Ethical Hacking Training in Chennai - PowerPoint PPT Presentation

About This Presentation
Title:

Ethical Hacking Training in Chennai

Description:

As cyber attacks increase, so does the demand for information security professionals who possess true network penetration testing, Web Application Security and ethical hacking skills. There are several ethical hacking courses that claim to teach these skills, but few actually do. EC Council's Certified Ethical Hacker (CEH V8) course truly prepares you to conduct successful penetration testing and ethical hacking projects. The course starts with reconnaissance then dives deep into network scanning, vulnerability assessment and wireless network security with detailed hands-on exercises and practical tips for doing the job safely and effectively. – PowerPoint PPT presentation

Number of Views:1072

less

Transcript and Presenter's Notes

Title: Ethical Hacking Training in Chennai


1
v.8.0.6.09.14
CEHv8
Engineered by Hackers. Presented by Professionals.
www.mazenetsolution.com
2
Critical recognition of Importance of IS
capacity building from Indias Education
Authority.
www.mazenetsolution.com
3
www.mazenetsolution.com
4
Latest Operating Systems (Windows 8 and Windows
Server 2012)
CEH v8 program focuses on addressing security
issues to the latest operating systems including
Windows 8 and Windows Server 2012
It also focuses on addressing the existing
threats to operating environments dominated by
Windows 7 and other operating systems (backward
compatibility)
www.mazenetsolution.com
5
Emphasis on Mobile Platforms and Tablet Computers
  • CEHv8 focuses on the latest hacking attacks
    targeted to mobile platform and tablet computers
    and covers countermeasures to secure mobile
    infrastructure
  • Coverage of latest development in mobile and web
    technologies including Andriod OS 4.1 and Apps,
    iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8
    and HTML 5

www.mazenetsolution.com
6
Advanced Lab Environment
www.mazenetsolution.com
7
What is New in CEHv8?
New Contents
More than 40 percent new labs are added
More than 600 new instructor slides
More than 1500 new/updated tools
www.mazenetsolution.com
8
Module Comparison of CEHv8 with CEHv7
The topics highlighted in red under CEHv8 Module
01 Introduction to Ethical Hacking are the new
additions
CEHv7 Module 01 Introduction to Ethical Hacking
CEHv8 Module 01 Introduction to Ethical Hacking
  • Data Breach Investigations Report
  • Essential Terminologies
  • Elements of Information Security
  • Top Information Security Attack Vectors
  • Motives, Goals, and Objectives of Information
    Security Attacks
  • Information Security Threats
  • Information Warfare
  • IPv6 Security Threats
  • Hacking vs. Ethical Hacking
  • Effects of Hacking on Business
  • Who Is a Hacker?
  • Hacking Phases
  • Types of Attacks on a System
  • Why Ethical Hacking is Necessary
  • Skills of an Ethical Hacker
  • Incident Management Process
  • Types of Security Policies
  • Vulnerability Research
  • What Is Penetration Testing?
  • Data Breach Investigations Report
  • Essential Terminologies
  • Elements of Information Security
  • Effects of Hacking on Business
  • Who Is a Hacker?
  • Hacking Phases
  • Types of Attacks on a System
  • Why Ethical Hacking is Necessary
  • Skills of an Ethical Hacker
  • Vulnerability Research
  • What Is Penetration Testing?

www.mazenetsolution.com
9
Module Comparison of CEHv8 with CEHv7
The topics highlighted in red under CEHv8 Module
05 System Hacking are the new additions
CEHv7 Module 05 System Hacking
CEHv8 Module 05 System Hacking
  • Types of Keystroke Loggers and Spywares
  • System Hacking Goals
  • CEH Hacking Methodology (CHM)
  • Password Cracking
  • Stealing Passwords Using Keyloggers
  • Microsoft Authentication
  • How to Defend against Password Cracking
  • Privilege Escalation
  • Types of Privilege Escalation
  • Executing Applications
  • Methodology of Attacker in using Remote Keylogger
  • Anti-Keylogger and Anti-Spywares
  • Various methods to place a rootkit
  • Detecting Rootkits
  • NTFS Stream Manipulation
  • Application of steganography
  • Classification of Steganography
  • Audio Steganography Methods
  • Issues in Information hiding
  • System Hacking Goals
  • CEH Hacking Methodology (CHM)
  • Password Cracking
  • Microsoft Authentication
  • How to Defend against Password Cracking
  • Privilege Escalation
  • Types of Privilege Escalation
  • Executing Applications
  • Types of Keystroke Loggers and Spywares
  • Anti-Keylogger and Anti-Spywares
  • Detecting Rootkits
  • NTFS Stream Manipulation
  • Classification of Steganography
  • Steganalysis Methods/Attacks on Steganography
  • Covering Tracks
  • Penetration Testing

www.mazenetsolution.com
10
Course Outline
www.mazenetsolution.com
11
DVD-ROM Content
  • CEHv8 DVD-ROMs includes approximately 24 GBs of
    hacking tools
  • All the tools are categories according to
    courseware presentation
  • DVDs include white papers and reference material
    on various security concepts

www.mazenetsolution.com
12
Exam Info and Exam Portal
Exam Portaland Codes
Exam Info
  • The exam code varies when taken at different
    testing centers.
  • Exam 315-50-ANSI Web based Prometric Prime at
    Accredited Training Centers (ATC)
  • Exam 350CEHv8 Proctored test at Authorized
    Prometric Testing Centers (APTC) globally
  • Exam 312-50v8 VUE Testing centers
  • Number of Questions 125
  • Passing Score 70
  • Test Duration 4 Hours
  • Test Format Multiple Choice
  • Test Delivery Prometric Prime / VUE/APTC
  • Validity 3 years

www.mazenetsolution.com
13
ANSI Compliant
All CEHv8 members will be accredited under the
ANSIs personal certification program
I
www.mazenetsolution.com
14
ANSI Compliant
ANSI Accredited Exam Process
1
2
High quality certification exam
ANSI/ISO/IEC 17024
Standard exam development process
Imparts high value to our certifications
3
4
www.mazenetsolution.com
15
N.I.C.E. Framework
100 percent mapping to NICE Protect and Defend
specialty area
I
Skills and job roles based learning
Compliance to National Initiative for
Cybersecurity Education (NICE)
II
Standard-based training modules
III
Better industry acceptance
IV
www.mazenetsolution.com
16
DoD 8750
The United States of America Department of
Defense issued Directive 8570 in 2004 to
mandate baseline certifications for all
Information Assurance IA positions
In February of 2010, this directive was enhanced
to include the Certified Ethical Hacker across
the Computer Network Defense Categories CND
CEH is a part of
CND Infrastructure Support
CND Incident Responder
CND Analyst
CND Auditor
www.mazenetsolution.com
17
NSA/CNSS Compliant
Recognition by National Security Agency (NSA) and
the Committee on National Security Systems (CNSS)
CNSS 4013 Recognition
Standard based required training for network
security professionals
Better industry acceptance
www.mazenetsolution.com
Write a Comment
User Comments (0)
About PowerShow.com