Nothing Special   »   [go: up one dir, main page]

CEHv11-Course-Outline Split 14

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker

Course Outline

o Botnet Trojans
o Rootkit Trojans
o E-banking Trojans
 Working of E-banking Trojans
 E-banking Trojan: Dreambot
o Point-of-Sale Trojans
o Defacement Trojans
o Service Protocol Trojans
o Mobile Trojans
o IoT Trojans
o Other Trojans
 How to Infect Systems Using a Trojan
o Creating a Trojan
o Employing a Dropper or Downloader
o Employing a Wrapper
o Employing a Crypter
o Propagating and Deploying a Trojan
o Exploit Kits
Virus and Worm Concepts
 Introduction to Viruses
 Stages of Virus Lifecycle
 Working of Viruses
o How does a Computer Get Infected by Viruses?
 Types of Viruses
o System and File Viruses
o Multipartite and Macro Viruses
o Cluster and Stealth Viruses
o Encryption and Sparse Infector Viruses
o Polymorphic Viruses
o Metamorphic Viruses
o Overwriting File or Cavity Viruses

Page | 14 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like