0% found this document useful (0 votes)
75 views1 page

CEHv11-Course-Outline Split 14

Uploaded by

coder
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views1 page

CEHv11-Course-Outline Split 14

Uploaded by

coder
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker

Course Outline

o Botnet Trojans
o Rootkit Trojans
o E-banking Trojans
 Working of E-banking Trojans
 E-banking Trojan: Dreambot
o Point-of-Sale Trojans
o Defacement Trojans
o Service Protocol Trojans
o Mobile Trojans
o IoT Trojans
o Other Trojans
 How to Infect Systems Using a Trojan
o Creating a Trojan
o Employing a Dropper or Downloader
o Employing a Wrapper
o Employing a Crypter
o Propagating and Deploying a Trojan
o Exploit Kits
Virus and Worm Concepts
 Introduction to Viruses
 Stages of Virus Lifecycle
 Working of Viruses
o How does a Computer Get Infected by Viruses?
 Types of Viruses
o System and File Viruses
o Multipartite and Macro Viruses
o Cluster and Stealth Viruses
o Encryption and Sparse Infector Viruses
o Polymorphic Viruses
o Metamorphic Viruses
o Overwriting File or Cavity Viruses

Page | 14 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like