Friday, May 21, 2021

Materi Sertifikasi : Ethical Hacking Associate (EHA) Certification Exam Objectives



The Ethical Hacking Associate certification demonstrates an individual’s knowledge in information security and network security, including the tools and methodologies of a malicious hacker, but in a lawful and legitimate manner. This credential certifies individuals at an entrylevel of network security discipline of ethical hacking from a vendorneutral perspective.

ETHICAL HACKING ASSOCIATE EXAM OBJECTIVES

A. Threat Analysis

  1. Apply procedural concepts necessary to identify attackers through threat modeling
  2. Interpret incoming and outgoing data to determine authorized and unauthorized usage
  3. Apply procedural concepts necessary to identify vulnerabilities in information systems
  4. Apply procedural concepts necessary to conduct risk assessments for networks and information-based systems
  5. Given a scenario, determine the appropriate encryption and decryption methods
  6. Apply procedural concepts necessary to find and contain malware and viruses

B. Auditing, Documentation, and Logs

  1. Interpret current laws and regulations to provide updates to organizational security policies
  2. Given a scenario, determine the appropriate method to assist with new software development and end user testing
  3. Troubleshoot various security products and systems to validate their functions

C. Operate, Maintain, and Install

  1. Given a s scenario, determine the appropriate method to implement security protocols and management for popular operating systems
  2. Given a scenario, determine how to defend against different types of attacks
  3. Apply procedural concepts necessary to configure security systems and validate the security

D. Infrastructure and Deployment

  1. Determine the appropriate method to conduct penetration tests to assess weaknesses and vulnerabilities
  2. Given a scenario, analyze network security breaches
  3. Apply procedural concepts necessary to conduct different types of social engineering

E. Identification, Authentication, and Authorization

  1. Apply procedural concepts necessary to identify different methods of identification, authentication and authorization
  2. Apply procedural concepts necessary to identify the appropriate placement of biometric devices

F. Cryptography

  1. Identify different types of cryptography
  2. Given a scenario, determine the appropriate cryptography

Learn more at: www.certiport.com/EC-Council.

No comments:

Post a Comment