CEHv6 Module 00 Student Introduction pdf pdf
Copyright © by EC-Counci l
g in
n
k
o ti
c
c
a
u d o
H
tr
l
In
a
t
6
6
n
ic n
e d
io i s r
tu
th e
S
V E In troduction s ~ ~ Nam e Nam e ~
Com pan y Affiliation ~
Title / Fun ction ~
J ob Respon sibility ~ System security related experien ce ~ ~ Expectation s Expectation s Copyright © by EC-Counci l Course Materials ~
Iden tity Card
~
Studen t Courseware
~
Lab Man ual/ Workbook C Di
~
Com pact Disc
~
Course Evaluation
~
Referen ce Materials
~
Referen ce Materials
Copyright © by EC-Counci l Course Outline ~
Module 1: In troduction to Ethical H ackin g
~
Module 10 : Sn iffers
~
Module 9: Viruses an d Worm s
~
Module 8 : Trojan s an d Backdoors
~
Module 8 : Trojan s an d Backdoors
~
Module 7: System H acking
Module 6: En um eration
~
~
Module 6: En um eration
~
Module 5: Scanning
~
Module 4: Google H acking
~
Module 3: Footprin tin g M d l G l H ki
~
Module 2: H ackin g Laws
Copyright © by EC-Counci l Course Outlin e (con td.) ~
Module 11: Social En gin eerin g M d l Phi hi ~ Module 12: Phishin g ~
Module 13: H ackin g Em ail Accoun ts ~ Module 14: Den ial-of-Service
4 ~
Module 15: Session H ijackin g ~ Module 16: H ackin g Web Servers ~
Module 17: Web Application Vuln erabilities ~ Module 18 : Web-Based Password Crackin g Techn iques ~
Module 19: SQL In jection ~
Module 19: SQL In jection ~ Module 20 : H ackin g Wireless Networks ~
Module 21: Physical Security Copyright © by EC-Counci l
~ Module 22: Lin ux H ackin g
Course Outlin e (con td.) ~
Module 23: Evadin g IDS, Firewalls an d Detectin g H on ey Pots ~ Module 24: Buffer Overflows ~ Module 25: Cryptography ~ Module 26: Pen etration Testin g ~ Module 27: Covert H ackin g ~ Module 28 : Writin g Virus Codes ~ Module 29: Assem bly Lan guage Tutorial ~ Module 30 : Exploit Writin gModule 31: Sm ashin g the Stack for Fun an d Profit ~ Module 32: Win dows Based Buffer Overflow Exploit Writin g Copyright © by EC-Counci l ~
Module 33: Reverse En gin eerin g
Course Outlin e (con td.) ~
Module 34: MAC OS X H ackin g ~
Module 35: H ackin g Routers, cable Modem s an d Firewalls ~
Module 36: H ackin g Mobile Phon es, PDA an d H an dheld Devices ~
Module 37: Bluetooth H ackin g ~
Module 38 : VoIP H ackin g ~
Module 39: RFID H ackin g ~
Module 40 : Spam m in g ~
Module 41: H ackin g USB Devices ~
Module 42: H ackin g Database Servers Copyright © by EC-Counci l
~ Module 43: Cyber Warfare- H ackin g, Al-Qaida an d Terrorism
~ Module 44: In tern et Con ten t Filterin g Techn iques
~ Module 45: Privacy on the In tern et
~ Module 46: Securin g Laptop Com puters
~ Module 47: Spyin g Techn ologies
~ Module 47: Spyin g Techn ologies
~ Module 48 : Corporate Espion age- H ackin g Usin g In siders
~ Module 49: Creatin g Security Policies
~ Module 49: Creatin g Security Policies
~ Module 50 : Software Piracy an d Warez
~ Module 51: H ackin g an d Cheatin g On lin e Gam es
~ Module 52: H ackin g RSS an d Atom
~ Module 53: H ackin g Web Browsers (Firefox, IE)
Copyright © by EC-Counci l ~
Module 54: Proxy Server Techn ologies
~ Module 55: Data Loss Preven tion
~ Module 62: Case Studies
Module 66: Security Con vergen ce ~
Copyright © by EC-Counci l ~
~ Module 66: Security Con vergen ce
~ Module 65: Patch Man agem en t
~ Module 64: Econ om ic Espion age
~ Module 63: Botn ets
~ Module 61: Threats an d Coun term easures
~ M d l 56 H ki Gl b l P iti i S t (GPS)
~ Module 61: Threats an d Coun term easures
~ Module 60 : Firewall Techn ologies
~ Module 59: H ow to Steal Passwords
~ Module 58 : Credit Card Frauds
~ Module 57: Com puter Foren sics an d In ciden t H an dlin g
~ Module 56: H ackin g Global Position in g System (GPS)
Module 67: Iden tifyin g the Terrorist
Self Study Modules ~
CEH v6 Curriculum con sists of In structor Led Train in g an d Self Study an d Self Study
~
The In structor will cover Modules 1 – 25 in the classroom
~
The self study Modules 26 to 67 an d Modules 11,12,13 an d 21 will n ot be covered in the classroom an d the studen t n eeds to study these on their own studen t n eeds to study these on their own
~
Your in structor will provide details of addition al m odules m arked for self-study (if an y)
~
The en tire courseware for the self study m odules are provided on the DVD Copyright © by EC-Counci l
EC-Counci l Certification Program
There are several levels of certification tracks un der EC-Counci l Accreditation b d body: 1. Certified e-Busin ess Associate
2. Certified e-Busin ess Profession al 3. Certified e-Busin ess Con sultan t
4. E++ Certified Techn ical Con sultan t 5 Ce rtifie d Eth ic a l H a cke r ( CEH ) Å Y o u a r e h e r e 5 . Ce rtifie d Eth ic a l H a cke r ( CEH ) Å Y o u a r e h e r e 6. Com puter H ackin g Foren sic In vestigator (CH FI)
7. EC-Coun cil Certified Security An alyst (ECSA) 8 . EC-Coun cil Certified Secure Program m er (ECSA)
9. Certified Secure Application Developer (CSAD) 10 . Licen sed Pen etration Tester (LPT) Copyright © by EC-Counci l 11. Master of Security Scien ce (MSS)
Certified Ethical H acker Track Copyright © by EC-Counci l
CEH v6 Exam In form ation
~Exam Title: Ethical H ackin g an d Coun term easures v6
~
Exam code: 312-50 / EC0 -350
~
No. of Question s: 150
~
Duration : 4 hours
~
Availability: Prom etric Prim e/ Prom etric APTC/ VUE
~
Passing score: 70 % P i %
~
The in structor will tell you about the exam schedule / exam voucher details for your train in g exam voucher details for your train in g
~
This is a d ifficu lt exam an d requires exten sive kn owledge of CEH 67 Modules Copyright © by EC-Counci l
Studen t Facilities
Class H ours B ildi H Ph Class H ours
Building H ours Phon es Parkin g k Messages Restroom s Sm okin g
Copyright © by EC-Counci l Recyclin g Meals Lab Session s ~
Lab Session s are design ed to rein force the classroom session s ~ The session s are in ten ded to give a han ds on experien ce on ly an d h d i l d does n ot guaran tee proficien cy
~ There are ton s of labs in the DVD. Please practice these labs DVD Please practice these labs back at hom e Copyright © by EC-Counci l What does CEH teach you? D f Ci S it Fi ll ID S L N t k
Go o d Gu y D e fe n s e , Cis co S e cu rity, Fire w a lls , ID S , Lo gs , N e tw o rk, An tiviru s , H a rd w a re , Tro u b le s h o o tin g, Ava ila b ility, S e rve r/ Clie n t S e cu rity, cre a tin g p o licie s , n e tw o rk Ma n a ge m e n t e tc …..
N e tw o rk S e cu rity Eth i l H ki Den ial of Service, Trojan s, Worm s, Virus, Social En gin eerin g, Password crackin g,
S i H ij ki S t f il S Eth ica l H a ckin g B d G
Session H ijackin g, System failure, Spam , Phishing, Identity theft, Wardrivin g, warchalkin g, bluejackin g Lock pickin g, Buffer Overflow, System hackin g,
S iffi SQL I j ti Ba d Gu y Sn iffin g, SQL In jection …..
Copyright © by EC-Counci l Th is is W h a t Th is is W h a t CEH CEH Te a ch e s Yo u ! Te a ch e s Yo u ! What CEH is NOT? ~
CEH class is NOT a N e tw o rk S e cu rity train in g program
Please atten d EC-Coun cil’s ENSA class for that •
~ ~ CEH class is NOT a S e cu rity An a lys is train in g CEH class is NOT a S e cu rity An a lys is train in g
programPlease atten d EC-Coun cil’s ECSA class for that •
~
CEH class is NOT a S e cu rity Te s tin g train in g
programPlease atten d EC-Coun cil’s LPT class for that l d C C il’ • l f h
CEH cla s s is 10 0 % N ETW ORK OFFEN S IVE CEH cla s s is 10 0 % N ETW ORK OFFEN S IVE Tra in in g Pro gra m Tra in in g Pro gra m Tra in in g Pro gra m Tra in in g Pro gra m Copyright © by EC-Counci l
Rem em ber This! The CEH Program The CEH Program Teaches you 10 0 % Teaches you 10 0 %
N e tw o rk Offe n s ive N e tw o rk Offe n s ive
Train ing an d n ot g
Defen sive
Copyright © by EC-Counci lCEH Class Speed ~ The CEH class is e xtre m e ly fa s t p a ce d ~
The class “speed” can be com pared to the clim ax scen e from the m ovie Mission Im possible (Bullet train sequen ce)
~ There are ton s of hackin g tools an d hackin g techn ologies covered in the curriculum
~ ~ The in structor W ILL N OT be able to The in structor W ILL N OT be able to dem on strate ALL the tools in this class
~ H e will showcase on ly s e le cte d to o ls
~ The Studen ts are required to practice with the tools n ot dem on strated in the class on their own Copyright © by EC-Counci l
Live H ackin g Website ~
Please target your exercises for Live exercises for “Live H ackin g” to
www.certifiedhacker.com ~
This website is m ean t for the studen ts to try the tools on live target g
~
Please refrain from usin g the exploits on an y other dom ain s on the In tern et dom ain s on the In tern et Copyright © by EC-Counci l
NDA Docum en t ~
Please read the con ten ts of the provided EC-Coun cil’s CEH id d EC C il’ CEH NDA docum en t
~ ~ Sign this docum en t an d han d Sign this docum en t an d han d it over to the in structor
~ ~ We will NOT start the class We will NOT start the class un less you s ign this docum en t
~ ~ Please approach the in structor Please approach the in structor if you are n ot presen ted with this docum en t Copyright © by EC-Counci l
Lets Start Lets Start
H ki ! H ackin g! g
Copyright © by EC-Counci l