Download presentation
Presentation is loading. Please wait.
Published byEvan Rogers Modified over 11 years ago
1
Ethical Hacking Introduction
2
EC-Council Introductions Name Company Affiliation Title / Function Job Responsibility System security related experience Expectations
3
EC-Council Course Materials Identity Card Student Courseware Lab Manual / Workbook Compact Disc Course Evaluation Reference Materials
4
EC-Council Course Outline Module I : Introduction to Ethical Hacking Module II: Footprinting Module III: Scanning Module IV: Enumeration Module V: System Hacking
5
EC-Council Course Outline (contd..) Module VI: Trojans and Backdoors Module VII: Sniffers Module VIII: Denial of Service Module IX: Social Engineering Module X: Session Hijacking
6
EC-Council Course Outline (contd..) Module XI: Hacking Web Servers Module XII: Web Application Vulnerabilities Module XIII: Web Based Password Cracking Techniques Module XIV: SQL Injection Module XV: Hacking Wireless Networks
7
EC-Council Course Outline (contd..) Module XVI: Viruses Module XVII: Novell Hacking Module XVIII: Linux Hacking Module XIX: Evading IDS, Firewalls and Honey pots Module XX: Buffer Overflows Module XXI: Cryptography
8
EC-Council EC-Council Certified e- business Certification Program There are five e-Business certification tracks under EC-Council Accreditation body: 1. Certified e-Business Associate 2. Certified e-Business Professional 3. Certified e-Business Consultant 4. E++ Certified Technical Consultant 5. Certified Ethical Hacker
9
EC-Council EC-Council Certified Ethical Hacker
10
EC-Council Student Facilities Building HoursPhones ParkingMessages RestroomsSmoking RecyclingMeals Class Hours
11
EC-Council Lab Sessions are designed to reinforce the classroom sessions The sessions are intended to give a hands on experience only and does not guarantee proficiency. Lab Sessions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.