The Ethical Hacking Associate certification demonstrates an individual’s knowledge in information security and network security, including the tools and methodologies of a malicious hacker, but in a lawful and legitimate manner. This credential certifies individuals at an entrylevel of network security discipline of ethical hacking from a vendorneutral perspective.
ETHICAL HACKING ASSOCIATE EXAM OBJECTIVES
A. Threat Analysis
- Apply procedural concepts necessary to identify attackers through threat modeling
- Interpret incoming and outgoing data to determine authorized and unauthorized usage
- Apply procedural concepts necessary to identify vulnerabilities in information systems
- Apply procedural concepts necessary to conduct risk assessments for networks and information-based systems
- Given a scenario, determine the appropriate encryption and decryption methods
- Apply procedural concepts necessary to find and contain malware and viruses
B. Auditing, Documentation, and Logs
- Interpret current laws and regulations to provide updates to organizational security policies
- Given a scenario, determine the appropriate method to assist with new software development and end user testing
- Troubleshoot various security products and systems to validate their functions
C. Operate, Maintain, and Install
- Given a s scenario, determine the appropriate method to implement security protocols and management for popular operating systems
- Given a scenario, determine how to defend against different types of attacks
- Apply procedural concepts necessary to configure security systems and validate the security
D. Infrastructure and Deployment
- Determine the appropriate method to conduct penetration tests to assess weaknesses and vulnerabilities
- Given a scenario, analyze network security breaches
- Apply procedural concepts necessary to conduct different types of social engineering
E. Identification, Authentication, and Authorization
- Apply procedural concepts necessary to identify different methods of identification, authentication and authorization
- Apply procedural concepts necessary to identify the appropriate placement of biometric devices
F. Cryptography
- Identify different types of cryptography
- Given a scenario, determine the appropriate cryptography
Learn more at: www.certiport.com/EC-Council.
No comments:
Post a Comment