CEHv6 Module 00 Student Introduction pdf pdf

  Copyright © by EC-Counci l

  g in

  n

  k

  o ti

  c

  c

  a

  u d o

H

  tr

  l

  In

  a

  t

   6

   6

  n

  ic n

  e d

  io i s r

  tu

  th e

  S

  V E In troduction s ~ ~ Nam e Nam e ~

  Com pan y Affiliation ~

  Title / Fun ction ~

  J ob Respon sibility ~ System security related experien ce ~ ~ Expectation s Expectation s Copyright © by EC-Counci l Course Materials ~

  Iden tity Card

  ~

  Studen t Courseware

  ~

  Lab Man ual/ Workbook C Di

  ~

  Com pact Disc

  ~

  Course Evaluation

  ~

  Referen ce Materials

  ~

  Referen ce Materials

  Copyright © by EC-Counci l Course Outline ~

  Module 1: In troduction to Ethical H ackin g

  ~

  Module 10 : Sn iffers

  ~

  Module 9: Viruses an d Worm s

  ~

  Module 8 : Trojan s an d Backdoors

  ~

  Module 8 : Trojan s an d Backdoors

  ~

  Module 7: System H acking

  Module 6: En um eration

  ~

  ~

  Module 6: En um eration

  ~

  Module 5: Scanning

  ~

  Module 4: Google H acking

  ~

  Module 3: Footprin tin g M d l G l H ki

  ~

  Module 2: H ackin g Laws

  Copyright © by EC-Counci l Course Outlin e (con td.) ~

  Module 11: Social En gin eerin g M d l Phi hi ~ Module 12: Phishin g ~

  Module 13: H ackin g Em ail Accoun ts ~ Module 14: Den ial-of-Service

  4 ~

  Module 15: Session H ijackin g ~ Module 16: H ackin g Web Servers ~

  Module 17: Web Application Vuln erabilities ~ Module 18 : Web-Based Password Crackin g Techn iques ~

  Module 19: SQL In jection ~

  Module 19: SQL In jection ~ Module 20 : H ackin g Wireless Networks ~

  Module 21: Physical Security Copyright © by EC-Counci l

  ~ Module 22: Lin ux H ackin g

  Course Outlin e (con td.) ~

  Module 23: Evadin g IDS, Firewalls an d Detectin g H on ey Pots ~ Module 24: Buffer Overflows ~ Module 25: Cryptography ~ Module 26: Pen etration Testin g ~ Module 27: Covert H ackin g ~ Module 28 : Writin g Virus Codes ~ Module 29: Assem bly Lan guage Tutorial ~ Module 30 : Exploit Writin gModule 31: Sm ashin g the Stack for Fun an d Profit ~ Module 32: Win dows Based Buffer Overflow Exploit Writin g Copyright © by EC-Counci l ~

  Module 33: Reverse En gin eerin g

  Course Outlin e (con td.) ~

  Module 34: MAC OS X H ackin g ~

  Module 35: H ackin g Routers, cable Modem s an d Firewalls ~

  Module 36: H ackin g Mobile Phon es, PDA an d H an dheld Devices ~

  Module 37: Bluetooth H ackin g ~

  Module 38 : VoIP H ackin g ~

  Module 39: RFID H ackin g ~

  Module 40 : Spam m in g ~

  Module 41: H ackin g USB Devices ~

  Module 42: H ackin g Database Servers Copyright © by EC-Counci l

  ~ Module 43: Cyber Warfare- H ackin g, Al-Qaida an d Terrorism

  ~ Module 44: In tern et Con ten t Filterin g Techn iques

  ~ Module 45: Privacy on the In tern et

  ~ Module 46: Securin g Laptop Com puters

  ~ Module 47: Spyin g Techn ologies

  ~ Module 47: Spyin g Techn ologies

  ~ Module 48 : Corporate Espion age- H ackin g Usin g In siders

  ~ Module 49: Creatin g Security Policies

  ~ Module 49: Creatin g Security Policies

  ~ Module 50 : Software Piracy an d Warez

  ~ Module 51: H ackin g an d Cheatin g On lin e Gam es

  ~ Module 52: H ackin g RSS an d Atom

  ~ Module 53: H ackin g Web Browsers (Firefox, IE)

  Copyright © by EC-Counci l ~

  Module 54: Proxy Server Techn ologies

  ~ Module 55: Data Loss Preven tion

  ~ Module 62: Case Studies

  Module 66: Security Con vergen ce ~

  Copyright © by EC-Counci l ~

  ~ Module 66: Security Con vergen ce

  ~ Module 65: Patch Man agem en t

  ~ Module 64: Econ om ic Espion age

  ~ Module 63: Botn ets

  ~ Module 61: Threats an d Coun term easures

  ~ M d l 56 H ki Gl b l P iti i S t (GPS)

  ~ Module 61: Threats an d Coun term easures

  ~ Module 60 : Firewall Techn ologies

  ~ Module 59: H ow to Steal Passwords

  ~ Module 58 : Credit Card Frauds

  ~ Module 57: Com puter Foren sics an d In ciden t H an dlin g

  ~ Module 56: H ackin g Global Position in g System (GPS)

  Module 67: Iden tifyin g the Terrorist

  Self Study Modules ~

  CEH v6 Curriculum con sists of In structor Led Train in g an d Self Study an d Self Study

  ~

  The In structor will cover Modules 1 – 25 in the classroom

  ~

  The self study Modules 26 to 67 an d Modules 11,12,13 an d 21 will n ot be covered in the classroom an d the studen t n eeds to study these on their own studen t n eeds to study these on their own

  ~

  Your in structor will provide details of addition al m odules m arked for self-study (if an y)

  ~

  The en tire courseware for the self study m odules are provided on the DVD Copyright © by EC-Counci l

  EC-Counci l Certification Program

  There are several levels of certification tracks un der EC-Counci l Accreditation b d body: 1. Certified e-Busin ess Associate

  2. Certified e-Busin ess Profession al 3. Certified e-Busin ess Con sultan t

  4. E++ Certified Techn ical Con sultan t 5 Ce rtifie d Eth ic a l H a cke r ( CEH ) Å Y o u a r e h e r e 5 . Ce rtifie d Eth ic a l H a cke r ( CEH ) Å Y o u a r e h e r e 6. Com puter H ackin g Foren sic In vestigator (CH FI)

  7. EC-Coun cil Certified Security An alyst (ECSA) 8 . EC-Coun cil Certified Secure Program m er (ECSA)

  9. Certified Secure Application Developer (CSAD) 10 . Licen sed Pen etration Tester (LPT) Copyright © by EC-Counci l 11. Master of Security Scien ce (MSS)

  Certified Ethical H acker Track Copyright © by EC-Counci l

  

CEH v6 Exam In form ation

~

  Exam Title: Ethical H ackin g an d Coun term easures v6

  ~

  Exam code: 312-50 / EC0 -350

  ~

  No. of Question s: 150

  ~

  Duration : 4 hours

  ~

  Availability: Prom etric Prim e/ Prom etric APTC/ VUE

  ~

  Passing score: 70 % P i %

  ~

  The in structor will tell you about the exam schedule / exam voucher details for your train in g exam voucher details for your train in g

  ~

  This is a d ifficu lt exam an d requires exten sive kn owledge of CEH 67 Modules Copyright © by EC-Counci l

Studen t Facilities

  Class H ours B ildi H Ph Class H ours

  Building H ours Phon es Parkin g k Messages Restroom s Sm okin g

  Copyright © by EC-Counci l Recyclin g Meals Lab Session s ~

  Lab Session s are design ed to rein force the classroom session s ~ The session s are in ten ded to give a han ds on experien ce on ly an d h d i l d does n ot guaran tee proficien cy

  ~ There are ton s of labs in the DVD. Please practice these labs DVD Please practice these labs back at hom e Copyright © by EC-Counci l What does CEH teach you? D f Ci S it Fi ll ID S L N t k

  Go o d Gu y D e fe n s e , Cis co S e cu rity, Fire w a lls , ID S , Lo gs , N e tw o rk, An tiviru s , H a rd w a re , Tro u b le s h o o tin g, Ava ila b ility, S e rve r/ Clie n t S e cu rity, cre a tin g p o licie s , n e tw o rk Ma n a ge m e n t e tc …..

  N e tw o rk S e cu rity Eth i l H ki Den ial of Service, Trojan s, Worm s, Virus, Social En gin eerin g, Password crackin g,

  S i H ij ki S t f il S Eth ica l H a ckin g B d G

  Session H ijackin g, System failure, Spam , Phishing, Identity theft, Wardrivin g, warchalkin g, bluejackin g Lock pickin g, Buffer Overflow, System hackin g,

  S iffi SQL I j ti Ba d Gu y Sn iffin g, SQL In jection …..

  Copyright © by EC-Counci l Th is is W h a t Th is is W h a t CEH CEH Te a ch e s Yo u ! Te a ch e s Yo u ! What CEH is NOT? ~

  CEH class is NOT a N e tw o rk S e cu rity train in g program

  Please atten d EC-Coun cil’s ENSA class for that •

  

~ ~ CEH class is NOT a S e cu rity An a lys is train in g CEH class is NOT a S e cu rity An a lys is train in g

program

  Please atten d EC-Coun cil’s ECSA class for that •

  ~

CEH class is NOT a S e cu rity Te s tin g train in g

program

  Please atten d EC-Coun cil’s LPT class for that l d C C il’ • l f h

  CEH cla s s is 10 0 % N ETW ORK OFFEN S IVE CEH cla s s is 10 0 % N ETW ORK OFFEN S IVE Tra in in g Pro gra m Tra in in g Pro gra m Tra in in g Pro gra m Tra in in g Pro gra m Copyright © by EC-Counci l

  Rem em ber This! The CEH Program The CEH Program Teaches you 10 0 % Teaches you 10 0 %

N e tw o rk Offe n s ive N e tw o rk Offe n s ive

  Train ing an d n ot g

Defen sive

Copyright © by EC-Counci l

  CEH Class Speed ~ The CEH class is e xtre m e ly fa s t p a ce d ~

  The class “speed” can be com pared to the clim ax scen e from the m ovie Mission Im possible (Bullet train sequen ce)

  ~ There are ton s of hackin g tools an d hackin g techn ologies covered in the curriculum

  ~ ~ The in structor W ILL N OT be able to The in structor W ILL N OT be able to dem on strate ALL the tools in this class

  ~ H e will showcase on ly s e le cte d to o ls

  ~ The Studen ts are required to practice with the tools n ot dem on strated in the class on their own Copyright © by EC-Counci l

  Live H ackin g Website ~

  Please target your exercises for Live exercises for “Live H ackin g” to

  www.certifiedhacker.com ~

  This website is m ean t for the studen ts to try the tools on live target g

  ~

  Please refrain from usin g the exploits on an y other dom ain s on the In tern et dom ain s on the In tern et Copyright © by EC-Counci l

  NDA Docum en t ~

  Please read the con ten ts of the provided EC-Coun cil’s CEH id d EC C il’ CEH NDA docum en t

  ~ ~ Sign this docum en t an d han d Sign this docum en t an d han d it over to the in structor

  ~ ~ We will NOT start the class We will NOT start the class un less you s ign this docum en t

  ~ ~ Please approach the in structor Please approach the in structor if you are n ot presen ted with this docum en t Copyright © by EC-Counci l

  Lets Start Lets Start

H ki ! H ackin g! g

  Copyright © by EC-Counci l