In troduction s
~ Nam e
~ Nam e
~ Com pan y Affiliation
~ Title / Fun ction
~ J ob Respon sibility
~ System security related experien ce
~ Expectation s
Course Materials
~ Iden tity Card
~ Studen t Courseware
~ Lab Man ual/ Workbook
C Di
~ Com pact Disc
~ Course Evaluation
~ Referen ce Materials
Course Outline
~ Module 1: In troduction to Ethical H ackin g
~ Module 2: H ackin g Laws
~ Module 3: Footprin tin g
M d l G l H ki
~ Module 4: Google H acking
~ Module 5: Scanning
~ Module 6: En um eration
~ Module 6: En um eration
~ Module 7: System H acking
~ Module 8 : Trojan s an d Backdoors ~ Module 8 : Trojan s an d Backdoors
~ Module 9: Viruses an d Worm s
Course Outlin e (con td.)
~ Module 11: Social En gin eerin g
M d l Phi hi
~ Module 12: Phishin g
~ Module 13: H ackin g Em ail Accoun ts
~ Module 14: Den ial-of-Service4
~ Module 15: Session H ijackin g
~ Module 16: H ackin g Web Servers
~ Module 17: Web Application Vuln erabilities
~ Module 18 : Web-Based Password Crackin g Techn iques
~ Module 19: SQL In jection
~ Module 19: SQL In jection
~ Module 20 : H ackin g Wireless Networks
~ Module 21: Physical Security
Course Outlin e (con td.)
~ Module 23: Evadin g IDS, Firewalls an d Detectin g H on ey Pots
~ Module 24: Buffer Overflows
~ Module 25: Cryptography
~ Module 26: Pen etration Testin g
~ Module 27: Covert H ackin g
~ Module 28 : Writin g Virus Codes
~ Module 29: Assem bly Lan guage Tutorial
~ Module 30 : Exploit Writin gModule 31: Sm ashin g the Stack for Fun an d Profit
~ Module 32: Win dows Based Buffer Overflow Exploit Writin g
Course Outlin e (con td.)
~ Module 34: MAC OS X H ackin g
~ Module 35: H ackin g Routers, cable Modem s an d Firewalls
~ Module 36: H ackin g Mobile Phon es, PDA an d H an dheld Devices
~ Module 37: Bluetooth H ackin g
~ Module 38 : VoIP H ackin g
~ Module 39: RFID H ackin g
~ Module 40 : Spam m in g
~ Module 41: H ackin g USB Devices
~ Module 42: H ackin g Database Servers
~ Module 44: In tern et Con ten t Filterin g Techn iques
~ Module 45: Privacy on the In tern et
~ Module 46: Securin g Laptop Com puters
~ Module 47: Spyin g Techn ologies
~ Module 47: Spyin g Techn ologies
~ Module 48 : Corporate Espion age- H ackin g Usin g In siders
~ Module 49: Creatin g Security Policies
~ Module 49: Creatin g Security Policies
~ Module 50 : Software Piracy an d Warez
~ Module 51: H ackin g an d Cheatin g On lin e Gam es
~ Module 52: H ackin g RSS an d Atom
~ Module 53: H ackin g Web Browsers (Firefox, IE)
~ Module 55: Data Loss Preven tion
~ M d l 56 H ki Gl b l P iti i S t (GPS)
~ Module 56: H ackin g Global Position in g System (GPS)
~ Module 57: Com puter Foren sics an d In ciden t H an dlin g
~ Module 58 : Credit Card Frauds
~ Module 59: H ow to Steal Passwords
~ Module 60 : Firewall Techn ologies
~ Module 61: Threats an d Coun term easures
~ Module 61: Threats an d Coun term easures
~ Module 62: Case Studies
~ Module 63: Botn ets
~ Module 64: Econ om ic Espion age
~ Module 65: Patch Man agem en t
~ Module 66: Security Con vergen ce
~ Module 66: Security Con vergen ce
Self Study Modules
~ CEH v6 Curriculum con sists of In structor Led Train in g an d Self Study
an d Self Study
~ The In structor will cover Modules 1 – 25 in the classroom
~ The self study Modules 26 to 67 an d Modules 11,12,13 an d 21 will n ot be covered in the classroom an d the studen t n eeds to study these on their own
studen t n eeds to study these on their own
~ Your in structor will provide details of addition al m odules m arked for self-study (if an y)
EC-Counci l
Certification Program
There are several levels of certification tracks un der EC-Counci l Accreditation
b d body:
1. Certified e-Busin ess Associate
2. Certified e-Busin ess Profession al
3. Certified e-Busin ess Con sultan t
4. E++ Certified Techn ical Con sultan t
5 Ce rtifie d Eth ic a l H a cke r ( CEH ) ÅY o u a r e h e r e
5 . Ce rtifie d Eth ic a l H a cke r ( CEH ) ÅY o u a r e h e r e
6. Com puter H ackin g Foren sic In vestigator (CH FI)
7. EC-Coun cil Certified Security An alyst (ECSA)
8 . EC-Coun cil Certified Secure Program m er (ECSA)
9. Certified Secure Application Developer (CSAD)
10 . Licen sed Pen etration Tester (LPT)
CEH v6 Exam In form ation
~ Exam Title: Ethical H ackin g an d Coun term easures v6
~ Exam code: 312-50 / EC0 -350
~ No. of Question s: 150
~ Duration : 4 hours
~ Availability: Prom etric Prim e/ Prom etric APTC/ VUE
P i %
~ Passing score: 70 %
~ The in structor will tell you about the exam schedule / exam voucher details for your train in g
exam voucher details for your train in g
Studen t Facilities
Class H ours
B ildi H Ph
Class H ours
Building H ours Phon es
k
Parkin g Messages
Restroom s Sm okin g
Lab Session s
~ Lab Session s are design ed to rein force the classroom session s
~ The session s are in ten ded to give h d i l d a han ds on experien ce on ly an d does n ot guaran tee proficien cy
What does CEH teach you?
Den ial of Service, Trojan s, Worm s, Virus, Social En gin eerin g, Password crackin g, S i H ij ki S t f il S
Eth ica l H a ckin g
B d G
Session H ijackin g, System failure, Spam , Phishing, Identity theft, Wardriving, warchalkin g, bluejackin g Lock pickin g,
Buffer Overflow, System hackin g, S iffi SQL I j ti
Ba d Gu y Sn iffin g, SQL In jection …..
Th is is W h a t
What CEH is NOT?
~
CEH class is NOT a
N e tw o rk S e cu rity
train in g
program
• Please atten d EC-Coun cil’s ENSA class for that
~
CEH class is NOT a
S e cu rity An a lys is
train in g
~
CEH class is NOT a
S e cu rity An a lys is
train in g
program
• Please atten d EC-Coun cil’s ECSA class for that
~
CEH class is NOT a
S e cu rity Te s tin g
train in g
program
l d C C il’ l f h
• Please atten d EC-Coun cil’s LPT class for that
Rem em ber This!
The CEH Program
The CEH Program
Teaches you 10 0 %
Teaches you 10 0 %
N e tw o rk Offe n s ive
N e tw o rk Offe n s ive
Train ing an d n ot
g
CEH Class Speed
~ The CEH class is e xtre m e ly fa s t p a ce d ~ The class “speed” can be com pared to the
clim ax scen e from the m ovie Mission Im possible (Bullet train sequen ce)
~ There are ton s of hackin g tools an d hackin g techn ologies covered in the curriculum
~ The in structor W ILL N OT be able to
~ The in structor W ILL N OT be able to dem on strate ALL the tools in this class
~ H e will showcase on ly s e le cte d to o ls
Live H ackin g Website
~Please target your exercises for “Live exercises for Live H ackin g” to
www.certifiedhacker.com
~This website is m ean t for the studen ts to try the tools on live targetg
NDA Docum en t
~
Please read the con ten ts of the
id d EC C
il’ CEH
provided EC-Coun cil’s CEH
NDA docum en t
~
Sign this docum en t an d han d
~
Sign this docum en t an d han d
it over to the in structor
~
We will NOT start the class
~
We will NOT start the class
un less you
s ign
this docum en t
~