1. --- | Certified Ethical Hacker Series |---
By the Student For The student
CEH Certification ?
This certification is designed for
• security officers
• auditors
• security professionals
• site administrators
• and anyone who deals with the security of the
network infrastructure on a day-to-day basis.
--| Be A Hacker Not Victim |--
2. --- | Certified Ethical Hacker Series |---
By the Student For The student
The Module To which we will cover here
• Introduction to Ethical Hacking - Ethics and
Legality
• Reconnaissance, Footprinting, and Social
Engineering
• Scanning and Enumeration
• System Hacking
--| Be A Hacker Not Victim |--
3. --- | Certified Ethical Hacker Series |---
By the Student For The student
• Trojans, Backdoors, Viruses and Worms
• Sniffers
• Denial of Service
• Session Hijacking
• Hacking Web Servers
--| Be A Hacker Not Victim |--
4. --- | Certified Ethical Hacker Series |---
By the Student For The student
• Web Application Vulnerabilities
• Web-Based Password-Cracking Techniques
• SQL Injection and Buffer Overflows
• Wireless Hacking
• Physical Security
--| Be A Hacker Not Victim |--
5. --- | Certified Ethical Hacker Series |---
By the Student For The student
• Linux Hacking
• Evading IDS, Honeypots, and Firewalls
• Cryptography
• Penetration Testing Methodologies
6. --- | Certified Ethical Hacker Series |---
By the Student For The student
Lab Setup
Hardware and Software Requirements
The lab should have the following operating
systems:
• Windows 2000 Professional
• Windows 2000 Server
• Windows NT Server 4.0
• Windows XP
• Windows Vista
• Linux (Backtrack recommended)
• virtual machine setup