uCertify is a preparation kit software provider for IT certification exams. This perpkit is for those who are looking for Certified Ethical Hacker version 7 examination. V7 is the latest version of CEH certification from EC-Council. I was asked by uCertify to test one of their PrepKits, and I chose their prep kit for EC-Council's Certified Ethical Hacker certification exam: E312-50. The PrepKit is very good and covers each and every objective as defined by main EC-Council vendor. As soon as you open the PrepKit you will get a very good user interface which defines each and every topic in a very specified manner. You can also try it online or use the full version online.
Major Topics covered in this PrepKit :
1. Introduction to Ethical Hacking
Gain knowledge on various hacking terminologies, learn the basic elements of information security, Understand the security, functionality and ease of use triangle, know the 5 stages of ethical hacking
Understand the different types and implications of hacker attacks, understand hactivism and understand the classification of hackers, learn the different ways an ethical hacker tests a target network, Understand penetration testing and the various methodologies used.
2. Footprinting and Reconnaissance
Understand the term Footprinting
Understand how traceroute is used in footprinting
Google Hacking, website mirroring, email tracking
3. Scanning Networks
Understand the term port scanning, network scanning andvulnerability scanning
Learn the system hacking cycle, understand enumeration andits techniques
Understand null sessions and its countermeasures
Understand SNMP enumeration and its countermeasures, describe the steps involved in performing enumeration
5. System Hacking
Understand the different types of passwords, password attacks, and password cracking techniques
Authentication mechanism, password sniffing, various password cracking tools, and countermeasures
Understand privilege escalation, gain insights on key loggersand other spyware technologies, learn how to defend against spyware
Identify different ways to hide files, understanding rootkits, learn how to identify rootkits and steps involved, understand alternate data streams
Understand Steganography technologies and tools used
Understand covering tracks, tools used and erase evidences
When you open the Prepkit it will show you this screen.
You can click between any of the 5 links to Learn, Practice, Do Assignments, Track analytics or discuss it. On clicking the Learn tab, you will get notes for all the topics are sorted in very good manner.
On clicking the Practice tab, you can get 5 Practice Tests containing a total of 893 questions. You can check your performance by practicing it. You can also easily track your performance:
You will get these types of questions in Practice Tests:
All this is backed by their 100% money back guarantee, which says that if you fail in the exams, they are going to refund your money without any questions. This is remarkable as you have no risk in trying it.
You can visit www.ucertify.com to see the full list of their PrepKits. My blog readers will get a 10% discount by using their coupon code 'RHA'.
Mikko Hyppönen is a famous cyber security expert andcolumnist.He is currently working at F-Secure as Chief Research Officer .Hypponen has delivered several high profile talks on various platforms including TED .In one of his TEDx talks he pointed out three types online attacks and why we should worry about them.
According to Mike Hypponen,the volume of online crime is increasing day by day ,and in future, majority of crime will be in cyber world rather than real world.Online crime is carried out by computer geniuses not dumb thieves of real world.These attacks are organized and planned by smartest people.Security institutions are far behind in this race.
He pointed out three types of online attacks :
The first category is online criminals .These are the guys operating with a very clear objective of making money.They use trojans and keyloggers to steal money from banks ,credit cardsand websites.
Their presence is grossly underestimated ,no one can estimate how many of them are operating these days.But one thing is for sure,they make millions out of internet.Few months ago,US intelligence agencies froze a bank account of such criminal name Sam Jain.The authorities found out that his account in Switzerland had $14.9 m already and money was added to it time to time.The account is freezed now ,but Mr. Sam Jain himself is on the loose.
2)Hackivists -Hacking Activists
This term sprang on blogging and IRC networks after the rise of groups like Anonymous and LulzSec .These groups are not motivated by money ,they are driven by an opinion or protest.They usually attack state owned properties and institutions and get their protests visibility in the press.
Last category is quite unanticipated .Today Governments are involved in launching attacks against other Governments.Most surprisingly they are also using technology against their own people. Hypponen described how a laser printer can be used to track what content citizens are printing .
Apparently printer is not connected to any sort of network ,andit seems that when you buy one,there is no connection between you and company.But the truth is ,every printer is unique andhence identifiable
Whenever a printer prints a page,it leaves an exclusive pattern of tiny yellow dots which are specific for that printer.These dots are barely visible by naked eye.This pattern can be used by experts to tell from which printer a paper is printed.Hence a printer can tracked ,so can be the user.