EC-Council. Program Brochure. EC-Council. Page 1



Similar documents
EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC Council Certified Ethical Hacker V8

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

EC-Council. Certified Ethical Hacker. Program Brochure

[CEH]: Ethical Hacking and Countermeasures

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CEH Version8 Course Outline

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

LINUX / INFORMATION SECURITY

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Page: Designed & Executed By: Presents Cyber Security Training

Hackers are here. Where are you?

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Hackers are here. Where are you?

CYBERTRON NETWORK SOLUTIONS

SONDRA SCHNEIDER JOHN NUNES

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Detailed Description about course module wise:

EC-Council Ethical Hacking and Countermeasures

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CRYPTUS DIPLOMA IN IT SECURITY

CS Ethical Hacking Spring 2016

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

EC-Council Certified Security Analyst (ECSA)

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Analyze. Secure. Defend. Do you hold ECSA credential?

Course Title: Course Description: Course Key Objective: Fee & Duration:

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Brandman University. School of CCNA

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Network and Host-based Vulnerability Assessment

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

InfoSec Academy Pen Testing & Hacking Track

MW , TU 1-3; and other times by appointment

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Information Systems Security Certificate Program

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Professional Penetration Testing Techniques and Vulnerability Assessment ...

CIS 4204 Ethical Hacking Fall, 2014

Ethical Hacking and Countermeasures Training Program. Page 1. EC-Council

INFORMATION SECURITY TRAINING

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

FORBIDDEN - Ethical Hacking Workshop Duration

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Certified Cyber Security Analyst VS-1160

A Systems Engineering Approach to Developing Cyber Security Professionals

ETHICAL HACKING CYBER SECURITY

E-BUSINESS THREATS AND SOLUTIONS

Understanding Security Testing

CCA CYBER SECURITY TRACK

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

FSP-201: Ethical Hacking & IT Security

ASK PC Certified Information Systems Security Expert - CISSE

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Certified Cyber Security Expert V Web Application Development

Ethical Hacking v7 40 H.

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

Ethical Hacking & Cyber Security Workshop

Ethical Hacking Course Layout

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Penetration Testing Service. By Comsec Information Security Consulting

GFI White Paper PCI-DSS compliance and GFI Software products

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Ethical Hacking I Course of Study for HAC2

Network Security Audit. Vulnerability Assessment (VA)

Networking: EC Council Network Security Administrator NSA

Loophole+ with Ethical Hacking and Penetration Testing

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Protecting against cyber threats and security breaches

NETWORK PENETRATION TESTING

Penetration Testing. Presented by

Your Web and Applications

Barracuda Intrusion Detection and Prevention System

Principles of Information Assurance Syllabus

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Common Security Vulnerabilities in Online Payment Systems

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

A Decision Maker s Guide to Securing an IT Infrastructure

COB 302 Management Information System (Lesson 8)

Training Course ECSA/LPT

Vulnerability Assessment & Compliance

How To Get A Computer Hacking Program

Threat Modeling. Deepak Manohar

Course Content: Session 1. Ethics & Hacking

Transcription:

Program Brochure Page 1

Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and security researchers. CEH v7 is a revolutionary training program that combines class metrics, advance lab environment, cutting edge hacking techniques and excellent presentation materials. has spent several years in developing this version. The Certified Ethical Hacker courseware has undergone tremendous improvement from its predecessor. We have invested 4 times the regular investment in the research and development since the last release, and have given CEHv7 a complete makeover. The new version is a breakaway from earlier releases with more emphasis on techniques and methodologies, which attackers may use to carry out possible attacks against system/ networks. Picture speaks thousand words and we at have enforced the saying by practicing it. The instructor slides and student manuals in CEHv7 has it all. The new version empowers the instructor with flawless flow and outstanding diagrammatic representation of the hacking techniques, which makes it easier to teach and enables students to understand the concepts better. CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv7 courseware. Latest tools and exploits uncovered from the underground community are featured in the new package. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community. In addition to the makeover, CEHv7 includes two Page 2

TM C EH Certified v7 Ethical Hacker Are You Ready to Drown in to The World of Seven. Page 3

TM C EH Certified Ethical Hacker v7 You Just Landed on The 7th Heaven. Hello Seven. Page 4

additional also bundles; a Monster Hacking Tool Repository, Codenamed Frankenstein and a subscription based Virtual Lab Environment codenamed ilabs. Frankenstein Frankenstein provides user with an ease for searching, downloading and installing the latest hacking and penetration testing tools. By using Frankenstein Version 1.0, users can check the release date of the tool, category under which it is published, probable size of the tool, name of the publisher/author, the website details and technical requirements for the tool to run. This will help all the Certified Members to keep themselves updated of tools released in the wild. Key benefits: Repository of categorized latest tools User can download the tool in less time with comparison to manual search Helps the user to synchronize & manage the tools from the server Search specific tools from the available list of tools The system provides a means to generate a HTML report of all the tools downloaded by the user ilabs The ilabs is a subscription based service that allows students to logon to a virtualized remote machine running Windows 2003 Server to perform various exercises featured in the CEHv7 Lab Guide. All you need is a web browser to connect and start experimenting. The virtual machine setup reduces the time and effort spent by instructors and partners prior to the classroom engagement. It is a hassle free service available 24x7 x number of days subscribed. Page 5

C Certified HTM E Ethical Hacker v7 Meet the Most Powerful Ethical Hacker in the World, Seven Page 6

Benefits Enables students to practice various hacking techniques in a real time and simulated environment The course tools and programs are preloaded on the ilabs machine thereby saving productive time and effort Key Features of CEH v7 Well organized DVD-ROM content; a repository of approximately 20GB of latest hacking and security tools and more than 1000 minutes of videos demonstrating hacking techniques. Well organized content for a better understanding and learning experience Concepts are well-illustrated to create self-explanatory slides. Diagrammatic representation of concepts and attacks Industry standard key tools are featured in detail and other tools are presented as a list for students to try Exclusive section for countermeasures against different attacks with detailed explanation of how to implement these countermeasures in real time environment The new version has complete section dedicated for penetration testing. It illustrates how to implement learned concepts to test network system security A result oriented, descriptive and analytical lab manual; the labs showcased in the courseware are tested against latest Operating Systems with all the patches and hot fixes applied Page 7

TM C EH Certified Ethical Hacker v7 Dont Mess with Me, I am a CEH Page 8

Features Updated Content CEH v7 contains completely updated content on rapidly evolving security scenario and attack mechanisms Organized Content The well-designed content enhances the learning experience and ensures better understanding of key concepts, attack types and hacking methodologies Classroom Friendly The well-structured slides create an interactive classroom environment Illustration Rich The slides contain diagrams and illustrations to create better understanding of hacking concepts and actual attack paths New Hacks CEH v7 provides insights on new hacking techniques, networked environment and organized cybercrime Hacking Tools CEH v7 showcases thousands of Hacking tools including password cracker, spyware, live Trojans and viruses. Security Tools CEH v7 provides a detailed description of different industry-standard security tools. Other tools are listed for testing by students in a lab environment. Page 9

Countermeasures CEH v7 has an exclusive section, which provides detailed explanation of countermeasures to be adopted against different types of attacks Visual Appeal Eye-catching graphics complement the content and enhance the learning experience of the students Penetration Testing CEH v7 has an exclusive section for Penetration Testing. The section demonstrates the application of learned concepts to penetrate the IT apparatus Lab Setup Lab setup environment includes 5 virtual machines to test the labs. Lab setup manual is accompanied with videos to facilitate Lab setup DVD-ROM Content CEH v7 also provides a DVD-ROM with a repository of around 15 GB of latest hacking tools and security tools Expert Instructors The course in taught by expert instructors and world renowned network security specialists and developers Page 10

C Certified HTM E Ethical Hacker v7 SECURITY or CEHCURITY? Page 11

C Certified HTM E Ethical Hacker v7 Drown Yourself in the World of Seven. Page 12

Course Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for Certified Ethical Hacker exam 312-50 Who Should Attend This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Duration 5 days (9:00 5:00) Certification The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification. Legal Agreement Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use Page 13

TM C EH Certified Ethical Hacker v7 Meet the Most Advanced Ethical Hacking Program in the World Page 14

such tools in an attempt to compromise any computer system, and to indemnify with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies. Course Outline Version 7 CEHv7 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of selfstudy modules to the students beginning of the class. 1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Sniffers 9. Social Engineering 10. Denial of Service 11. Session Hijacking 12. Hacking Webservers 13. Hacking Web Applications 14. SQL Injection 15. Hacking Wireless Networks 16. Evading IDS, Firewalls and Honeypots 17. Buffer Overflows 18. Cryptography 19. Penetration Testing For more details, class schedules, enquiries contact info@eccouncil.org Page 15