Title: Ethical Hacking Training in Chennai
1 v.8.0.6.09.14
CEHv8
Engineered by Hackers. Presented by Professionals.
www.mazenetsolution.com
2Critical recognition of Importance of IS
capacity building from Indias Education
Authority.
www.mazenetsolution.com
3www.mazenetsolution.com
4Latest Operating Systems (Windows 8 and Windows
Server 2012)
CEH v8 program focuses on addressing security
issues to the latest operating systems including
Windows 8 and Windows Server 2012
It also focuses on addressing the existing
threats to operating environments dominated by
Windows 7 and other operating systems (backward
compatibility)
www.mazenetsolution.com
5Emphasis on Mobile Platforms and Tablet Computers
- CEHv8 focuses on the latest hacking attacks
targeted to mobile platform and tablet computers
and covers countermeasures to secure mobile
infrastructure - Coverage of latest development in mobile and web
technologies including Andriod OS 4.1 and Apps,
iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8
and HTML 5
www.mazenetsolution.com
6 Advanced Lab Environment
www.mazenetsolution.com
7What is New in CEHv8?
New Contents
More than 40 percent new labs are added
More than 600 new instructor slides
More than 1500 new/updated tools
www.mazenetsolution.com
8Module Comparison of CEHv8 with CEHv7
The topics highlighted in red under CEHv8 Module
01 Introduction to Ethical Hacking are the new
additions
CEHv7 Module 01 Introduction to Ethical Hacking
CEHv8 Module 01 Introduction to Ethical Hacking
- Data Breach Investigations Report
- Essential Terminologies
- Elements of Information Security
- Top Information Security Attack Vectors
- Motives, Goals, and Objectives of Information
Security Attacks - Information Security Threats
- Information Warfare
- IPv6 Security Threats
- Hacking vs. Ethical Hacking
- Effects of Hacking on Business
- Who Is a Hacker?
- Hacking Phases
- Types of Attacks on a System
- Why Ethical Hacking is Necessary
- Skills of an Ethical Hacker
- Incident Management Process
- Types of Security Policies
- Vulnerability Research
- What Is Penetration Testing?
- Data Breach Investigations Report
- Essential Terminologies
- Elements of Information Security
- Effects of Hacking on Business
- Who Is a Hacker?
- Hacking Phases
- Types of Attacks on a System
- Why Ethical Hacking is Necessary
- Skills of an Ethical Hacker
- Vulnerability Research
- What Is Penetration Testing?
www.mazenetsolution.com
9Module Comparison of CEHv8 with CEHv7
The topics highlighted in red under CEHv8 Module
05 System Hacking are the new additions
CEHv7 Module 05 System Hacking
CEHv8 Module 05 System Hacking
- Types of Keystroke Loggers and Spywares
- System Hacking Goals
- CEH Hacking Methodology (CHM)
- Password Cracking
- Stealing Passwords Using Keyloggers
- Microsoft Authentication
- How to Defend against Password Cracking
- Privilege Escalation
- Types of Privilege Escalation
- Executing Applications
- Methodology of Attacker in using Remote Keylogger
- Anti-Keylogger and Anti-Spywares
- Various methods to place a rootkit
- Detecting Rootkits
- NTFS Stream Manipulation
- Application of steganography
- Classification of Steganography
- Audio Steganography Methods
- Issues in Information hiding
- System Hacking Goals
- CEH Hacking Methodology (CHM)
- Password Cracking
- Microsoft Authentication
- How to Defend against Password Cracking
- Privilege Escalation
- Types of Privilege Escalation
- Executing Applications
- Types of Keystroke Loggers and Spywares
- Anti-Keylogger and Anti-Spywares
- Detecting Rootkits
- NTFS Stream Manipulation
- Classification of Steganography
- Steganalysis Methods/Attacks on Steganography
- Covering Tracks
- Penetration Testing
www.mazenetsolution.com
10Course Outline
www.mazenetsolution.com
11DVD-ROM Content
- CEHv8 DVD-ROMs includes approximately 24 GBs of
hacking tools - All the tools are categories according to
courseware presentation - DVDs include white papers and reference material
on various security concepts
www.mazenetsolution.com
12Exam Info and Exam Portal
Exam Portaland Codes
Exam Info
- The exam code varies when taken at different
testing centers. - Exam 315-50-ANSI Web based Prometric Prime at
Accredited Training Centers (ATC) - Exam 350CEHv8 Proctored test at Authorized
Prometric Testing Centers (APTC) globally - Exam 312-50v8 VUE Testing centers
- Number of Questions 125
- Passing Score 70
- Test Duration 4 Hours
- Test Format Multiple Choice
- Test Delivery Prometric Prime / VUE/APTC
- Validity 3 years
www.mazenetsolution.com
13ANSI Compliant
All CEHv8 members will be accredited under the
ANSIs personal certification program
I
www.mazenetsolution.com
14ANSI Compliant
ANSI Accredited Exam Process
1
2
High quality certification exam
ANSI/ISO/IEC 17024
Standard exam development process
Imparts high value to our certifications
3
4
www.mazenetsolution.com
15N.I.C.E. Framework
100 percent mapping to NICE Protect and Defend
specialty area
I
Skills and job roles based learning
Compliance to National Initiative for
Cybersecurity Education (NICE)
II
Standard-based training modules
III
Better industry acceptance
IV
www.mazenetsolution.com
16DoD 8750
The United States of America Department of
Defense issued Directive 8570 in 2004 to
mandate baseline certifications for all
Information Assurance IA positions
In February of 2010, this directive was enhanced
to include the Certified Ethical Hacker across
the Computer Network Defense Categories CND
CEH is a part of
CND Infrastructure Support
CND Incident Responder
CND Analyst
CND Auditor
www.mazenetsolution.com
17NSA/CNSS Compliant
Recognition by National Security Agency (NSA) and
the Committee on National Security Systems (CNSS)
CNSS 4013 Recognition
Standard based required training for network
security professionals
Better industry acceptance
www.mazenetsolution.com