EC-Council

CEH | CHFI

CEH Practical - Competencies

Certified Ethical Hacker (CEH) - Practical:

  • Demonstrate the understanding of attack vectors

  • Perform network scanning to identify live and vulnerable machines in a network.

  • Perform OS banner grabbing, service, and user enumeration.

  • Perform system hacking, steganography, steganalysis attacks, and cover tracks.

  • Identify and use viruses, computer worms, and malware to exploit systems.

  • Perform packet sniffing.

  • Conduct a variety of web server and web application attacks including directory traversal, parameter tampering, XSS, etc.

  • Perform SQL injection attacks.

  • Perform different types of cryptography attacks.

  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems, etc.

Computer Hacking Forensics Investigator (CHFI):

  • Cybercrime investigation process, including search and seizure protocols, obtaining search warrants, and other laws

  • Cybercrime categories, digital evidence types, rules of evidence, and best practices in computer evidence examination

  • First responder duties, conducting and documenting preliminary interviews, securing & evaluating computer crime scenes

  • Forensic investigator tools of the trade, collecting & transporting electronic evidence, and cybercrime scene preservation

  • Recovery of deleted files and partitions in popular computing environments, including Windows, Linux, and Mac OS

  • Utilizing Access Data Forensic Toolkit (FTK), EnCase Steganography, Steganalysis, and Image File Forensics

  • Password cracking concepts, types of PW attacks, latest tools and technologies to decipher password breaches

  • Computer security log capture tools, log analysis methods, time clock synchronization, and event correlation

  • Identify, track, analyze and defend against the latest and nastiest Network, Email, Mobile, Wireless, and Web Attacks

  • How to provide effective expert witness testimony in cyber crime trials and legal proceedings, and much more