5 phases of hacking CEH V10 vs V11
-
Hi, am taking the CEH v11 course / started yesterday and have a question about the 5 phases. It is listed in the course as being this:
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining access
- Covering Tracks
but some V11 books state the update is - Reconnaissance
- Gaining Access
- Enumeration
- Maintaining Access
- Covering tracks
Can someone confirm what the correct def is for V11 ?
Thanks for your help with this
-
@Dave-Bright
I noticed the same thing for Threat Modeling and wondering what would be the relevant info for the CEH V11.Threat modeling 5 steps in the Course shows:
1)Identify the security objectives
2)Application Overview
3)Decompose the Application
4)Identify Threats
5)Identify the VulnerabilitiesThe EC-Council website shows like this, 6 steps:
https://www.eccouncil.org/threat-modeling/
1)Identify the assets
2)Outline the architecture
3)Breakdown the application
4)Identify threats
5)Classify and structure threats
6)Rate the severity of threatsThe two models are very close but as stated in the video these are worth knowing in order.
Thanks for your time
-
Hey @Dave-Bright
The way I've interpreted the information available to me, the information presented in the course should be accurate with regards to the CEH exam.
Cheers,
Daniel -
Sounds good, thanks