Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading content…
Loading…
Transcript

CEH

CERTIFIED ETHICAL HACKER

©2021 SiemHunters

Topic

Introduction

Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

©2021 SiemHunters

OBJECTIVES

Module 01 - Introduction to Ethical Hacking

lesson1 - Information Security Overview

lesson2 - Information Security Threats and Attack Vectors

lesson3 - Hacking Concepts

lesson4 - Ethical Hacking Concepts

lesson5 - Information Security Controls -- part 1

lesson5 - Information Security Controls -- part 2

lesson6 - Penetration Testing Concepts

lesson7 - Information Security Laws and Standards

©2021 SiemHunters

OBJECTIVES

Module 02 - Footprinting and Reconnaissance

lesson1 - Footprinting Concepts

lesson2 - Footprinting through Search Engines

lesson3 - Footprinting through Web Services

lesson4 - Footprinting through Social Networking Sites

lesson5 - Website Footprinting

lesson6 - Email Footprinting

lesson7 - Competitive Intelligence

lesson8 - Whois Footprinting

lesson9 - DNS Footprinting

lesson10 - Network Footprinting

lesson11 - Footprinting through Social Engineering

lesson12 - Footprinting Tools

lesson13 - Footprinting Countermeasures

lesson14 - Footprinting Penetration Testing

©2021 SiemHunters

OBJECTIVES

Module 03 - Scanning Networks

lesson1 - Network Scanning Concepts

lesson2 - Scanning Tools

lesson3 - Scanning Techniques part 1

lesson3 - Scanning Techniques part 2

lesson4 - Scanning Beyond IDS and Firewall part 1

lesson4 - Scanning Beyond IDS and Firewall part 2

lesson5 - Banner Grabbing

lesson6 - Draw Network Diagrams

lesson7 - Scanning Pen Testing

©2021 SiemHunters

OBJECTIVES

Module 4 - Enumeration

lesson1 - Enumeration Concepts

lesson2 - NetBIOS Enumeration

lesson3 - SNMP Enumeration

lesson4 - LDAP Enumeration

lesson5 - NTP Enumeration

lesson6 - SMTP and DNS Enumeration

lesson7 - Other Enumeration Techniques

lesson8 - Enumeration Countermeasures

lesson9 - Enumeration Pen Testing

©2021 SiemHunters

OBJECTIVES

Module 5 - Vulnerability Analysis

lesson1 - Vulnerability Assessment Concepts

lesson2 - Vulnerability Assessment Solutions

lesson3 - Vulnerability Scoring Systems

lesson4 - Vulnerability Assessment Tools

lesson5 - Vulnerability Assessment Reports

working with nessus

working with nikto

©2021 SiemHunters

OBJECTIVES

Module 6 - System Hacking

lesson1 - System Hacking Concepts

lesson2 - Cracking Passwords part 1

lesson2 - Cracking Passwords part 2

lesson2 - Cracking Passwords part 3

lesson3 - Escalating Privileges

lesson4 - Executing Applications

lesson5 - Hiding Files part 1

lesson5 - Hiding Files part 2

lesson5 - Hiding Files part 3

lesson6 - Covering Tracks

lesson7 - Penetration Testing

©2021 SiemHunters

Topic

Potential Risks of Using rm Command

  • While the 'rm' command is a powerful tool for deleting files and directories.

  • To mitigate these risks, it is important to always double-check the command before executing it and to use caution when using wildcards or the '-r' option.

©2021 SiemHunters

Alternatives to rm Command

  • If you are concerned about the risks associated with the 'rm' command.

  • Another option is to use the 'trash-cli' package, which moves deleted files to a trash bin that can be emptied at a later time.

©2021 SiemHunters

Conclusion

  • The 'rm' command is a powerful tool for deleting files and directories in Linux, but it should be used with caution.

  • By understanding the basic and advanced usage of the 'rm' command, you can effectively manage your files and directories in Linux while minimizing the potential for accidental deletions.

©2021 SiemHunters

Topic

Learn more about creating dynamic, engaging presentations with Prezi