• Tidak ada hasil yang ditemukan

CEHv6 Module 00 Student Introduction pdf pdf

N/A
N/A
Protected

Academic year: 2019

Membagikan "CEHv6 Module 00 Student Introduction pdf pdf"

Copied!
23
0
0

Teks penuh

(1)
(2)
(3)

In troduction s

~ Nam e

~ Nam e

~ Com pan y Affiliation

~ Title / Fun ction

~ J ob Respon sibility

~ System security related experien ce

~ Expectation s

(4)

Course Materials

~ Iden tity Card

~ Studen t Courseware

~ Lab Man ual/ Workbook

C Di

~ Com pact Disc

~ Course Evaluation

~ Referen ce Materials

(5)

Course Outline

~ Module 1: In troduction to Ethical H ackin g

~ Module 2: H ackin g Laws

~ Module 3: Footprin tin g

M d l G l H ki

~ Module 4: Google H acking

~ Module 5: Scanning

~ Module 6: En um eration

~ Module 6: En um eration

~ Module 7: System H acking

~ Module 8 : Trojan s an d Backdoors ~ Module 8 : Trojan s an d Backdoors

~ Module 9: Viruses an d Worm s

(6)

Course Outlin e (con td.)

~ Module 11: Social En gin eerin g

M d l Phi hi

~ Module 12: Phishin g

~ Module 13: H ackin g Em ail Accoun ts

~ Module 14: Den ial-of-Service4

~ Module 15: Session H ijackin g

~ Module 16: H ackin g Web Servers

~ Module 17: Web Application Vuln erabilities

~ Module 18 : Web-Based Password Crackin g Techn iques

~ Module 19: SQL In jection

~ Module 19: SQL In jection

~ Module 20 : H ackin g Wireless Networks

~ Module 21: Physical Security

(7)

Course Outlin e (con td.)

~ Module 23: Evadin g IDS, Firewalls an d Detectin g H on ey Pots

~ Module 24: Buffer Overflows

~ Module 25: Cryptography

~ Module 26: Pen etration Testin g

~ Module 27: Covert H ackin g

~ Module 28 : Writin g Virus Codes

~ Module 29: Assem bly Lan guage Tutorial

~ Module 30 : Exploit Writin gModule 31: Sm ashin g the Stack for Fun an d Profit

~ Module 32: Win dows Based Buffer Overflow Exploit Writin g

(8)

Course Outlin e (con td.)

~ Module 34: MAC OS X H ackin g

~ Module 35: H ackin g Routers, cable Modem s an d Firewalls

~ Module 36: H ackin g Mobile Phon es, PDA an d H an dheld Devices

~ Module 37: Bluetooth H ackin g

~ Module 38 : VoIP H ackin g

~ Module 39: RFID H ackin g

~ Module 40 : Spam m in g

~ Module 41: H ackin g USB Devices

~ Module 42: H ackin g Database Servers

(9)

~ Module 44: In tern et Con ten t Filterin g Techn iques

~ Module 45: Privacy on the In tern et

~ Module 46: Securin g Laptop Com puters

~ Module 47: Spyin g Techn ologies

~ Module 47: Spyin g Techn ologies

~ Module 48 : Corporate Espion age- H ackin g Usin g In siders

~ Module 49: Creatin g Security Policies

~ Module 49: Creatin g Security Policies

~ Module 50 : Software Piracy an d Warez

~ Module 51: H ackin g an d Cheatin g On lin e Gam es

~ Module 52: H ackin g RSS an d Atom

~ Module 53: H ackin g Web Browsers (Firefox, IE)

(10)

~ Module 55: Data Loss Preven tion

~ M d l 56 H ki Gl b l P iti i S t (GPS)

~ Module 56: H ackin g Global Position in g System (GPS)

~ Module 57: Com puter Foren sics an d In ciden t H an dlin g

~ Module 58 : Credit Card Frauds

~ Module 59: H ow to Steal Passwords

~ Module 60 : Firewall Techn ologies

~ Module 61: Threats an d Coun term easures

~ Module 61: Threats an d Coun term easures

~ Module 62: Case Studies

~ Module 63: Botn ets

~ Module 64: Econ om ic Espion age

~ Module 65: Patch Man agem en t

~ Module 66: Security Con vergen ce

~ Module 66: Security Con vergen ce

(11)

Self Study Modules

~ CEH v6 Curriculum con sists of In structor Led Train in g an d Self Study

an d Self Study

~ The In structor will cover Modules 1 – 25 in the classroom

~ The self study Modules 26 to 67 an d Modules 11,12,13 an d 21 will n ot be covered in the classroom an d the studen t n eeds to study these on their own

studen t n eeds to study these on their own

~ Your in structor will provide details of addition al m odules m arked for self-study (if an y)

(12)

EC-Counci l

Certification Program

There are several levels of certification tracks un der EC-Counci l Accreditation

b d body:

1. Certified e-Busin ess Associate

2. Certified e-Busin ess Profession al

3. Certified e-Busin ess Con sultan t

4. E++ Certified Techn ical Con sultan t

5 Ce rtifie d Eth ic a l H a cke r ( CEH ) ÅY o u a r e h e r e

5 . Ce rtifie d Eth ic a l H a cke r ( CEH ) ÅY o u a r e h e r e

6. Com puter H ackin g Foren sic In vestigator (CH FI)

7. EC-Coun cil Certified Security An alyst (ECSA)

8 . EC-Coun cil Certified Secure Program m er (ECSA)

9. Certified Secure Application Developer (CSAD)

10 . Licen sed Pen etration Tester (LPT)

(13)
(14)

CEH v6 Exam In form ation

~ Exam Title: Ethical H ackin g an d Coun term easures v6

~ Exam code: 312-50 / EC0 -350

~ No. of Question s: 150

~ Duration : 4 hours

~ Availability: Prom etric Prim e/ Prom etric APTC/ VUE

P i %

~ Passing score: 70 %

~ The in structor will tell you about the exam schedule / exam voucher details for your train in g

exam voucher details for your train in g

(15)

Studen t Facilities

Class H ours

B ildi H Ph

Class H ours

Building H ours Phon es

k

Parkin g Messages

Restroom s Sm okin g

(16)

Lab Session s

~ Lab Session s are design ed to rein force the classroom session s

~ The session s are in ten ded to give h d i l d a han ds on experien ce on ly an d does n ot guaran tee proficien cy

(17)

What does CEH teach you?

Den ial of Service, Trojan s, Worm s, Virus, Social En gin eerin g, Password crackin g, S i H ij ki S t f il S

Eth ica l H a ckin g

B d G

Session H ijackin g, System failure, Spam , Phishing, Identity theft, Wardriving, warchalkin g, bluejackin g Lock pickin g,

Buffer Overflow, System hackin g, S iffi SQL I j ti

Ba d Gu y Sn iffin g, SQL In jection …..

Th is is W h a t

(18)

What CEH is NOT?

~

CEH class is NOT a

N e tw o rk S e cu rity

train in g

program

• Please atten d EC-Coun cil’s ENSA class for that

~

CEH class is NOT a

S e cu rity An a lys is

train in g

~

CEH class is NOT a

S e cu rity An a lys is

train in g

program

• Please atten d EC-Coun cil’s ECSA class for that

~

CEH class is NOT a

S e cu rity Te s tin g

train in g

program

l d C C il’ l f h

• Please atten d EC-Coun cil’s LPT class for that

(19)

Rem em ber This!

The CEH Program

The CEH Program

Teaches you 10 0 %

Teaches you 10 0 %

N e tw o rk Offe n s ive

N e tw o rk Offe n s ive

Train ing an d n ot

g

(20)

CEH Class Speed

~ The CEH class is e xtre m e ly fa s t p a ce d ~ The class “speed” can be com pared to the

clim ax scen e from the m ovie Mission Im possible (Bullet train sequen ce)

~ There are ton s of hackin g tools an d hackin g techn ologies covered in the curriculum

~ The in structor W ILL N OT be able to

~ The in structor W ILL N OT be able to dem on strate ALL the tools in this class

~ H e will showcase on ly s e le cte d to o ls

(21)

Live H ackin g Website

~Please target your exercises for “Live exercises for Live H ackin g” to

www.certifiedhacker.com

~This website is m ean t for the studen ts to try the tools on live targetg

(22)

NDA Docum en t

~

Please read the con ten ts of the

id d EC C

il’ CEH

provided EC-Coun cil’s CEH

NDA docum en t

~

Sign this docum en t an d han d

~

Sign this docum en t an d han d

it over to the in structor

~

We will NOT start the class

~

We will NOT start the class

un less you

s ign

this docum en t

~

Please approach the in structor

~

Please approach the in structor

(23)

Lets Start

Lets Start

H

ki

!

Referensi

Dokumen terkait

[r]

dari jari-jari yang dimiliki unsur- unsurnya, dapat kita lihat bahwa pada perioda ke 4 ini, jari-jari atom pada unsur transisi pada perioda ke 4 semakin ke

Dalam pembuatan konsep event, sebuah event organizer harus bisa mempunyai konsep yang berbeda atau konsep yang belum pernah terpikirkan oleh event organizer lain

informasi, pikiran dan sikap tertentu antara dua orang atau lebih yang terjadi pergantian pesan baik sebagai komunikan maupun komunikator dengan tujuan untuk mencapai

Untuk mengetahui potensi hipolipidemik PLA umbi gembili yang diekstrak langsung dengan akuades (PLAc) dan PLA umbi gembili yang diekstrak melalui proses deproteinasi

Keyakinan yang paling dalam atau asumsi-asumsi yang tersembunyi “adanya keyakinan bahwa atasan tidak pernah salah-anak buah selalu salah atau konsumen adalah raja.... Tiga

[r]

Persamaan regresi pada tabel 1 memperlihatkan koefisien Debt to Equity Ratio sebesar 5,088, angka menunjukkan jika Debt to Equity Ratio naik sebesar 1 kali maka Dividen