Category Archives: Mind Maps

Mind Maps on various technologies

Certified Ethical Hacker – Module 5 – System Hacking Mind Map

Here is the fifth Mind Map in the Certified Ethical Hacker CEH series from MindCert.com.

This Mind Map covers System Hacking. There are nine sections to this Mind Map.

They are: Remote Password Guessing, Eavesdropping, Denial of Service, Privilege Escalation, Keystroke Loggers,  Password Cracking, Covering Tracks,  Remote Control, and Covering Tracks.

This is quite a large Mind Map as you can see and it covers a lot of topics. As normal, the subjects are covered and then associated tools are provided complete with links that show where to download the tools from. All of the tools are what are in the CEH syllabus and I would recomend you looking at each one of these tools in order to ensure you know what they do, and how they do it.

The CEH exam has a large focus on the tools you use so take advantage of these links and install the tools to play with. You cannot beat first hand experience.

As always, please feed back comments about the Mind Map and follow this link to download it.

    Certified Ethical Hacker – Module 4 – Enumeration Mind Map

    Here is the fourth Mind Map in the Certified Ethical Hacker CEH series of Mind Maps aimed to help you pass the exam by improving your study retention, a lot more than practice questions do.

    This Mind Map covers Enumeration, which is the fourth module in the CEH. Enumeration is where you use active connections to identify resources on a given host. These resources may be network resources, users and groups, as well as applications and banners.

    This Mind Map covers the main forms of Enumeration such as NetBIOS EnumerationNull Session Enumeration, SNMP Enumeration as well as Active Directory Enumeration. Sample tools that can be used to Enumerate in each instance are also provided.

    As always, I hope you enjoy this Mind Map and please comment to let me know your thoughts as you are all rather slow at letting me know if this work is appreciated.

    Proceed to download the Mind Map on Enumeration for the Certified Ethical Hacker.

    CISSP Mind Map – Physical Security

    CISSP Physical SecurityI am happy to bring you the fourth Mind Map that covers the CISSP Certification. We have already brought you the Mind Map for BCP, Access Control Systems, and Application Development.

    This Mind Map covers the Physical Security Domain out of the Common Body of Knowledge. Yep, this is the famous domain that everybody jokes about when studying for the CISSP. Guard Dogs, Security Guards, Security Lighting, it is all in this domain.

    When taking the test, this domain was real easy. Just remember the values that are depicted in the Mind Map as well as the pros and cons of each type of Physical control and I am sure you will do just fine.

    I have another six Mind Maps to do and I am just spacing them out, would love to hear some feedback. Lots of people download my Mind Maps but not many comment. Are they good? Any suggestions for improvements? Any suggestions for other Mind Maps? Anyway, until next time..

    Please Download and Enjoy this Mind Map.

    Certified Ethical Hacker – Module 3 – Scanning Mind Map

    Mind Map CEH ScanningI am pleased to bring you the next Mind Map for the Certified Ethical Hacker.

    This Mind Map covers module 3 of the CEH curriculum. This is Scanning. This Mind Map and module covers the detection of live systems on a network as well as the detection of services on those systems. This is also known as port scanning, and one of the best port scanning tools is Nmap. Nmap is covered in depth within this Mind Map along with the command line options for performing different scans with it. As well as Nmap, other port scanning tools are reviewed as well as direct links to download them.

    As always, I hope you enjoy this Mind Map and please comment to let me know your thoughts as you are all rather slow at letting me know if this work is appreciated.

    Proceed to download the Mind Map on Scanning for the Certified Ethical Hacker.

    CISSP Mind Map – Business Continuity Planning and Disaster Recovery Planning

    MindCert CISSP BCPThis is the third Mind Map out of ten in the CISSP Series.This Mind Map covers the Business Continuity Planning and Disaster Recover Planning domain on the Common Body of Knowledge (CBK).

    This domain addresses the important of planning for business continuity and or a disaster. The domain covers the type of planning and suggests steps you should take to ensure that roles and responsibilities are allocated to staff members and that everybody knows what the plan is in the event of a disaster to cause the minimum impact to the operational effectiveness of an organization.

    As always, I would love to hear any feedback you have about these Mind Maps or suggestions for improving them.

    The Mind Map can be downloaded HERE.

    Certified Ethical Hacker – Module 2 – Footprinting Mind Map

    Hacking FootprintingI am happy to provide the second Mind Map for the Certified Ethical Hacker (CEH).

    The second Mind Map from MindCert.com covers Footprinting. Footprinting is the initial reconnaissance that a hacker carries out in order to gleam information about the target of evaluation.

    The type of information that is obtained through footprinting is normally in the public domain so this is classed as passive reconnaissance as you do not have to do anything active, against the target of evaluation at this point.

    I hope you find this Mind Map useful, there are a lot more to come.

    The Mind Map can be DOWNLOADED HERE

    CISSP Mind Map – Application and Systems Development

    This is the second Mind Map out of ten in the CISSP Series.

    This Mind Map covers the Application and Systems Development domain on the Common Body of Knowledge (CBK).

    This domain addresses the important security concepts that apply to application software development. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security.

    As always, I would love to hear any feedback you have about these Mind Maps or suggestions for improving them.

    The Mind Map can be downloaded HERE.

    Certified Ethical Hacker – Module 1 – Ethical Hacking Mind Map

    In an earlier post today, I provided a review of the Certified Ethical Hacker certification from the EC-Council.

    Well, as promised, I am starting to convert my Mind Maps to the Mind Cert format and this is my first one.

    This Mind Map covers module 1 from the Certified Ethical Hacker exam blueprint. Module 1 is titled Ethical Hacking and it covers the terminology used to represent Ethical Hackers.

    I would love to hear your viewpoints on the CEH and how many of you have passed the exam so please comment. Also, if you have any comments regarding my Mind Maps, suggestions for improvements, or requests for Mind Maps then be sure to let me know.

    The Mind Map can be downloaded HERE.

    Nmap Mind Map – General Security

    Nmap Mind MapFor those of you who don’t already know, Nmap is one killer application for network security. Commonly known as a port scanner, Nmap will check for the existence of open ports on the given target machines.

    Nmap has a lot more than just simple port scanning techniques and supports all of the common stealth scanning techniques such as the XMAS scan, FIN scan, NULL scan, and the RST scan. This provides a tool that can provides results you can rely upon.

    One other area of use for Nmap is OS detection. Based upon various results, Nmap can quite accurately detect what Operating System the target machine is running.

    I have been using Nmap for about four years and have considerable experience with it. It is a command line tool but it does have a graphical user interface (GUI) for Linux, OS X, and also Windows.

    What I have prepared here, is a Mind Map that provides background information and a refresher about the types of scans Nmap can perform as well as explanations on what command line switches are required in order to run the associated scans.

    You can download the Mind Map HERE.

    Please let me know your thoughts enligneviagra.net.

    CISSP Mind Map – Access Control Systems

    CISSP Access Control SystemsHot on the trail of the last Mind Map, I thought I would quickly add another.

    This Mind Map is for the Certified Information Systems Security Professional (CISSP) examination. The CISSP is broken down into 10 domains which make up the Common Body of Knowledge (CBK).

    The Mind Map here is for the Access Control Systems and Methodology Domain, which is classed as the first domain in the CBK.

    I passed the CISSP using these Mind Maps which I created and have just edited and updated. I also know of a few other people who I have provided these Mind Maps to who have passed the CISSP on the first attempt.

    As before, I would love to hear your feedback on this new Mind Map from MindCert.com.

    The Mind Map can be downloaded HERE.