ECCouncil 312-50V8
Certified Ethical Hacker v8
Free Questions in OTE format
Notification about new ECCouncil 312-50V8 files
Subscribe to ECCouncil 312-50V8 dump here, you will be informed about new OTE files.
Subscribe
About ECCouncil 312-50V8 dump
- Background 4%
- networking technologies (e.g., hardware, infrastructure)
- webtechnologies (e.g., web 2.0, skype)
- systems technologies
- communication protocols
- malware operations
- mobile technologies (e.g., smart phones)
- telecommunication technologies
- backups and archiving (e.g., local, network)
- Analysis/Assessment 13%
- data analysis
- systems analysis
- risk assessments
- technical assessment methods
- Security 25%
- systems security controls
- application/fileserver
- firewalls
- cryptography
- network security
- physical security
- threat modeling
- verification procedures (e.g.,false positive/negative validation)
- social engineering (human factors manipulation)
- vulnerability scanners
- security policy implications
- privacy/confidentiality (with regard to engagement)
- biometrics
- wireless access technology (e.g., networking, RFID, Blue tooth)
- trusted networks
- vulnerabilities
- Tools/Systems/Programs 32%
- network/host based intrusion
- network/wireless sniffers (e.g., WireShark, Airsnort)
- access control mechanisms (e.g., smart cards)
- cryptography techniques (e.g., IPsec, SSL, PGP)
- programming languages (e.g. C++, Java, C#, C)
- scripting languages (e.g., PHP, Java script)
- boundary protection appliances (e.g., DMZ)
- network topologies
- subnetting
- port scanning (e.g., NMAP)
- domain name system (DNS)
- routers/modems/switches
- vulnerability scanner (e.g., Nessus, Retina)
- vulnerability management and protection systems (e.g., Foundstone, Ecora)
- operating environments (e.g., Linux, Windows, Mac)
- antivirus systems and programs
- log analysis tools
- security models
- exploitation tools
- database structures
- Procedures/Methodology 20%
- cryptography
- public key infrastructure (PKI)
- Security Architecture (SA)
- Service Oriented Architecture (SOA)
- information security incident management
- N-tier application design
- TCP/IP networking (e.g., network routing)
- security testing methodology
- Regulation/Policy 4%
- security policies
- compliance regulations (e.g., PCI)
- Ethics 2%
- professional code of conduct
- appropriateness of hacking activities