attack Phase: Penetrating the Perimeter
No deck description has yet been added by the author.
3  cards
Attack Phase: Target Acquisition
No deck description has yet been added by the author.
2  cards
Attack Phase: Privilege Escalation
No deck description has yet been added by the author.
2  cards
Attack Phase: Execute, Implant, Retract.
No deck description has yet been added by the author.
1  cards
Post-Attack Phase
No deck description has yet been added by the author.
1  cards
Security Testing Methodologies
No deck description has yet been added by the author.
11  cards
Quiz solutions: Penetration testing
No deck description has yet been added by the author.
0  cards
About Footprinting
No deck description has yet been added by the author.
2  cards
Hacker State of Mind
No deck description has yet been added by the author.
1  cards
Search Engine and Online Resources
No deck description has yet been added by the author.
2  cards
Search Engine and Online Resources
No deck description has yet been added by the author.
1  cards

More about
certified ethical hacker (ceh)

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Christoph Todd's Certified Ethical Hacker (CEH) flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Certified Ethical Hacker (CEH)
  • 16 decks
  • 82 flashcards
  • 70 learners
Decks: Introduction To Ethical Hacking Ethics A, Footprinting And Social Engineering, Scanning And Enumeration, And more!
CEH - Certified Ethical Hacking
  • 1 decks
  • 21 flashcards
  • 4 learners
Decks: Chapter 2 Reconnaissance Footprinting, And more!
Certified Ethical Hacker
  • 1 decks
  • 29 flashcards
  • 1 learners
Decks: Security Basics, And more!
ag-CEH-V10 - Certified Ethical Hacker
  • 25 decks
  • 922 flashcards
  • 1 learners
Decks: Chapter 1 Introduction To Ethical Hackin, Chapter 0 Random Terms, Chapter 2 System Fundamentals, And more!
Make Flashcards