SlideShare a Scribd company logo
1 of 23
1
Riphah International University
                 &
International Council of E-Commerce
            Consultants.
History of the Company
The September 9/11 Attacks on the World Trade Center ignited a very important
question in the hearts of the founders of EC–Council –   Jay Bavisi and Haja
Mohideen.
Shortly after the attacks, they researched the web for “Information Security”
programs that would be able to provide Information Security professionals with
the necessary tools and education that will help them avert a cyber war should
the need ever arise.
The results returned from the research were disappointing and that motivated
them to form the International Council of Electronic Commerce Consultants,
known as the EC-Council.
They soon gained the support of subject matter experts from all over the world
that eventually led to the creation of various standards and certifications both
in the electronic commerce and information security space.
About EC-Council
   Established in 2001 and HQ’ed in the USA, R&D office in India and
    International office based in Malaysia
   Creator of the world-famous Certified Ethical Hacker certified
    program (CEH)
   Certified more than 28,000 professionals from the FBI, CIA, US
    DOD, Microsoft, Symantec, Deloitte and Fortune 500 companies
   More than 450 training partners in over 60 countries
   Partners with UN/ITU via Cyber security arm - IMPACT
   Delivery partners include McAfee, PwC, Deloitte, etc
   More than 350 subject matter experts globally in developing
    contents
   Delivers more than 20 different certifications in Information
    Security and eBusiness
Collaboration With EC Council

   RIU and EC Council signed 1st Pakistan Academic and Professional
    Partnership agreement to conduct all EC Council Information
    Security Certifications. It is an honor for Pakistan community as
    well as the opportunity for IT Professionals to do the Information
    Security Certification from EC Council authorized instructor and
    appear for exam (Free of Cost) under on roof of RIU.
Owner of the Hacker Halted conference and workshop series,
which had been organized in international cities such as Miami,
Myrtle Beach, Dubai, Singapore, Kuala Lumpur, Mexico City, among
others. Hacker Halted features renowned international speakers
who are experts in the field of information security.
Objective of Hacker Halted conference series is to raise
international awareness towards increased education and ethics in
information security.
EC-Council IT Certification Levels
• ECSS
• Security
                                               • CEH/CNDA
  Fundamentals
                                               • CHFI
• Security 5
• Network 5
• Wireless 5
• ENSA              Entry       Intermediate
                    Level          Level




                                 Advanced
                  Specialized
                                   Level
• ECSP/CSAD                                    • ECSA
• ECVP                                         • LPT
• ECDR/ECVT
• ECIH
• ECCI
EC-Council Certification Quadrant


                                        Security 5
                                        Network 5          ECVP
Information                             Wireless5          ECDR/ECVT
                    Technology
Security                                ENSA
                    Certification
Certification                           CEH/CNDA




                                    =
                                        ECSA/LPT
                                        CHFI, ECCI, ECIH


                                        ECSP               Cyber Law
  Programming                                              Cyber Marketing
                    Management          CSAD               E Business Security
   Certification
                    Certification                          Knowledge Management
                                                           Project Management
                                                           CRM, SCM, ERP
Typical Security Job Roles and
                                        responsibilities
 Job Level    Typical Roles                                         Corresponding Certifications & Designations
                Information
  IT/IS         Assurance,
                Design, and
                                                                              MSS/ECSO (Coming Soon)
Executive
                Compliance

                 Information
                  Assurance
  IT/IS
                oversight and
 Manager          Personnel
                management

                                                                                          Disaster Recovery                       Secure
                                  Penetration Testing Specialist   Forensics Specialist                       VOIP Specialist
                Specialization                                                                Specialist                        Programmer
               roles including
                Pen Testing,
                 Forensics,
  IT/IS
              Disaster Recover,
Specialist      Voice over IP,
                   Secure
               Programming,
                     etc.



                  Network
                Installation,
               Configuration,
IT/IS Admin    maintenance,
                Information
                 Assurance

              Standard Network
  IT/IS
                installation &
Technician      configuration

                 Access to
Information
                 Computing
  Worker          systems
EC-Council IT Security Professional Certification Vs
                     Job Role
                 Information Security Specialist/Engineer/Officer, Vulnerability Management Analysts , IS
                 Consultant
       CEH

                 Only for Federal Agencies
       CNDA


                 Penetration Tester, Senior Consultant, Senior Analyst
     ECSA/LPT


       ENSA      Network/System Admin



       ECVP      VoIP Engineer, Voice Professional/Consultant/Specialist, VoIP System Manager


       CHFI      Computer Crime Investigator, Security Forensic Engineer,


                 Computer Forensics Certification for Lawyers
       ECCI


                 DR Specialist/Manager/Consultant, BC Manager, Incident Command System Advisor,
     ECDR/ECVT
                 Virtualization/Infrastructure Engineer, Infrastructure Architect & Admin
Addressing Global Learning Needs
                          EC-Council


 Industry                     Academia                    EC-Council University




 Corporate             University Collaboration           University and Direct
  Market                       Market                       Student Market




IT Professionals   Universities, technical institutions   Education Providers &
 and end users         and education providers                  Students
Information Security Certifications
EC Council Certifications
EC Council Certifications
EC Council Certifications
• We offer EC-Council Certified Ethical Hacker exam 312-50 preparation
  by EC-Council Certified Instructor on 27th September-01 October, 2010.
• Who Should Attend
                 This course will significantly benefit CIO, CTO, IT security
  officers, IT Managers, IT auditors, security professionals, Network
  administrators, and anyone who is concerned about the integrity of the
  network infrastructure.
• Duration:
        5 days (9:00 – 5:00)
• Certification
        The Certified Ethical Hacker certification exam 312-50 will be
  conducted on the last day of training.
• Prometic Centre
        Students need to pass the online Prometric exam to receive the
  CEH certification. Riphah has the Prometric centre facility as well.
Certified Ethical Hacker (CEH) Course Module
   Introduction to Ethical Hacking      SQL Injection
   Hacking Laws                         Hacking Wireless Networks
   Footprinting                         Physical Security
   Google Hacking                       Linux Hacking
   Scanning                             Evading IDS, Firewalls and Detecting Honey
   Enumeration                           Pots
   System Hacking                       Buffer Overflows
   Trojans and Backdoors                Cryptography
   Viruses and Worms                    Penetration Testing
   Sniffers                             Covert Hacking
   Social Engineering                   Writing Virus Codes
   Phishing                             Assembly Language Tutorial
   Hacking Email Accounts               Exploit Writing
   Denial-of-Service                    Smashing the Stack for Fun and Profit
   Session Hijacking                    Windows Based Buffer Overflow Exploit
   Hacking Web Servers                   Writing
   Web Application Vulnerabilities      Reverse Engineering
   Web-Based Password Cracking          Macintosh Hacking
    Techniques                           Hacking Routers, cable Modems and Firewalls
                                         Hacking Mobile Phones, PDA and Handheld
                                          Devices
Certified Ethical Hacker (CEH) Course Module
 Bluetooth Hacking                        Data Loss Prevention
 VoIP Hacking                             Hacking Global Positioning System (GPS)
 RFID Hacking                             Computer Forensics and Incident Handling
 Spamming                                 Credit Card Frauds
 Hacking USB Devices                      How to Steal Passwords
 Hacking Database Servers                 Firewall Technologies
 Cyber Warfare- Hacking, Al-Qaida and     Threats and Countermeasures
  Terrorism                                Case Studies
 Internet Content Filtering Techniques 
 Privacy on the Internet                  Botnets
 Securing Laptop Computers                Economic Espionage
 Spying Technologies                      Patch Management
 Corporate Espionage- Hacking Using       Security Convergence
   Insiders
 Creating Security Policies
 Software Piracy and Warez
 Hacking and Cheating Online Games
 Hacking RSS and Atom
 Hacking Web Browsers
 Proxy Server Technologies
Dedicated EC Council Certification Lab & Prometric Centre
E Business Certifications
Certified Members List….
Canon                      Cingular Wireless            Bell Canada
Hewlett Packard            Columbia Daily Tribune       Sony
US Air Force Reserve       Marriott Hotel               Kodak
US Embassy                 Quantum Research             Ontario Provincial Police
Verizon                    US Military                  Harris Corporation
PFIZER                     IBM Global Services
                                                        Xerox
HDFC Bank                  UPS
                                                        Riphah International University
University of Memphis      American Express
                                                        Philips Electronics
Microsoft Corporation      FBI
                                                        U.S. Army
Worldcom                   Boehringer Ingelheim
Trusecure                  Wipro                        Schering
US Department of Defense   United States Marine Corps   Accenture
Fedex                      Reserve Bank of India        SAIC
Dunlop                     US Air Force                 Fujitsu
Novell                     Singapore Airlines           Supreme Court of the Philippines
Cisco                      Nortel Networks              United Nations
Mentor Graphics            MCI                          Ministry of Defense, UK
TCS                        Check Point Software         Singapore Police
NISER
Thank You

More Related Content

What's hot

Social media strategy of amazon
Social media strategy of amazonSocial media strategy of amazon
Social media strategy of amazonShelby Rubin
 
Consumer preference towards fair n lovely
Consumer preference towards fair n lovely Consumer preference towards fair n lovely
Consumer preference towards fair n lovely Aghna Shamsi
 
Workshop: LinkedIn para Vendas
Workshop: LinkedIn para VendasWorkshop: LinkedIn para Vendas
Workshop: LinkedIn para VendasFelipe Matheus
 
The Power of Belonging
The Power of Belonging  The Power of Belonging
The Power of Belonging Baaghil
 
ColourPop - The Budget-Friendly and High Quality Brand Everyone Loves
ColourPop - The Budget-Friendly and High Quality Brand Everyone LovesColourPop - The Budget-Friendly and High Quality Brand Everyone Loves
ColourPop - The Budget-Friendly and High Quality Brand Everyone LovesOctoly
 
V kids Business Plan (15 batch Group 3)
V kids Business Plan (15 batch Group 3)V kids Business Plan (15 batch Group 3)
V kids Business Plan (15 batch Group 3)CherryBerry2
 
influencer marketing
influencer marketinginfluencer marketing
influencer marketingmohemmed anas
 
Unilever marketing openflame
Unilever marketing openflameUnilever marketing openflame
Unilever marketing openflameKhalid Hossain
 
Mental Map Brand Mantra.ppt
Mental Map  Brand Mantra.pptMental Map  Brand Mantra.ppt
Mental Map Brand Mantra.pptAshlinJoel
 
Warby Parker Case study - Storytelling
Warby Parker Case study - StorytellingWarby Parker Case study - Storytelling
Warby Parker Case study - Storytellingyrotsduol
 
PRODUCT MANAGEMENT - Shoes Plus
PRODUCT MANAGEMENT - Shoes PlusPRODUCT MANAGEMENT - Shoes Plus
PRODUCT MANAGEMENT - Shoes PlusHoa Sen University
 
Brand strategy development
Brand strategy developmentBrand strategy development
Brand strategy developmentIaruna
 
Visual Merchandising
Visual MerchandisingVisual Merchandising
Visual MerchandisingKaran Verma
 
Visual merchandise ppt
Visual merchandise   pptVisual merchandise   ppt
Visual merchandise pptVikas Mishra
 
Sephora Case Study
Sephora Case StudySephora Case Study
Sephora Case Studyanneed2010
 

What's hot (20)

Social media strategy of amazon
Social media strategy of amazonSocial media strategy of amazon
Social media strategy of amazon
 
Consumer preference towards fair n lovely
Consumer preference towards fair n lovely Consumer preference towards fair n lovely
Consumer preference towards fair n lovely
 
Workshop: LinkedIn para Vendas
Workshop: LinkedIn para VendasWorkshop: LinkedIn para Vendas
Workshop: LinkedIn para Vendas
 
2011 esc pau armani final ppt
2011 esc pau armani final ppt2011 esc pau armani final ppt
2011 esc pau armani final ppt
 
The Power of Belonging
The Power of Belonging  The Power of Belonging
The Power of Belonging
 
[Dove] Customer Journey
[Dove] Customer Journey[Dove] Customer Journey
[Dove] Customer Journey
 
ColourPop - The Budget-Friendly and High Quality Brand Everyone Loves
ColourPop - The Budget-Friendly and High Quality Brand Everyone LovesColourPop - The Budget-Friendly and High Quality Brand Everyone Loves
ColourPop - The Budget-Friendly and High Quality Brand Everyone Loves
 
Lakon.pdf
Lakon.pdfLakon.pdf
Lakon.pdf
 
V kids Business Plan (15 batch Group 3)
V kids Business Plan (15 batch Group 3)V kids Business Plan (15 batch Group 3)
V kids Business Plan (15 batch Group 3)
 
influencer marketing
influencer marketinginfluencer marketing
influencer marketing
 
Unilever marketing openflame
Unilever marketing openflameUnilever marketing openflame
Unilever marketing openflame
 
Mental Map Brand Mantra.ppt
Mental Map  Brand Mantra.pptMental Map  Brand Mantra.ppt
Mental Map Brand Mantra.ppt
 
Onnichannel Experience - 'Caso Mi Canal IKEA Ibérica'
Onnichannel Experience - 'Caso Mi Canal IKEA Ibérica' Onnichannel Experience - 'Caso Mi Canal IKEA Ibérica'
Onnichannel Experience - 'Caso Mi Canal IKEA Ibérica'
 
Warby Parker Case study - Storytelling
Warby Parker Case study - StorytellingWarby Parker Case study - Storytelling
Warby Parker Case study - Storytelling
 
PRODUCT MANAGEMENT - Shoes Plus
PRODUCT MANAGEMENT - Shoes PlusPRODUCT MANAGEMENT - Shoes Plus
PRODUCT MANAGEMENT - Shoes Plus
 
Brand strategy development
Brand strategy developmentBrand strategy development
Brand strategy development
 
Sephora case study
Sephora case studySephora case study
Sephora case study
 
Visual Merchandising
Visual MerchandisingVisual Merchandising
Visual Merchandising
 
Visual merchandise ppt
Visual merchandise   pptVisual merchandise   ppt
Visual merchandise ppt
 
Sephora Case Study
Sephora Case StudySephora Case Study
Sephora Case Study
 

Similar to CEH

Pen test free_01_2012
Pen test free_01_2012Pen test free_01_2012
Pen test free_01_2012Amiga Utomo
 
Spy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsMichael Scheidell
 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar sasikalaD3
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...imec.archive
 
IT & Security opportunities 2015
IT & Security opportunities 2015IT & Security opportunities 2015
IT & Security opportunities 2015Sumeer Sharma
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Eryk Budi Pratama
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesCarlo Pelliccioni, CISSP
 
Hacktive Security - IT Security Services
Hacktive Security - IT Security ServicesHacktive Security - IT Security Services
Hacktive Security - IT Security ServicesFrancesco Mormile
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogNetCom Learning
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 

Similar to CEH (20)

Pen test free_01_2012
Pen test free_01_2012Pen test free_01_2012
Pen test free_01_2012
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Spy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting Secrets
 
Ecsa
EcsaEcsa
Ecsa
 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
IT & Security opportunities 2015
IT & Security opportunities 2015IT & Security opportunities 2015
IT & Security opportunities 2015
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
IT consultancy presentation
IT consultancy presentationIT consultancy presentation
IT consultancy presentation
 
Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking Services
 
Hacktive Security - IT Security Services
Hacktive Security - IT Security ServicesHacktive Security - IT Security Services
Hacktive Security - IT Security Services
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Information Security
Information SecurityInformation Security
Information Security
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 

CEH

  • 1. 1
  • 2. Riphah International University & International Council of E-Commerce Consultants.
  • 3. History of the Company The September 9/11 Attacks on the World Trade Center ignited a very important question in the hearts of the founders of EC–Council – Jay Bavisi and Haja Mohideen. Shortly after the attacks, they researched the web for “Information Security” programs that would be able to provide Information Security professionals with the necessary tools and education that will help them avert a cyber war should the need ever arise. The results returned from the research were disappointing and that motivated them to form the International Council of Electronic Commerce Consultants, known as the EC-Council. They soon gained the support of subject matter experts from all over the world that eventually led to the creation of various standards and certifications both in the electronic commerce and information security space.
  • 4. About EC-Council  Established in 2001 and HQ’ed in the USA, R&D office in India and International office based in Malaysia  Creator of the world-famous Certified Ethical Hacker certified program (CEH)  Certified more than 28,000 professionals from the FBI, CIA, US DOD, Microsoft, Symantec, Deloitte and Fortune 500 companies  More than 450 training partners in over 60 countries  Partners with UN/ITU via Cyber security arm - IMPACT  Delivery partners include McAfee, PwC, Deloitte, etc  More than 350 subject matter experts globally in developing contents  Delivers more than 20 different certifications in Information Security and eBusiness
  • 5. Collaboration With EC Council  RIU and EC Council signed 1st Pakistan Academic and Professional Partnership agreement to conduct all EC Council Information Security Certifications. It is an honor for Pakistan community as well as the opportunity for IT Professionals to do the Information Security Certification from EC Council authorized instructor and appear for exam (Free of Cost) under on roof of RIU.
  • 6. Owner of the Hacker Halted conference and workshop series, which had been organized in international cities such as Miami, Myrtle Beach, Dubai, Singapore, Kuala Lumpur, Mexico City, among others. Hacker Halted features renowned international speakers who are experts in the field of information security. Objective of Hacker Halted conference series is to raise international awareness towards increased education and ethics in information security.
  • 7. EC-Council IT Certification Levels • ECSS • Security • CEH/CNDA Fundamentals • CHFI • Security 5 • Network 5 • Wireless 5 • ENSA Entry Intermediate Level Level Advanced Specialized Level • ECSP/CSAD • ECSA • ECVP • LPT • ECDR/ECVT • ECIH • ECCI
  • 8. EC-Council Certification Quadrant Security 5 Network 5 ECVP Information Wireless5 ECDR/ECVT Technology Security ENSA Certification Certification CEH/CNDA = ECSA/LPT CHFI, ECCI, ECIH ECSP Cyber Law Programming Cyber Marketing Management CSAD E Business Security Certification Certification Knowledge Management Project Management CRM, SCM, ERP
  • 9. Typical Security Job Roles and responsibilities Job Level Typical Roles Corresponding Certifications & Designations Information IT/IS Assurance, Design, and MSS/ECSO (Coming Soon) Executive Compliance Information Assurance IT/IS oversight and Manager Personnel management Disaster Recovery Secure Penetration Testing Specialist Forensics Specialist VOIP Specialist Specialization Specialist Programmer roles including Pen Testing, Forensics, IT/IS Disaster Recover, Specialist Voice over IP, Secure Programming, etc. Network Installation, Configuration, IT/IS Admin maintenance, Information Assurance Standard Network IT/IS installation & Technician configuration Access to Information Computing Worker systems
  • 10. EC-Council IT Security Professional Certification Vs Job Role Information Security Specialist/Engineer/Officer, Vulnerability Management Analysts , IS Consultant CEH Only for Federal Agencies CNDA Penetration Tester, Senior Consultant, Senior Analyst ECSA/LPT ENSA Network/System Admin ECVP VoIP Engineer, Voice Professional/Consultant/Specialist, VoIP System Manager CHFI Computer Crime Investigator, Security Forensic Engineer, Computer Forensics Certification for Lawyers ECCI DR Specialist/Manager/Consultant, BC Manager, Incident Command System Advisor, ECDR/ECVT Virtualization/Infrastructure Engineer, Infrastructure Architect & Admin
  • 11. Addressing Global Learning Needs EC-Council Industry Academia EC-Council University Corporate University Collaboration University and Direct Market Market Student Market IT Professionals Universities, technical institutions Education Providers & and end users and education providers Students
  • 16.
  • 17. • We offer EC-Council Certified Ethical Hacker exam 312-50 preparation by EC-Council Certified Instructor on 27th September-01 October, 2010. • Who Should Attend This course will significantly benefit CIO, CTO, IT security officers, IT Managers, IT auditors, security professionals, Network administrators, and anyone who is concerned about the integrity of the network infrastructure. • Duration: 5 days (9:00 – 5:00) • Certification The Certified Ethical Hacker certification exam 312-50 will be conducted on the last day of training. • Prometic Centre Students need to pass the online Prometric exam to receive the CEH certification. Riphah has the Prometric centre facility as well.
  • 18. Certified Ethical Hacker (CEH) Course Module  Introduction to Ethical Hacking  SQL Injection  Hacking Laws  Hacking Wireless Networks  Footprinting  Physical Security  Google Hacking  Linux Hacking  Scanning  Evading IDS, Firewalls and Detecting Honey  Enumeration Pots  System Hacking  Buffer Overflows  Trojans and Backdoors  Cryptography  Viruses and Worms  Penetration Testing  Sniffers  Covert Hacking  Social Engineering  Writing Virus Codes  Phishing  Assembly Language Tutorial  Hacking Email Accounts  Exploit Writing  Denial-of-Service  Smashing the Stack for Fun and Profit  Session Hijacking  Windows Based Buffer Overflow Exploit  Hacking Web Servers Writing  Web Application Vulnerabilities  Reverse Engineering  Web-Based Password Cracking  Macintosh Hacking Techniques  Hacking Routers, cable Modems and Firewalls  Hacking Mobile Phones, PDA and Handheld Devices
  • 19. Certified Ethical Hacker (CEH) Course Module  Bluetooth Hacking  Data Loss Prevention  VoIP Hacking  Hacking Global Positioning System (GPS)  RFID Hacking  Computer Forensics and Incident Handling  Spamming  Credit Card Frauds  Hacking USB Devices  How to Steal Passwords  Hacking Database Servers  Firewall Technologies  Cyber Warfare- Hacking, Al-Qaida and Threats and Countermeasures Terrorism  Case Studies  Internet Content Filtering Techniques   Privacy on the Internet  Botnets  Securing Laptop Computers  Economic Espionage  Spying Technologies  Patch Management  Corporate Espionage- Hacking Using  Security Convergence Insiders  Creating Security Policies  Software Piracy and Warez  Hacking and Cheating Online Games  Hacking RSS and Atom  Hacking Web Browsers  Proxy Server Technologies
  • 20. Dedicated EC Council Certification Lab & Prometric Centre
  • 22. Certified Members List…. Canon Cingular Wireless Bell Canada Hewlett Packard Columbia Daily Tribune Sony US Air Force Reserve Marriott Hotel Kodak US Embassy Quantum Research Ontario Provincial Police Verizon US Military Harris Corporation PFIZER IBM Global Services Xerox HDFC Bank UPS Riphah International University University of Memphis American Express Philips Electronics Microsoft Corporation FBI U.S. Army Worldcom Boehringer Ingelheim Trusecure Wipro Schering US Department of Defense United States Marine Corps Accenture Fedex Reserve Bank of India SAIC Dunlop US Air Force Fujitsu Novell Singapore Airlines Supreme Court of the Philippines Cisco Nortel Networks United Nations Mentor Graphics MCI Ministry of Defense, UK TCS Check Point Software Singapore Police NISER