EC-Council
CEH | CHFI
CEH Practical - Competencies
Certified Ethical Hacker (CEH) - Practical:
Demonstrate the understanding of attack vectors
Perform network scanning to identify live and vulnerable machines in a network.
Perform OS banner grabbing, service, and user enumeration.
Perform system hacking, steganography, steganalysis attacks, and cover tracks.
Identify and use viruses, computer worms, and malware to exploit systems.
Perform packet sniffing.
Conduct a variety of web server and web application attacks including directory traversal, parameter tampering, XSS, etc.
Perform SQL injection attacks.
Perform different types of cryptography attacks.
Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems, etc.
Computer Hacking Forensics Investigator (CHFI):
Cybercrime investigation process, including search and seizure protocols, obtaining search warrants, and other laws
Cybercrime categories, digital evidence types, rules of evidence, and best practices in computer evidence examination
First responder duties, conducting and documenting preliminary interviews, securing & evaluating computer crime scenes
Forensic investigator tools of the trade, collecting & transporting electronic evidence, and cybercrime scene preservation
Recovery of deleted files and partitions in popular computing environments, including Windows, Linux, and Mac OS
Utilizing Access Data Forensic Toolkit (FTK), EnCase Steganography, Steganalysis, and Image File Forensics
Password cracking concepts, types of PW attacks, latest tools and technologies to decipher password breaches
Computer security log capture tools, log analysis methods, time clock synchronization, and event correlation
Identify, track, analyze and defend against the latest and nastiest Network, Email, Mobile, Wireless, and Web Attacks
How to provide effective expert witness testimony in cyber crime trials and legal proceedings, and much more