3. History of the Company
The September 9/11 Attacks on the World Trade Center ignited a very important
question in the hearts of the founders of EC–Council – Jay Bavisi and Haja
Mohideen.
Shortly after the attacks, they researched the web for “Information Security”
programs that would be able to provide Information Security professionals with
the necessary tools and education that will help them avert a cyber war should
the need ever arise.
The results returned from the research were disappointing and that motivated
them to form the International Council of Electronic Commerce Consultants,
known as the EC-Council.
They soon gained the support of subject matter experts from all over the world
that eventually led to the creation of various standards and certifications both
in the electronic commerce and information security space.
4. About EC-Council
Established in 2001 and HQ’ed in the USA, R&D office in India and
International office based in Malaysia
Creator of the world-famous Certified Ethical Hacker certified
program (CEH)
Certified more than 28,000 professionals from the FBI, CIA, US
DOD, Microsoft, Symantec, Deloitte and Fortune 500 companies
More than 450 training partners in over 60 countries
Partners with UN/ITU via Cyber security arm - IMPACT
Delivery partners include McAfee, PwC, Deloitte, etc
More than 350 subject matter experts globally in developing
contents
Delivers more than 20 different certifications in Information
Security and eBusiness
5. Collaboration With EC Council
RIU and EC Council signed 1st Pakistan Academic and Professional
Partnership agreement to conduct all EC Council Information
Security Certifications. It is an honor for Pakistan community as
well as the opportunity for IT Professionals to do the Information
Security Certification from EC Council authorized instructor and
appear for exam (Free of Cost) under on roof of RIU.
6. Owner of the Hacker Halted conference and workshop series,
which had been organized in international cities such as Miami,
Myrtle Beach, Dubai, Singapore, Kuala Lumpur, Mexico City, among
others. Hacker Halted features renowned international speakers
who are experts in the field of information security.
Objective of Hacker Halted conference series is to raise
international awareness towards increased education and ethics in
information security.
9. Typical Security Job Roles and
responsibilities
Job Level Typical Roles Corresponding Certifications & Designations
Information
IT/IS Assurance,
Design, and
MSS/ECSO (Coming Soon)
Executive
Compliance
Information
Assurance
IT/IS
oversight and
Manager Personnel
management
Disaster Recovery Secure
Penetration Testing Specialist Forensics Specialist VOIP Specialist
Specialization Specialist Programmer
roles including
Pen Testing,
Forensics,
IT/IS
Disaster Recover,
Specialist Voice over IP,
Secure
Programming,
etc.
Network
Installation,
Configuration,
IT/IS Admin maintenance,
Information
Assurance
Standard Network
IT/IS
installation &
Technician configuration
Access to
Information
Computing
Worker systems
10. EC-Council IT Security Professional Certification Vs
Job Role
Information Security Specialist/Engineer/Officer, Vulnerability Management Analysts , IS
Consultant
CEH
Only for Federal Agencies
CNDA
Penetration Tester, Senior Consultant, Senior Analyst
ECSA/LPT
ENSA Network/System Admin
ECVP VoIP Engineer, Voice Professional/Consultant/Specialist, VoIP System Manager
CHFI Computer Crime Investigator, Security Forensic Engineer,
Computer Forensics Certification for Lawyers
ECCI
DR Specialist/Manager/Consultant, BC Manager, Incident Command System Advisor,
ECDR/ECVT
Virtualization/Infrastructure Engineer, Infrastructure Architect & Admin
11. Addressing Global Learning Needs
EC-Council
Industry Academia EC-Council University
Corporate University Collaboration University and Direct
Market Market Student Market
IT Professionals Universities, technical institutions Education Providers &
and end users and education providers Students
17. • We offer EC-Council Certified Ethical Hacker exam 312-50 preparation
by EC-Council Certified Instructor on 27th September-01 October, 2010.
• Who Should Attend
This course will significantly benefit CIO, CTO, IT security
officers, IT Managers, IT auditors, security professionals, Network
administrators, and anyone who is concerned about the integrity of the
network infrastructure.
• Duration:
5 days (9:00 – 5:00)
• Certification
The Certified Ethical Hacker certification exam 312-50 will be
conducted on the last day of training.
• Prometic Centre
Students need to pass the online Prometric exam to receive the
CEH certification. Riphah has the Prometric centre facility as well.
18. Certified Ethical Hacker (CEH) Course Module
Introduction to Ethical Hacking SQL Injection
Hacking Laws Hacking Wireless Networks
Footprinting Physical Security
Google Hacking Linux Hacking
Scanning Evading IDS, Firewalls and Detecting Honey
Enumeration Pots
System Hacking Buffer Overflows
Trojans and Backdoors Cryptography
Viruses and Worms Penetration Testing
Sniffers Covert Hacking
Social Engineering Writing Virus Codes
Phishing Assembly Language Tutorial
Hacking Email Accounts Exploit Writing
Denial-of-Service Smashing the Stack for Fun and Profit
Session Hijacking Windows Based Buffer Overflow Exploit
Hacking Web Servers Writing
Web Application Vulnerabilities Reverse Engineering
Web-Based Password Cracking Macintosh Hacking
Techniques Hacking Routers, cable Modems and Firewalls
Hacking Mobile Phones, PDA and Handheld
Devices
19. Certified Ethical Hacker (CEH) Course Module
Bluetooth Hacking Data Loss Prevention
VoIP Hacking Hacking Global Positioning System (GPS)
RFID Hacking Computer Forensics and Incident Handling
Spamming Credit Card Frauds
Hacking USB Devices How to Steal Passwords
Hacking Database Servers Firewall Technologies
Cyber Warfare- Hacking, Al-Qaida and Threats and Countermeasures
Terrorism Case Studies
Internet Content Filtering Techniques
Privacy on the Internet Botnets
Securing Laptop Computers Economic Espionage
Spying Technologies Patch Management
Corporate Espionage- Hacking Using Security Convergence
Insiders
Creating Security Policies
Software Piracy and Warez
Hacking and Cheating Online Games
Hacking RSS and Atom
Hacking Web Browsers
Proxy Server Technologies
22. Certified Members List….
Canon Cingular Wireless Bell Canada
Hewlett Packard Columbia Daily Tribune Sony
US Air Force Reserve Marriott Hotel Kodak
US Embassy Quantum Research Ontario Provincial Police
Verizon US Military Harris Corporation
PFIZER IBM Global Services
Xerox
HDFC Bank UPS
Riphah International University
University of Memphis American Express
Philips Electronics
Microsoft Corporation FBI
U.S. Army
Worldcom Boehringer Ingelheim
Trusecure Wipro Schering
US Department of Defense United States Marine Corps Accenture
Fedex Reserve Bank of India SAIC
Dunlop US Air Force Fujitsu
Novell Singapore Airlines Supreme Court of the Philippines
Cisco Nortel Networks United Nations
Mentor Graphics MCI Ministry of Defense, UK
TCS Check Point Software Singapore Police
NISER