SlideShare une entreprise Scribd logo
1  sur  6
--- | Certified Ethical Hacker Series |---
              By the Student For The student

                  CEH Certification ?
This certification is designed for
• security officers
• auditors
• security professionals
• site administrators
• and anyone who deals with the security of the
network infrastructure on a day-to-day basis.


          --| Be A Hacker Not Victim |--
--- | Certified Ethical Hacker Series |---
                By the Student For The student

 The Module To which we will cover here
• Introduction to Ethical Hacking - Ethics and
  Legality
• Reconnaissance, Footprinting, and Social
  Engineering
• Scanning and Enumeration
• System Hacking


        --| Be A Hacker Not Victim |--
--- | Certified Ethical Hacker Series |---
               By the Student For The student




•   Trojans, Backdoors, Viruses and Worms
•   Sniffers
•   Denial of Service
•   Session Hijacking
•   Hacking Web Servers


          --| Be A Hacker Not Victim |--
--- | Certified Ethical Hacker Series |---
               By the Student For The student




•   Web Application Vulnerabilities
•   Web-Based Password-Cracking Techniques
•   SQL Injection and Buffer Overflows
•   Wireless Hacking
•   Physical Security


          --| Be A Hacker Not Victim |--
--- | Certified Ethical Hacker Series |---
               By the Student For The student




•   Linux Hacking
•   Evading IDS, Honeypots, and Firewalls
•   Cryptography
•   Penetration Testing Methodologies
--- | Certified Ethical Hacker Series |---
                  By the Student For The student

Lab Setup
   Hardware and Software Requirements
  The lab should have the following operating
  systems:
• Windows 2000 Professional
• Windows 2000 Server
• Windows NT Server 4.0
• Windows XP
• Windows Vista
• Linux (Backtrack recommended)
• virtual machine setup

Contenu connexe

En vedette

புதிய கடவுள் - PUTHIYA KADAVUL
புதிய கடவுள் - PUTHIYA KADAVULபுதிய கடவுள் - PUTHIYA KADAVUL
புதிய கடவுள் - PUTHIYA KADAVULSivashanmugam Palaniappan
 
Ceh v7 module 01 introduction to ethical hacking
Ceh v7 module 01 introduction to ethical hackingCeh v7 module 01 introduction to ethical hacking
Ceh v7 module 01 introduction to ethical hackingsabulite
 
求人掲載マニュアル
求人掲載マニュアル求人掲載マニュアル
求人掲載マニュアルtomokiyo-n
 
BloomCon 2015 - Adrian Sargeant
BloomCon 2015 - Adrian SargeantBloomCon 2015 - Adrian Sargeant
BloomCon 2015 - Adrian SargeantBloomerang
 
Using Social Media to Protect Wildlife
Using Social Media to Protect WildlifeUsing Social Media to Protect Wildlife
Using Social Media to Protect WildlifeDanielle Brigida
 
10 Essential Ingredients for Successful Corporate Coaching Programs
10 Essential Ingredients for Successful Corporate Coaching Programs 10 Essential Ingredients for Successful Corporate Coaching Programs
10 Essential Ingredients for Successful Corporate Coaching Programs Chronus
 
Learning english sentence structure game
Learning english sentence structure gameLearning english sentence structure game
Learning english sentence structure gamealyoshame
 
Fb community
Fb communityFb community
Fb communityBim PRcom
 
4150415
41504154150415
4150415kombi9
 
Using Storica to record and experience life
Using Storica to record and experience lifeUsing Storica to record and experience life
Using Storica to record and experience lifeDana Pavel
 
Delaney
DelaneyDelaney
Delaneymorag
 
The Future Of Giving: Why Students And Young Alumni Matter
The Future Of Giving: Why Students And Young Alumni MatterThe Future Of Giving: Why Students And Young Alumni Matter
The Future Of Giving: Why Students And Young Alumni Matterefrawley3
 

En vedette (20)

புதிய கடவுள் - PUTHIYA KADAVUL
புதிய கடவுள் - PUTHIYA KADAVULபுதிய கடவுள் - PUTHIYA KADAVUL
புதிய கடவுள் - PUTHIYA KADAVUL
 
Ceh v7 module 01 introduction to ethical hacking
Ceh v7 module 01 introduction to ethical hackingCeh v7 module 01 introduction to ethical hacking
Ceh v7 module 01 introduction to ethical hacking
 
carolina!
carolina!carolina!
carolina!
 
2016 01 07-part2
2016 01 07-part22016 01 07-part2
2016 01 07-part2
 
SIO_110_syllabus
SIO_110_syllabusSIO_110_syllabus
SIO_110_syllabus
 
求人掲載マニュアル
求人掲載マニュアル求人掲載マニュアル
求人掲載マニュアル
 
BloomCon 2015 - Adrian Sargeant
BloomCon 2015 - Adrian SargeantBloomCon 2015 - Adrian Sargeant
BloomCon 2015 - Adrian Sargeant
 
II GUERRA MUNDIAL
II GUERRA MUNDIALII GUERRA MUNDIAL
II GUERRA MUNDIAL
 
Using Social Media to Protect Wildlife
Using Social Media to Protect WildlifeUsing Social Media to Protect Wildlife
Using Social Media to Protect Wildlife
 
10 Essential Ingredients for Successful Corporate Coaching Programs
10 Essential Ingredients for Successful Corporate Coaching Programs 10 Essential Ingredients for Successful Corporate Coaching Programs
10 Essential Ingredients for Successful Corporate Coaching Programs
 
Android Apps the Right Way
Android Apps the Right WayAndroid Apps the Right Way
Android Apps the Right Way
 
degree cert
degree certdegree cert
degree cert
 
dave
davedave
dave
 
Learning english sentence structure game
Learning english sentence structure gameLearning english sentence structure game
Learning english sentence structure game
 
Fb community
Fb communityFb community
Fb community
 
Talent
TalentTalent
Talent
 
4150415
41504154150415
4150415
 
Using Storica to record and experience life
Using Storica to record and experience lifeUsing Storica to record and experience life
Using Storica to record and experience life
 
Delaney
DelaneyDelaney
Delaney
 
The Future Of Giving: Why Students And Young Alumni Matter
The Future Of Giving: Why Students And Young Alumni MatterThe Future Of Giving: Why Students And Young Alumni Matter
The Future Of Giving: Why Students And Young Alumni Matter
 

Similaire à Ethical Hacking Cehv7 Course Overview Presentation

Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical HackerKnowledgehut
 
!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptxssuserf9358d
 
Hardware Security Training By TONEX
Hardware Security Training By TONEXHardware Security Training By TONEX
Hardware Security Training By TONEXBryan Len
 
PCI DSS in Pictures and What to Expect in PCI 3.0
PCI DSS in Pictures and What to Expect in PCI 3.0PCI DSS in Pictures and What to Expect in PCI 3.0
PCI DSS in Pictures and What to Expect in PCI 3.0Praveen Vackayil
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
CIW Program Overview for Modem Media
CIW Program Overview for Modem MediaCIW Program Overview for Modem Media
CIW Program Overview for Modem MediaMichael Dobe, Ph.D.
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopPriyanka Aash
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetPerforce
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?Rob Gillen
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Schneider Electric
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 

Similaire à Ethical Hacking Cehv7 Course Overview Presentation (20)

Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx!0. Ethical Hacking_overview.pptx
!0. Ethical Hacking_overview.pptx
 
Hardware Security Training By TONEX
Hardware Security Training By TONEXHardware Security Training By TONEX
Hardware Security Training By TONEX
 
PCI DSS in Pictures and What to Expect in PCI 3.0
PCI DSS in Pictures and What to Expect in PCI 3.0PCI DSS in Pictures and What to Expect in PCI 3.0
PCI DSS in Pictures and What to Expect in PCI 3.0
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
MyResume.pdf
MyResume.pdfMyResume.pdf
MyResume.pdf
 
CIW Program Overview for Modem Media
CIW Program Overview for Modem MediaCIW Program Overview for Modem Media
CIW Program Overview for Modem Media
 
Karthik raja r task 7 i
Karthik raja r task 7 iKarthik raja r task 7 i
Karthik raja r task 7 i
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Chapter08
Chapter08Chapter08
Chapter08
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Protecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and IntersetProtecting Your IP with Perforce Helix and Interset
Protecting Your IP with Perforce Helix and Interset
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
Pci Req
Pci ReqPci Req
Pci Req
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Dernier (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Ethical Hacking Cehv7 Course Overview Presentation

  • 1. --- | Certified Ethical Hacker Series |--- By the Student For The student CEH Certification ? This certification is designed for • security officers • auditors • security professionals • site administrators • and anyone who deals with the security of the network infrastructure on a day-to-day basis. --| Be A Hacker Not Victim |--
  • 2. --- | Certified Ethical Hacker Series |--- By the Student For The student The Module To which we will cover here • Introduction to Ethical Hacking - Ethics and Legality • Reconnaissance, Footprinting, and Social Engineering • Scanning and Enumeration • System Hacking --| Be A Hacker Not Victim |--
  • 3. --- | Certified Ethical Hacker Series |--- By the Student For The student • Trojans, Backdoors, Viruses and Worms • Sniffers • Denial of Service • Session Hijacking • Hacking Web Servers --| Be A Hacker Not Victim |--
  • 4. --- | Certified Ethical Hacker Series |--- By the Student For The student • Web Application Vulnerabilities • Web-Based Password-Cracking Techniques • SQL Injection and Buffer Overflows • Wireless Hacking • Physical Security --| Be A Hacker Not Victim |--
  • 5. --- | Certified Ethical Hacker Series |--- By the Student For The student • Linux Hacking • Evading IDS, Honeypots, and Firewalls • Cryptography • Penetration Testing Methodologies
  • 6. --- | Certified Ethical Hacker Series |--- By the Student For The student Lab Setup Hardware and Software Requirements The lab should have the following operating systems: • Windows 2000 Professional • Windows 2000 Server • Windows NT Server 4.0 • Windows XP • Windows Vista • Linux (Backtrack recommended) • virtual machine setup