Description
CEH (Practical) Credential Holders Are Proven To Be Able To: Demonstrate the understanding of attack vectorsPerform network scanning to identify live and vulnerable machines in a network.Perform OS banner grabbing, service, and user enumeration.Perform system hacking, steganography, steganalysis attacks, and cover tracks.Identify and use viruses, computer worms, and malware to exploit systems. Perform packet sniffing.Conduct a variety of web server and web application attacks including directory traversal, parameter tampering, XSS, etc.Perform SQL injection attacks.Perform different types of cryptography attacks.Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems etc.