Ethical Hacking

17
v.8.0.6.09.14 CEHv8 Engineered by Hackers. Presented by Professionals. www.mazenetsolution.com

Transcript of Ethical Hacking

v.8.0.6.09.14

CEHv8

Engineered by Hackers. Presented by Professionals.

www.mazenetsolution.com

Critical recognition of Importance of IS

capacity building fromIndia’s

Education Authority.

www.mazenetsolution.com

Technology demands critical updates

Industries want better skills

Better courseware and supporting systems

Professionals want better recognition

www.mazenetsolution.com

Latest Operating Systems (Windows 8 and

Windows Server 2012)

CEH v8 program focuses on addressing security issues to the latest operating systems including Windows 8 and Windows Server 2012

It also focuses on addressing the existing threats to operating environments dominated by Windows 7 and other operating systems (backward compatibility)

www.mazenetsolution.com

Emphasis on Mobile Platforms and

Tablet Computers

CEHv8 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure

Coverage of latest development in mobile and web technologies including Andriod OS 4.1 and Apps, iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8 and HTML 5

www.mazenetsolution.com

Advanced Lab Environment

www.mazenetsolution.com

New Contents

More than 40 percent new labsare added

More than 600 new instructor slides

More than 1500 new/updated tools

What is New in CEHv8?

www.mazenetsolution.com

Data Breach Investigations Report

Essential Terminologies

Elements of Information Security

Top Information Security Attack Vectors

Motives, Goals, and Objectives of Information Security Attacks

Information Security Threats

Information Warfare

IPv6 Security Threats

Hacking vs. Ethical Hacking

Effects of Hacking on Business

Who Is a Hacker?

Hacking Phases

Types of Attacks on a System

Why Ethical Hacking is Necessary

Skills of an Ethical Hacker

Incident Management Process

Types of Security Policies

Vulnerability Research

What Is Penetration Testing?

Data Breach Investigations Report

Essential Terminologies

Elements of Information Security

Effects of Hacking on Business

Who Is a Hacker?

Hacking Phases

Types of Attacks on a System

Why Ethical Hacking is Necessary

Skills of an Ethical Hacker

Vulnerability Research

What Is Penetration Testing?

The topics highlighted in red under CEHv8 Module 01: Introduction to Ethical Hacking are the new additions

Module Comparison of CEHv8 with

CEHv7

CEHv7 Module 01: Introduction to Ethical Hacking CEHv8 Module 01: Introduction to Ethical Hacking

www.mazenetsolution.com

Types of Keystroke Loggers and Spywares

System Hacking: Goals

CEH Hacking Methodology (CHM)

Password Cracking

Stealing Passwords Using Keyloggers

Microsoft Authentication

How to Defend against Password Cracking

Privilege Escalation

Types of Privilege Escalation

Executing Applications

Methodology of Attacker in using Remote Keylogger

Anti-Keylogger and Anti-Spywares

Various methods to place a rootkit

Detecting Rootkits

NTFS Stream Manipulation

Application of steganography

Classification of Steganography

Audio Steganography Methods

Issues in Information hiding

Steganalysis Methods/Attacks on Steganography

Detecting Text, Image, Audio, and Video Steganography

Covering Tracks

Penetration Testing

The topics highlighted in red under CEHv8 Module 05 System Hacking are the new additions

Module Comparison of CEHv8 with

CEHv7

CEHv7 Module 05 System Hacking CEHv8 Module 05 System Hacking

System Hacking: Goals

CEH Hacking Methodology (CHM)

Password Cracking

Microsoft Authentication

How to Defend against Password Cracking

Privilege Escalation

Types of Privilege Escalation

Executing Applications

Types of Keystroke Loggers and Spywares

Anti-Keylogger and Anti-Spywares

Detecting Rootkits

NTFS Stream Manipulation

Classification of Steganography

Steganalysis Methods/Attacks on Steganography

Covering Tracks

Penetration Testing

www.mazenetsolution.com

Course Outline

Introduction to Ethical Hacking

Footprinting and Reconnaissance

Scanning Networks

Enumeration

System HackingTrojans and Backdoors

Viruses and Worms

Sniffing

Social Engineering

Denial-of-ServiceSession

HijackingHacking

Webservers

Hacking Web Applications

SQL InjectionHacking Wireless

Networks

Evading IDS, Firewalls, and

Honeypots

Buffer Overflow CryptographyPenetration

Testing

www.mazenetsolution.com

DVD-ROM Content

CEHv8 DVD-ROMs includes approximately 24 GBs of hacking tools

All the tools are categories according to courseware presentation

DVDs include white papers and reference material on various security concepts

www.mazenetsolution.com

Number of Questions: 125

Passing Score: 70%

Test Duration: 4 Hours

Test Format: Multiple Choice

Test Delivery: PrometricPrime / VUE/APTC

Validity: 3 years

The exam code varies when taken at different testing centers.

Exam 315-50-ANSI: Web based ‘Prometric Prime’ at Accredited Training Centers (ATC)

Exam 350CEHv8: Proctored test at Authorized PrometricTesting Centers (APTC) globally

Exam 312-50v8: VUE Testing centers

Exam InfoExam Portal

and Codes

Exam Info and Exam Portal

www.mazenetsolution.com

All CEHv8 members will be accredited under the ANSI’s

personal certification program

ANSI Compliant

www.mazenetsolution.com

ANSI Accredited Exam Process

ANSI/ISO/IEC 17024High quality certification

exam

Standard exam

development process

Imparts high value to

our certifications

1 2

3 4

ANSI Compliant

www.mazenetsolution.com

Compliance to

National Initiative

for Cybersecurity

Education (NICE)

100 percent mapping to NICE Protect and

Defend specialty area

Skills and job roles based learning

Standard-based training modules

Better industry acceptance

N.I.C.E. Framework

www.mazenetsolution.com

The United States of America Department of Defense issued

Directive 8570 in 2004 to mandate baseline

certifications for all Information Assurance “IA” positions

CND

Analyst

CND

Infrastructure

Support

CND Incident

ResponderCND Auditor

In February of 2010, this directive was enhanced to include the Certified Ethical Hacker across the Computer Network Defense Categories “CND”

CEH is a part of:

DoD 8750

www.mazenetsolution.com

Standard based required training for

network security professionals

Recognition by National Security Agency

(NSA) and the Committee on National

Security Systems (CNSS)

Better industry acceptance

CNSS 4013

Recognition

NSA/CNSS Compliant

www.mazenetsolution.com