Category Archives: Certified Ethical Hacker

Mind Maps and information relating to the Certified Ethical Hacker Certification

Certified Ethical Hacker CEH – Module 6 – Trojans and Backdoors Mind Map

Trojans and BackDoorsWe have just uploaded the next Mind Map in our CEH series of Mind Maps.

This is the Mind Map covering Module 6 of the Certified Ethical Hacker, Trojans and BackDoors.

In This Mind Map we cover what Trojans are, how they propagate and also the most common types of Trojans that make up part of the CEH syllabus.

Trojans are a key topic to understand as part of your CEH study or general security knowledge. They have been a major issue in the security arena for quite a few years and have caused a lot of financial security breaches as well as mischief on industry.

Follow this link to download the Mind Map and please comment on this post to let me know any suggestions you may have on how to improve these Mind Maps.

Certified Ethical Hacker – Module 5 – System Hacking Mind Map

Here is the fifth Mind Map in the Certified Ethical Hacker CEH series from MindCert.com.

This Mind Map covers System Hacking. There are nine sections to this Mind Map.

They are: Remote Password Guessing, Eavesdropping, Denial of Service, Privilege Escalation, Keystroke Loggers,  Password Cracking, Covering Tracks,  Remote Control, and Covering Tracks.

This is quite a large Mind Map as you can see and it covers a lot of topics. As normal, the subjects are covered and then associated tools are provided complete with links that show where to download the tools from. All of the tools are what are in the CEH syllabus and I would recomend you looking at each one of these tools in order to ensure you know what they do, and how they do it.

The CEH exam has a large focus on the tools you use so take advantage of these links and install the tools to play with. You cannot beat first hand experience.

As always, please feed back comments about the Mind Map and follow this link to download it.

    Certified Ethical Hacker – Module 4 – Enumeration Mind Map

    Here is the fourth Mind Map in the Certified Ethical Hacker CEH series of Mind Maps aimed to help you pass the exam by improving your study retention, a lot more than practice questions do.

    This Mind Map covers Enumeration, which is the fourth module in the CEH. Enumeration is where you use active connections to identify resources on a given host. These resources may be network resources, users and groups, as well as applications and banners.

    This Mind Map covers the main forms of Enumeration such as NetBIOS EnumerationNull Session Enumeration, SNMP Enumeration as well as Active Directory Enumeration. Sample tools that can be used to Enumerate in each instance are also provided.

    As always, I hope you enjoy this Mind Map and please comment to let me know your thoughts as you are all rather slow at letting me know if this work is appreciated.

    Proceed to download the Mind Map on Enumeration for the Certified Ethical Hacker.

    Certified Ethical Hacker – Module 3 – Scanning Mind Map

    Mind Map CEH ScanningI am pleased to bring you the next Mind Map for the Certified Ethical Hacker.

    This Mind Map covers module 3 of the CEH curriculum. This is Scanning. This Mind Map and module covers the detection of live systems on a network as well as the detection of services on those systems. This is also known as port scanning, and one of the best port scanning tools is Nmap. Nmap is covered in depth within this Mind Map along with the command line options for performing different scans with it. As well as Nmap, other port scanning tools are reviewed as well as direct links to download them.

    As always, I hope you enjoy this Mind Map and please comment to let me know your thoughts as you are all rather slow at letting me know if this work is appreciated.

    Proceed to download the Mind Map on Scanning for the Certified Ethical Hacker.

    Certified Ethical Hacker – Module 2 – Footprinting Mind Map

    Hacking FootprintingI am happy to provide the second Mind Map for the Certified Ethical Hacker (CEH).

    The second Mind Map from MindCert.com covers Footprinting. Footprinting is the initial reconnaissance that a hacker carries out in order to gleam information about the target of evaluation.

    The type of information that is obtained through footprinting is normally in the public domain so this is classed as passive reconnaissance as you do not have to do anything active, against the target of evaluation at this point.

    I hope you find this Mind Map useful, there are a lot more to come.

    The Mind Map can be DOWNLOADED HERE

    Certified Ethical Hacker – Module 1 – Ethical Hacking Mind Map

    In an earlier post today, I provided a review of the Certified Ethical Hacker certification from the EC-Council.

    Well, as promised, I am starting to convert my Mind Maps to the Mind Cert format and this is my first one.

    This Mind Map covers module 1 from the Certified Ethical Hacker exam blueprint. Module 1 is titled Ethical Hacking and it covers the terminology used to represent Ethical Hackers.

    I would love to hear your viewpoints on the CEH and how many of you have passed the exam so please comment. Also, if you have any comments regarding my Mind Maps, suggestions for improvements, or requests for Mind Maps then be sure to let me know.

    The Mind Map can be downloaded HERE.