Certified Ethical Hacker (CEH)

This class was created by Brainscape user Christoph Todd. Visit their profile to learn more about the creator.

Flashcard maker: Christoph Todd

Decks in this class (66)

Common Terms
The creator of this deck did not yet add a description for what is included in this deck.
76  cards
Zero Day Attack
The creator of this deck did not yet add a description for what is included in this deck.
6  cards
Miscellaneous Computer Processes (stuff I find and look up along the way)
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Daisy Chaining
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
1st Quiz
The creator of this deck did not yet add a description for what is included in this deck.
6  cards
The Motivations of a Hacker - (Overview ?)
The creator of this deck did not yet add a description for what is included in this deck.
7  cards
Cloud Computing Threats in depth
The creator of this deck did not yet add a description for what is included in this deck.
5  cards
Advanced Persistent Threats in depth
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Viruses and Worms in depth
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Ransomware in depth
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Mobile Threats in depth
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Modern Age Information Warfare in depth
The creator of this deck did not yet add a description for what is included in this deck.
4  cards
Insider Attacks in depth
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Phishing
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Web Application Threats in depth
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Classification of Threats: Network Threats
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Host Threats
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Application Threats
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Classification of Attacks
The creator of this deck did not yet add a description for what is included in this deck.
8  cards
Botnets
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Laws, Standards, and Regulations
The creator of this deck did not yet add a description for what is included in this deck.
7  cards
2nd Quiz
The creator of this deck did not yet add a description for what is included in this deck.
10  cards
Types of Hackers
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
What is Ethical Hacking and what is it's Purpose ?
The creator of this deck did not yet add a description for what is included in this deck.
3  cards
Scope of Ethical Hacking
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Hacking Stages
The creator of this deck did not yet add a description for what is included in this deck.
5  cards
3rd Quiz
The creator of this deck did not yet add a description for what is included in this deck.
11  cards
Information Assurance
The creator of this deck did not yet add a description for what is included in this deck.
8  cards
Security Controls
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Network Zoning
The creator of this deck did not yet add a description for what is included in this deck.
4  cards
Defense in Depth
The creator of this deck did not yet add a description for what is included in this deck.
12  cards
What Sort of Things Do Policies Regulate ?
The creator of this deck did not yet add a description for what is included in this deck.
14  cards
Workplace Security Policies and Examples
The creator of this deck did not yet add a description for what is included in this deck.
12  cards
Physical Security Controls and Risk
The creator of this deck did not yet add a description for what is included in this deck.
7  cards
Risk Management
The creator of this deck did not yet add a description for what is included in this deck.
3  cards
Threat Modeling and Incident Management
Self note: from minute 9:00 of this video and onward until the next quiz, I'm just gonna try absorbing as much information as I can w/out taking notes as a ways of maybe decreasing my overall workload. So, if this doesn't work out, you know where you left off: 9 minutes into Lecture: Threat Modeling and Incident Management.
4  cards
UBA - User Behavior Analytics and Network Security Controls
The creator of this deck did not yet add a description for what is included in this deck.
3  cards
Access controls
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Identification Authentication Authorization Accounting and IAM
The creator of this deck did not yet add a description for what is included in this deck.
5  cards
Data Leakage
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Data Backup
The creator of this deck did not yet add a description for what is included in this deck.
12  cards
Data Recovery
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
What is penetration testing ?
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
What does a good penetration test consist of ?
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Why do a penetration test ?
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Pre-Attack Phase: Contracts
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Audit vs Vulnerability Assessment vs Penetration Test
The creator of this deck did not yet add a description for what is included in this deck.
3  cards
Red vs Blue Team !
The creator of this deck did not yet add a description for what is included in this deck.
3  cards
Types of Penetration Testing
The creator of this deck did not yet add a description for what is included in this deck.
5  cards
Pre-Attack Phase: Rules of Engagement
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Pre-Attack Phase: Understanding your Client's requirements
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Pre-Attack Phase: Scope of a Penetration Test
The creator of this deck did not yet add a description for what is included in this deck.
4  cards
Pre-Attack Phase: Information Gathering
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Pre-Attack Phase: Two Types of Information Gathering
The creator of this deck did not yet add a description for what is included in this deck.
3  cards
Attack Phase
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Attack Phase: Penetrating the Perimeter
The creator of this deck did not yet add a description for what is included in this deck.
3  cards
Attack Phase: Target Acquisition
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Attack Phase: Privilege Escalation
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Attack Phase: Execute, Implant, Retract.
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Post-Attack Phase
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Security Testing Methodologies
The creator of this deck did not yet add a description for what is included in this deck.
11  cards
Quiz solutions: Penetration testing
The creator of this deck did not yet add a description for what is included in this deck.
0  cards
About Footprinting
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Hacker State of Mind
The creator of this deck did not yet add a description for what is included in this deck.
1  cards
Search Engine and Online Resources
The creator of this deck did not yet add a description for what is included in this deck.
2  cards
Search Engine and Online Resources
The creator of this deck did not yet add a description for what is included in this deck.
1  cards

More about Certified Ethical Hacker (CEH)

  • Full test name Unspecified
  • Test acronym Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer.

Looking for something else?

Certified Ethical Hacker (CEH)
  • 16 decks
  • 82 flashcards
  • 65 learners
Decks: Introduction To Ethical Hacking Ethics A, Footprinting And Social Engineering, Scanning And Enumeration, And more!
CEH - Certified Ethical Hacking
  • 1 decks
  • 21 flashcards
  • 3 learners
Decks: Chapter 2 Reconnaissance Footprinting, And more!
C701 Certified Ethical Hacking
  • 2 decks
  • 36 flashcards
  • 1 learners
Decks: Malware Analysis, Ceh Tools, And more!
Certified Ethical Hacker
  • 5 decks
  • 45 flashcards
  • 4 learners
Decks: Cryptography, Icmp Message Types, Scan Types Responses, And more!
Make flashcards