Title: We offer CEH training in Delhi
1(No Transcript)
2 The Most Comprehensive Ethical Hacking Course
in the World -
- This is the worlds most advanced certified
ethical hacking course with 18 of the most
current security domains any individual will ever
want to know when they are planning to beef up
the information security posture of their
organization. - In 18 comprehensive modules, the course covers
270 attack technologies, commonly used by hackers.
3 Certified Ethical Hacking Certification -
- A Certified Ethical Hacker is a skilled
professional who understands and knows how to
look for weaknesses and vulnerabilities in target
systems and uses the same knowledge and tools as
a malicious hacker, but in a lawful and
legitimate manner to assess the security posture
of a target systems. - The CEH credential certifies individuals in the
specific network security discipline of Ethical
Hacking from a vendor-neutral perspective.
4 The purpose of the CEH credential -
- Establish and govern minimum standards for
credentialing professional information security
specialists in ethical hacking measures. - Inform the public that credentialed individuals
meet or exceed the minimum standards. - Reinforce ethical hacking as a unique and
self-regulating profession.
5 About the Exam
- Number of Questions 125
- Test Duration 4 Hours
- Test Format Multiple Choice
- Test Delivery ECC EXAM, VUE
- Exam Prefix 312-50 (ECC EXAM), 312-50 (VUE)
6 Who Is It For?
- The Certified Ethical Hacking training course
will significantly benefit security officers,
auditors, security professionals, site
administrators, and anyone who is concerned about
the integrity of the network infrastructure.
7 What is New in CEH Version 9 Course
- New Vulnerabilities Are Addressed -
- Heartbleed CVE-2014-0160
- Heartbleed makes the SSL layer used by millions
of websites and thousands of cloud providers
vulnerable. - Detailed coverage and labs in Module 18
Cryptography - Shellshock CVE-2014-6271
- Shellshock exposes vulnerability in Bash, the
widely-used shell for Unix-based operating
systems such as Linux and OS X. - Poodle CVE-2014-3566
- POODLE lets attackers decrypt SSLv3 connections
and hijack the cookie session that identifies you
to a service, allowing them to control your
account without needing your password.
8- Focus on New Attack Vectors-
- CEHv9 focuses on performing hacking (Foot
printing, scanning, enumeration, system hacking,
sniffing, DDoS attack, etc.) using mobile phones. - Courseware covers latest mobile hacking tools in
all the modules . - Coverage of latest Trojan, Virus, Backdoors .
- Courseware covers Information Security Controls
and Information . - Security Laws and Standards .
- Labs on Hacking Mobile Platforms and Cloud
Computing . - More than 40 percent new labs are added from
Version 8 . - More than 1500 new/updated tools.
- CEHv9 program focuses on addressing security
issues to the latest operating systems like
Windows 8.1 .
9 Frequently Asked Questions
- 1. Can I pursue self-study and attempt the exam
instead of attending formal training? - The answer is yes. You must show 2 years of work
experience in security related field. You must
also submit a CEH exam eligibility application
and obtain an authorization from EC-Council
before you can attempt the exam. For more
details, please click HERE.
10- 2. Isn't this knowledge harmful? Why do you make
it available so easily to the public? - EC-Council fulfills its social responsibility by
ensuring that only persons with a minimum of two
years of security related experience are eligible
for the course. In addition, all candidates are
required to sign an agreement where they agree to
respect the knowledge acquired and not misuse it
in any way. The candidate also agrees to abide by
all legal laws of their respective countries of
residence in the use of thus acquired knowledge.
Besides the CEH exam is a tough one to pass as
students must have in-depth knowledge to achieve
the globally recognized ethical hacking
certification.
11- 3. Aren't tools meant for script kiddies?
- Does it matter if an elite hacker writes a buffer
overflow or a script- Kiddy runs a tool if the
target system gets compromised anyway? The point
here is that the enemy may be intellectually
great or small, but he/she requires just one port
of entry to wreck damage while the organization
has the entire perimeter to guard with limited
time and resources. - 4. Do reformed hackers teach your course?
- EC-Council places great emphasis on the quality
of its instructors. A 17-year-old will not be
teaching security to professionals at our
accredited training centers. Certainly,
experience is the greatest teacher. However,
EC-Council adheres to a code of ethics and
encourages security professionals with
significant years of teaching experience in the
industry and a security background to handle our
security related courses.
12- 5. What makes this course different from others
in the market? - The Ethical Hacking and Countermeasures course
prepares candidates for the CEH exam offered by
EC-Council. The course focuses on hacking
techniques and technologies from an offensive
perspective. This advanced security course is
regularly updated to reflect the latest
developments in the domain, including new hacking
techniques, exploits, automated programs as well
as defensive recommendations as outlined by
experts in the field. The CEH body of knowledge
represents detailed contributions from security
experts, academicians, industry practitioners and
the security community at large.
13- 6. What can I take back to my organization if I
certify as a CEH? - EC-Council believes in giving back to the
security community as it has partaken of it. When
you are a Certified Ethical Hacker, you are more
than a security auditor or a vulnerability tester
or a penetration tester alone. You are exposed to
security checklists that will help you audit the
organizations information assets, tools which
will check for vulnerabilities that can be
exploited and above all a methodology to assess
the security posture of your organization by
doing a penetration test against it. In short,
the knowledge you will acquire has practical
value to make your work place a more secure and
efficient one.
14- 7. I would like to provide professional service
as a CEH professional. What can I expect to be
paid per assignment? - The remuneration per assignment will vary with
specifics of the client environment. However, on
an average you can expect to be paid around
15,000 to 45,000 per assignment depending on
location and class size. - 8. Where does CEH stand when compared to other
educational offerings in the field of information
security? - Consider this A security defense course educates
candidates regarding proper configuration,
firewalls, or rather preemptive security. CEH
takes the alternative approach defense in depth
by attacking the systems. This is in sharp
contrast to courses that teach defensive tactics
alone. CEH imparts offensive tactics supplemented
with defensive countermeasures. This ensures that
the CEH professional can have a holistic security
perspective of the organization.
15- 9. What are Hacking techniques and their
technology? - Hacking techniques represent ways and means by
which computer programs can be made to behave in
ways they are not meant to. These techniques
extend beyond the technology domain and can be
applied to test security policies and procedures.
Hacking technologies are used to refer to those
tools and automated programs that can be used by
perpetrators against an organization to incur
critical damage. As technology advances, the
skills required to execute a hack are much lesser
as pre-compiled programs are available to effect
havoc with simple point and click.
16- 10. It is all too technical. Do you reflect
real-world business issues? - The value of CEH lies in its practical value.
Over 18 domains, students are exposed to business
risks and the potential damage that can occur due
to negligence. Students will be able to make an
informed decision regarding the amount of risk a
company can face if it chooses to address a
security concern. - 11. What is the employment value of CEH?
- The ANSI accredited Ethical Hacking program is
primarily targeted at security professionals who
want to acquire a well-rounded body of knowledge
to have better opportunities in this field.
Acquiring a Certified Ethical Hacking
Certification means the candidate has a minimum
baseline knowledge of security threats, risks and
countermeasures. Organizations can rest assured
that they have a candidate who is more than a
systems administrator, a security auditor, a
hacking tool analyst or a vulnerability tester.
The candidate is assured of having both business
and technical knowledge.
17- 12. I am a CEH. What is my level?
- Congratulations on becoming a CEH! You have
joined an elite group of professionals around the
world. Your next level is to become an EC-Council
Certified Security Analyst (ECSA) .
18Related Courses -
CNDA ECSA
CEH CND
19(No Transcript)
20 CODEC NETWORKS PVT LTD 507, New Delhi House,
Barakhamba Road, Connaught Place, New Delhi
110001 Tel 91 11 43752299, 43049696 Mob 91
9971676124, 9015258288, 9911738718, E-Mail
trainings_at_codecnetworks.com, mktg_at_codecnetworks.co
m Branch Offices Greater Noida, Mumbai,
Bangalore, Ahmedabad International Associates
USA Australia Japan Hong Kong Ghana
www.codecnetworks.com CODEC Networks logo are
trademarks of CODEC Networks. All other
trademarks are the property of their respective
owners. The information presented is subject to
change without notice. CODEC Networks assumes no
responsibility for inaccuracies contained
herein. 2007 CODEC NETWORKS. All rights
reserved. 22137 (10)