ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
--- | Certified Ethical Hacker Series |---
              By the Student For The student

                  CEH Certification ?
This certification is designed for
? security officers
? auditors
? security professionals
? site administrators
? and anyone who deals with the security of the
network infrastructure on a day-to-day basis.


          --| Be A Hacker Not Victim |--
--- | Certified Ethical Hacker Series |---
                By the Student For The student

 The Module To which we will cover here
? Introduction to Ethical Hacking - Ethics and
  Legality
? Reconnaissance, Footprinting, and Social
  Engineering
? Scanning and Enumeration
? System Hacking


        --| Be A Hacker Not Victim |--
--- | Certified Ethical Hacker Series |---
               By the Student For The student




?   Trojans, Backdoors, Viruses and Worms
?   Sniffers
?   Denial of Service
?   Session Hijacking
?   Hacking Web Servers


          --| Be A Hacker Not Victim |--
--- | Certified Ethical Hacker Series |---
               By the Student For The student




?   Web Application Vulnerabilities
?   Web-Based Password-Cracking Techniques
?   SQL Injection and Buffer Overflows
?   Wireless Hacking
?   Physical Security


          --| Be A Hacker Not Victim |--
--- | Certified Ethical Hacker Series |---
               By the Student For The student




?   Linux Hacking
?   Evading IDS, Honeypots, and Firewalls
?   Cryptography
?   Penetration Testing Methodologies
--- | Certified Ethical Hacker Series |---
                  By the Student For The student

Lab Setup
   Hardware and Software Requirements
  The lab should have the following operating
  systems:
? Windows 2000 Professional
? Windows 2000 Server
? Windows NT Server 4.0
? Windows XP
? Windows Vista
? Linux (Backtrack recommended)
? virtual machine setup

More Related Content

Ethical Hacking Cehv7 Course Overview Presentation

  • 1. --- | Certified Ethical Hacker Series |--- By the Student For The student CEH Certification ? This certification is designed for ? security officers ? auditors ? security professionals ? site administrators ? and anyone who deals with the security of the network infrastructure on a day-to-day basis. --| Be A Hacker Not Victim |--
  • 2. --- | Certified Ethical Hacker Series |--- By the Student For The student The Module To which we will cover here ? Introduction to Ethical Hacking - Ethics and Legality ? Reconnaissance, Footprinting, and Social Engineering ? Scanning and Enumeration ? System Hacking --| Be A Hacker Not Victim |--
  • 3. --- | Certified Ethical Hacker Series |--- By the Student For The student ? Trojans, Backdoors, Viruses and Worms ? Sniffers ? Denial of Service ? Session Hijacking ? Hacking Web Servers --| Be A Hacker Not Victim |--
  • 4. --- | Certified Ethical Hacker Series |--- By the Student For The student ? Web Application Vulnerabilities ? Web-Based Password-Cracking Techniques ? SQL Injection and Buffer Overflows ? Wireless Hacking ? Physical Security --| Be A Hacker Not Victim |--
  • 5. --- | Certified Ethical Hacker Series |--- By the Student For The student ? Linux Hacking ? Evading IDS, Honeypots, and Firewalls ? Cryptography ? Penetration Testing Methodologies
  • 6. --- | Certified Ethical Hacker Series |--- By the Student For The student Lab Setup Hardware and Software Requirements The lab should have the following operating systems: ? Windows 2000 Professional ? Windows 2000 Server ? Windows NT Server 4.0 ? Windows XP ? Windows Vista ? Linux (Backtrack recommended) ? virtual machine setup