Category Archives: Certifications

Information about IT Certifications

Certified Ethical Hacker – Module 5 – System Hacking Mind Map

Here is the fifth Mind Map in the Certified Ethical Hacker CEH series from MindCert.com.

This Mind Map covers System Hacking. There are nine sections to this Mind Map.

They are: Remote Password Guessing, Eavesdropping, Denial of Service, Privilege Escalation, Keystroke Loggers,  Password Cracking, Covering Tracks,  Remote Control, and Covering Tracks.

This is quite a large Mind Map as you can see and it covers a lot of topics. As normal, the subjects are covered and then associated tools are provided complete with links that show where to download the tools from. All of the tools are what are in the CEH syllabus and I would recomend you looking at each one of these tools in order to ensure you know what they do, and how they do it.

The CEH exam has a large focus on the tools you use so take advantage of these links and install the tools to play with. You cannot beat first hand experience.

As always, please feed back comments about the Mind Map and follow this link to download it.

    New Cisco Blog – Cisconews.co.uk

    Cisco NewsA couple of friends of mine have just launched a new blog called at Cisconews.co.uk.

    The guys who run the blog are all Cisco qualified and also busy working on furthering their certifications. The site is worth a look, with some good custom written content as well as syndicated news from various other resources.

    Hopefully we will see some Cisco Certification resources on the site in the not to distant future.

    Certified Ethical Hacker – Module 3 – Scanning Mind Map

    Mind Map CEH ScanningI am pleased to bring you the next Mind Map for the Certified Ethical Hacker.

    This Mind Map covers module 3 of the CEH curriculum. This is Scanning. This Mind Map and module covers the detection of live systems on a network as well as the detection of services on those systems. This is also known as port scanning, and one of the best port scanning tools is Nmap. Nmap is covered in depth within this Mind Map along with the command line options for performing different scans with it. As well as Nmap, other port scanning tools are reviewed as well as direct links to download them.

    As always, I hope you enjoy this Mind Map and please comment to let me know your thoughts as you are all rather slow at letting me know if this work is appreciated.

    Proceed to download the Mind Map on Scanning for the Certified Ethical Hacker.

    CISSP Mind Map – Business Continuity Planning and Disaster Recovery Planning

    MindCert CISSP BCPThis is the third Mind Map out of ten in the CISSP Series.This Mind Map covers the Business Continuity Planning and Disaster Recover Planning domain on the Common Body of Knowledge (CBK).

    This domain addresses the important of planning for business continuity and or a disaster. The domain covers the type of planning and suggests steps you should take to ensure that roles and responsibilities are allocated to staff members and that everybody knows what the plan is in the event of a disaster to cause the minimum impact to the operational effectiveness of an organization.

    As always, I would love to hear any feedback you have about these Mind Maps or suggestions for improving them.

    The Mind Map can be downloaded HERE.

    Certified Ethical Hacker – Module 2 – Footprinting Mind Map

    Hacking FootprintingI am happy to provide the second Mind Map for the Certified Ethical Hacker (CEH).

    The second Mind Map from MindCert.com covers Footprinting. Footprinting is the initial reconnaissance that a hacker carries out in order to gleam information about the target of evaluation.

    The type of information that is obtained through footprinting is normally in the public domain so this is classed as passive reconnaissance as you do not have to do anything active, against the target of evaluation at this point.

    I hope you find this Mind Map useful, there are a lot more to come.

    The Mind Map can be DOWNLOADED HERE

    CISSP Mind Map – Application and Systems Development

    This is the second Mind Map out of ten in the CISSP Series.

    This Mind Map covers the Application and Systems Development domain on the Common Body of Knowledge (CBK).

    This domain addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security.

    As always, I would love to hear any feedback you have about these Mind Maps or suggestions for improving them.

    The Mind Map can be downloaded HERE.

    CEH Study Tool – BackTrack

    For those of you involved in the Certified Ethical Hacker certification, or interested in general network security, then be sure to check out BackTrack.

    I used BackTrack as the basis for my studies towards the CEH exam which I successfully passed.

    The CEH tests very heavy on security tools. A lot of these security tools are Linux based, and a lot of them are already installed on BackTrack. The ones which are not installed, can be, giving you a fantastic platform to base your studies.

    Continue reading

    Certified Ethical Hacker – CEH Review

    Just thought I would take the time to provide a review on a certification I have recently studied for and successfully passed. This is the Certified Ethical Hacker from the EC-Council.

    I had been getting more involved in security and vulnerability testing so I thought that looking for a certification that would help me learn these topics in a structured format would be good. I had heard about the Certified Ethical Hacker exam so I thought I would give that a go.

    If you want to stop hackers from invading your network, first you’ve got to invade their minds.

    There is not much available on the Internet about the CEH exam. It definitely does not have the traction or following of the Microsoft and Cisco exams, but if you are interested in network security, it is a fantastic learning opportunity and certification.

    Continue reading