SlideShare a Scribd company logo
1 of 17
CEHv8 
v.8.0.6.09.14 
Engineered by Hackers. Presented by Professionals. 
www.mazenetsolution.com
Critical recognition of 
Importance of IS 
capacity building from 
India’s 
Education Authority. 
www.mazenetsolution.com
Technology 
demands 
critical 
updates 
Industries 
want better 
skills 
Better 
courseware 
and supporting 
systems 
Professionals 
want better 
recognition 
www.mazenetsolution.com
Latest Operating Systems (Windows 8 and 
Windows Server 2012) 
CEH v8 program focuses on addressing security issues to t 
he latest operating systems including Windows 8 and Wind 
ows Server 2012 
It also focuses on addressing the existing threats to 
operating environments dominated by Windows 7 and other 
operating systems (backward compatibility) 
www.mazenetsolution.com
Emphasis on Mobile Platforms and 
Tablet Computers 
CEHv8 focuses on the latest 
hacking attacks targeted to 
mobile platform and tablet 
computers and covers 
countermeasures to secure 
mobile infrastructure 
Coverage of latest development 
in mobile and web technologies 
including Andriod OS 4.1 and 
Apps, iOS 6 and Apps, BlackBerry 
7 OS, Windows Phone 8 and 
HTML 5 
www.mazenetsolution.com
Advanced Lab Environment 
www.mazenetsolution.com
What is New in CEHv8? 
New Contents 
More than 40 
percent new labs 
are added 
More than 600 
new instructor 
slides 
More than 1500 
new/updated 
tools 
www.mazenetsolution.com
Module Comparison of CEHv8 with 
CEHv7 
The topics highlighted in red under CEHv8 Module 01: Introduction to Ethical Hacking are the new additions 
CEHv7 Module 01: Introduction to Ethical Hacking CEHv8 Module 01: Introduction to Ethical Hacking 
Data Breach Investigations Report 
Essential Terminologies 
Elements of Information Security 
Top Information Security Attack Vectors 
Motives, Goals, and Objectives of Information 
Security Attacks 
Information Security Threats 
Information Warfare 
IPv6 Security Threats 
Hacking vs. Ethical Hacking 
Effects of Hacking on Business 
Who Is a Hacker? 
Hacking Phases 
Types of Attacks on a System 
Why Ethical Hacking is Necessary 
Skills of an Ethical Hacker 
Incident Management Process 
Types of Security Policies 
Vulnerability Research 
What Is Penetration Testing? 
Data Breach Investigations Report 
Essential Terminologies 
Elements of Information Security 
Effects of Hacking on Business 
Who Is a Hacker? 
Hacking Phases 
Types of Attacks on a System 
Why Ethical Hacking is Necessary 
Skills of an Ethical Hacker 
Vulnerability Research 
What Is Penetration Testing? 
www.mazenetsolution.com
Module Comparison of CEHv8 with 
CEHv7 
The topics highlighted in red under CEHv8 Module 05 System Hacking are the new additions 
CEHv7 Module 05 System Hacking CEHv8 Module 05 System Hacking 
Types of Keystroke Loggers and Spywares 
System Hacking: Goals 
CEH Hacking Methodology (CHM) 
Password Cracking 
Stealing Passwords Using Keyloggers 
Microsoft Authentication 
How to Defend against Password Cracking 
Privilege Escalation 
Types of Privilege Escalation 
Executing Applications 
Methodology of Attacker in using Remote Keylogger 
Anti-Keylogger and Anti-Spywares 
Various methods to place a rootkit 
Detecting Rootkits 
NTFS Stream Manipulation 
Application of steganography 
Classification of Steganography 
Audio Steganography Methods 
Issues in Information hiding 
Steganalysis Methods/Attacks on Steganography 
Detecting Text, Image, Audio, and Video 
Steganography 
Covering Tracks 
Penetration Testing 
System Hacking: Goals 
CEH Hacking Methodology (CHM) 
Password Cracking 
Microsoft Authentication 
How to Defend against Password Cracking 
Privilege Escalation 
Types of Privilege Escalation 
Executing Applications 
Types of Keystroke Loggers and Spywares 
Anti-Keylogger and Anti-Spywares 
Detecting Rootkits 
NTFS Stream Manipulation 
Classification of Steganography 
Steganalysis Methods/Attacks on Steganography 
Covering Tracks 
Penetration Testing 
www.mazenetsolution.com
Course Outline 
Introduction to 
Ethical Hacking 
Footprinting and 
Reconnaissance 
Scanning 
Networks 
Enumeration 
System Hacking 
Trojans and 
Backdoors 
Viruses and 
Worms 
Sniffing 
Social 
Engineering 
Denial-of-Service 
Session 
Hijacking 
Hacking 
Webservers 
Hacking Web 
Applications 
SQL Injection 
Hacking 
Wireless 
Networks 
Evading IDS, 
Firewalls, and 
Honeypots 
Buffer Overflow Cryptography 
Penetration 
Testing 
www.mazenetsolution.com
DVD-ROM Content 
CEHv8 DVD-ROMs includes 
approximately 24 GBs of hacking tools 
All the tools are categories according to 
courseware presentation 
DVDs include white papers and 
reference material on various security 
concepts 
www.mazenetsolution.com
Number of Questions: 125 
Passing Score: 70% 
Test Duration: 4 Hours 
Test Format: Multiple Choice 
Test Delivery: Prometric 
Prime / VUE/APTC 
Validity: 3 years 
The exam code varies when 
taken at different testing 
centers. 
Exam 315-50-ANSI: Web based 
‘Prometric Prime’ at 
Accredited Training Centers 
(ATC) 
Exam 350CEHv8: Proctored 
test at Authorized Prometric 
Testing Centers (APTC) 
globally 
Exam 312-50v8: VUE Testing 
centers 
Exam Info 
Exam Portal 
and Codes 
Exam Info and Exam Portal 
www.mazenetsolution.com
ANSI Compliant 
All CEHv8 members will be accredited under the ANSI’s 
personal certification program 
www.mazenetsolution.com
ANSI Compliant 
ANSI Accredited Exam Process 
ANSI/ISO/IEC 17024 
High quality certification 
exam 
Standard exam 
development process 
Imparts high value to 
our certifications 
1 2 
3 4 
www.mazenetsolution.com
N.I.C.E. Framework 
Compliance to 
National Initiative 
for Cybersecurity 
Education (NICE) 
100 percent mapping to NICE Protect and 
Defend specialty area 
Skills and job roles based learning 
Standard-based training modules 
Better industry acceptance 
www.mazenetsolution.com
The United States of America Department of Defense issued 
Directive 8570 in 2004 to mandate baseline 
certifications for all Information Assurance “IA” positions 
CND 
Analyst 
CND 
Infrastructure 
Support 
CND Incident 
Responder 
CND Auditor 
In February of 2010, this directive was enhanced to include 
the Certified Ethical Hacker across the Computer Network 
Defense Categories “CND” 
CEH is a part of: 
DoD 8750 
www.mazenetsolution.com
NSA/CNSS Compliant 
Recognition by National Security Agency 
(NSA) and the Committee on National 
Security Systems (CNSS) 
Standard based required training for 
network security professionals 
Better industry acceptance 
CNSS 4013 
Recognition 
www.mazenetsolution.com

More Related Content

What's hot

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking course ppt
Ethical hacking course pptEthical hacking course ppt
Ethical hacking course ppt
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Hackers
HackersHackers
Hackers
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Viewers also liked

Ce hv7 module 02 footprinting and reconnaissance
Ce hv7 module 02 footprinting and reconnaissanceCe hv7 module 02 footprinting and reconnaissance
Ce hv7 module 02 footprinting and reconnaissance
Zuleima Parada
 
Ce hv7 module 06 trojans and backdoors
Ce hv7 module 06 trojans and backdoorsCe hv7 module 06 trojans and backdoors
Ce hv7 module 06 trojans and backdoors
Fco Javier SantaMaría
 
Ce hv7 module 08 sniffers
Ce hv7 module 08 sniffersCe hv7 module 08 sniffers
Ce hv7 module 08 sniffers
Zuleima Parada
 

Viewers also liked (20)

CEHV9
CEHV9CEHV9
CEHV9
 
ECC-Certificate
ECC-CertificateECC-Certificate
ECC-Certificate
 
Cehv8 - Module 15: Hacking Wireless Networks
Cehv8 - Module 15: Hacking Wireless NetworksCehv8 - Module 15: Hacking Wireless Networks
Cehv8 - Module 15: Hacking Wireless Networks
 
Ce hv8 module 03 scanning networks
Ce hv8 module 03 scanning networksCe hv8 module 03 scanning networks
Ce hv8 module 03 scanning networks
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13
 
CHFI
CHFICHFI
CHFI
 
Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.
 
Ce hv8 module 07 viruses and worms
Ce hv8 module 07 viruses and wormsCe hv8 module 07 viruses and worms
Ce hv8 module 07 viruses and worms
 
Cehv8 - Module 14: SQL injection
Cehv8 - Module 14: SQL injectionCehv8 - Module 14: SQL injection
Cehv8 - Module 14: SQL injection
 
Cehv8 - Module 17: Evading, IDS, firewalls, and honeypots
Cehv8 - Module 17: Evading, IDS, firewalls, and honeypotsCehv8 - Module 17: Evading, IDS, firewalls, and honeypots
Cehv8 - Module 17: Evading, IDS, firewalls, and honeypots
 
Ce hv7 module 12 hacking webservers
Ce hv7 module 12 hacking webserversCe hv7 module 12 hacking webservers
Ce hv7 module 12 hacking webservers
 
Ce hv7 module 02 footprinting and reconnaissance
Ce hv7 module 02 footprinting and reconnaissanceCe hv7 module 02 footprinting and reconnaissance
Ce hv7 module 02 footprinting and reconnaissance
 
Ce hv7 module 06 trojans and backdoors
Ce hv7 module 06 trojans and backdoorsCe hv7 module 06 trojans and backdoors
Ce hv7 module 06 trojans and backdoors
 
Ce hv7 module 04 enumeration
Ce hv7 module 04 enumerationCe hv7 module 04 enumeration
Ce hv7 module 04 enumeration
 
Ce hv7 module 09 social engineering
Ce hv7 module 09 social engineeringCe hv7 module 09 social engineering
Ce hv7 module 09 social engineering
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 - Module 16: Hacking Mobile Platforms
Cehv8 - Module 16: Hacking Mobile PlatformsCehv8 - Module 16: Hacking Mobile Platforms
Cehv8 - Module 16: Hacking Mobile Platforms
 
Ce hv7 module 10 denial of service
Ce hv7 module 10 denial of serviceCe hv7 module 10 denial of service
Ce hv7 module 10 denial of service
 
Ce hv7 module 08 sniffers
Ce hv7 module 08 sniffersCe hv7 module 08 sniffers
Ce hv7 module 08 sniffers
 
Cehv8 - Module 05: System Hacking
Cehv8 - Module 05: System HackingCehv8 - Module 05: System Hacking
Cehv8 - Module 05: System Hacking
 

Similar to Ethical Hacking

Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
Mercury Solutions Limited
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
baoyin
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
bestip
 

Similar to Ethical Hacking (20)

Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
How to Learn Ethical Hacking from Scratch?
How to Learn Ethical Hacking from Scratch?How to Learn Ethical Hacking from Scratch?
How to Learn Ethical Hacking from Scratch?
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
OWASP: Building Secure Web Apps
OWASP: Building Secure Web AppsOWASP: Building Secure Web Apps
OWASP: Building Secure Web Apps
 
edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochure
 
Ce hv10 brochure
Ce hv10 brochureCe hv10 brochure
Ce hv10 brochure
 
Ecsa Course
Ecsa CourseEcsa Course
Ecsa Course
 
Agnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know itAgnitio: its static analysis, but not as we know it
Agnitio: its static analysis, but not as we know it
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 

More from Mazenetsolution

More from Mazenetsolution (20)

Tally Auto E-mail Module | Mazenet Technologies
Tally Auto E-mail Module | Mazenet TechnologiesTally Auto E-mail Module | Mazenet Technologies
Tally Auto E-mail Module | Mazenet Technologies
 
Tally Auto SMS Module| Mazenet Technologies
Tally Auto SMS  Module| Mazenet TechnologiesTally Auto SMS  Module| Mazenet Technologies
Tally Auto SMS Module| Mazenet Technologies
 
Tally auto synchronization
Tally auto synchronization Tally auto synchronization
Tally auto synchronization
 
Print barcode using voucher- Mazenettechnologies
Print barcode using voucher- MazenettechnologiesPrint barcode using voucher- Mazenettechnologies
Print barcode using voucher- Mazenettechnologies
 
Copy user list | Tally | Tally Software | Accounting Software | Mazenet
Copy user list | Tally | Tally Software | Accounting Software | MazenetCopy user list | Tally | Tally Software | Accounting Software | Mazenet
Copy user list | Tally | Tally Software | Accounting Software | Mazenet
 
Auto synchronization | Tally Software | Mazenet Technologies
Auto synchronization | Tally Software | Mazenet TechnologiesAuto synchronization | Tally Software | Mazenet Technologies
Auto synchronization | Tally Software | Mazenet Technologies
 
Auto backup | Tally Coimbatore | Tally Software
Auto backup | Tally Coimbatore | Tally SoftwareAuto backup | Tally Coimbatore | Tally Software
Auto backup | Tally Coimbatore | Tally Software
 
Mazenet Technologies-Tally
Mazenet Technologies-TallyMazenet Technologies-Tally
Mazenet Technologies-Tally
 
Android - Intents - Mazenet Solution
Android - Intents - Mazenet SolutionAndroid - Intents - Mazenet Solution
Android - Intents - Mazenet Solution
 
Java - Servlet - Mazenet Solution
Java - Servlet - Mazenet SolutionJava - Servlet - Mazenet Solution
Java - Servlet - Mazenet Solution
 
Software Testing - Tool support for testing (CAST) - Mazenet Solution
Software Testing - Tool support for testing (CAST) - Mazenet SolutionSoftware Testing - Tool support for testing (CAST) - Mazenet Solution
Software Testing - Tool support for testing (CAST) - Mazenet Solution
 
Software Testing - Test management - Mazenet Solution
Software Testing - Test management - Mazenet SolutionSoftware Testing - Test management - Mazenet Solution
Software Testing - Test management - Mazenet Solution
 
Red Hat - LVM - Mazenet Solution
Red Hat - LVM - Mazenet SolutionRed Hat - LVM - Mazenet Solution
Red Hat - LVM - Mazenet Solution
 
PHP - Introduction to PHP - Mazenet Solution
PHP - Introduction to PHP - Mazenet SolutionPHP - Introduction to PHP - Mazenet Solution
PHP - Introduction to PHP - Mazenet Solution
 
Static testing techniques
Static testing techniquesStatic testing techniques
Static testing techniques
 
Java- GUI- Mazenet solution
Java- GUI- Mazenet solutionJava- GUI- Mazenet solution
Java- GUI- Mazenet solution
 
Oracle- Introduction to Sql commands- Mazenet solution
Oracle- Introduction to Sql commands- Mazenet solutionOracle- Introduction to Sql commands- Mazenet solution
Oracle- Introduction to Sql commands- Mazenet solution
 
Process management in linux
Process management in linuxProcess management in linux
Process management in linux
 
Software Testing- Principles of testing- Mazenet Solution
Software Testing- Principles of testing- Mazenet SolutionSoftware Testing- Principles of testing- Mazenet Solution
Software Testing- Principles of testing- Mazenet Solution
 
Java- JDBC- Mazenet Solution
Java- JDBC- Mazenet SolutionJava- JDBC- Mazenet Solution
Java- JDBC- Mazenet Solution
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Ethical Hacking

  • 1. CEHv8 v.8.0.6.09.14 Engineered by Hackers. Presented by Professionals. www.mazenetsolution.com
  • 2. Critical recognition of Importance of IS capacity building from India’s Education Authority. www.mazenetsolution.com
  • 3. Technology demands critical updates Industries want better skills Better courseware and supporting systems Professionals want better recognition www.mazenetsolution.com
  • 4. Latest Operating Systems (Windows 8 and Windows Server 2012) CEH v8 program focuses on addressing security issues to t he latest operating systems including Windows 8 and Wind ows Server 2012 It also focuses on addressing the existing threats to operating environments dominated by Windows 7 and other operating systems (backward compatibility) www.mazenetsolution.com
  • 5. Emphasis on Mobile Platforms and Tablet Computers CEHv8 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure Coverage of latest development in mobile and web technologies including Andriod OS 4.1 and Apps, iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8 and HTML 5 www.mazenetsolution.com
  • 6. Advanced Lab Environment www.mazenetsolution.com
  • 7. What is New in CEHv8? New Contents More than 40 percent new labs are added More than 600 new instructor slides More than 1500 new/updated tools www.mazenetsolution.com
  • 8. Module Comparison of CEHv8 with CEHv7 The topics highlighted in red under CEHv8 Module 01: Introduction to Ethical Hacking are the new additions CEHv7 Module 01: Introduction to Ethical Hacking CEHv8 Module 01: Introduction to Ethical Hacking Data Breach Investigations Report Essential Terminologies Elements of Information Security Top Information Security Attack Vectors Motives, Goals, and Objectives of Information Security Attacks Information Security Threats Information Warfare IPv6 Security Threats Hacking vs. Ethical Hacking Effects of Hacking on Business Who Is a Hacker? Hacking Phases Types of Attacks on a System Why Ethical Hacking is Necessary Skills of an Ethical Hacker Incident Management Process Types of Security Policies Vulnerability Research What Is Penetration Testing? Data Breach Investigations Report Essential Terminologies Elements of Information Security Effects of Hacking on Business Who Is a Hacker? Hacking Phases Types of Attacks on a System Why Ethical Hacking is Necessary Skills of an Ethical Hacker Vulnerability Research What Is Penetration Testing? www.mazenetsolution.com
  • 9. Module Comparison of CEHv8 with CEHv7 The topics highlighted in red under CEHv8 Module 05 System Hacking are the new additions CEHv7 Module 05 System Hacking CEHv8 Module 05 System Hacking Types of Keystroke Loggers and Spywares System Hacking: Goals CEH Hacking Methodology (CHM) Password Cracking Stealing Passwords Using Keyloggers Microsoft Authentication How to Defend against Password Cracking Privilege Escalation Types of Privilege Escalation Executing Applications Methodology of Attacker in using Remote Keylogger Anti-Keylogger and Anti-Spywares Various methods to place a rootkit Detecting Rootkits NTFS Stream Manipulation Application of steganography Classification of Steganography Audio Steganography Methods Issues in Information hiding Steganalysis Methods/Attacks on Steganography Detecting Text, Image, Audio, and Video Steganography Covering Tracks Penetration Testing System Hacking: Goals CEH Hacking Methodology (CHM) Password Cracking Microsoft Authentication How to Defend against Password Cracking Privilege Escalation Types of Privilege Escalation Executing Applications Types of Keystroke Loggers and Spywares Anti-Keylogger and Anti-Spywares Detecting Rootkits NTFS Stream Manipulation Classification of Steganography Steganalysis Methods/Attacks on Steganography Covering Tracks Penetration Testing www.mazenetsolution.com
  • 10. Course Outline Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking Trojans and Backdoors Viruses and Worms Sniffing Social Engineering Denial-of-Service Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls, and Honeypots Buffer Overflow Cryptography Penetration Testing www.mazenetsolution.com
  • 11. DVD-ROM Content CEHv8 DVD-ROMs includes approximately 24 GBs of hacking tools All the tools are categories according to courseware presentation DVDs include white papers and reference material on various security concepts www.mazenetsolution.com
  • 12. Number of Questions: 125 Passing Score: 70% Test Duration: 4 Hours Test Format: Multiple Choice Test Delivery: Prometric Prime / VUE/APTC Validity: 3 years The exam code varies when taken at different testing centers. Exam 315-50-ANSI: Web based ‘Prometric Prime’ at Accredited Training Centers (ATC) Exam 350CEHv8: Proctored test at Authorized Prometric Testing Centers (APTC) globally Exam 312-50v8: VUE Testing centers Exam Info Exam Portal and Codes Exam Info and Exam Portal www.mazenetsolution.com
  • 13. ANSI Compliant All CEHv8 members will be accredited under the ANSI’s personal certification program www.mazenetsolution.com
  • 14. ANSI Compliant ANSI Accredited Exam Process ANSI/ISO/IEC 17024 High quality certification exam Standard exam development process Imparts high value to our certifications 1 2 3 4 www.mazenetsolution.com
  • 15. N.I.C.E. Framework Compliance to National Initiative for Cybersecurity Education (NICE) 100 percent mapping to NICE Protect and Defend specialty area Skills and job roles based learning Standard-based training modules Better industry acceptance www.mazenetsolution.com
  • 16. The United States of America Department of Defense issued Directive 8570 in 2004 to mandate baseline certifications for all Information Assurance “IA” positions CND Analyst CND Infrastructure Support CND Incident Responder CND Auditor In February of 2010, this directive was enhanced to include the Certified Ethical Hacker across the Computer Network Defense Categories “CND” CEH is a part of: DoD 8750 www.mazenetsolution.com
  • 17. NSA/CNSS Compliant Recognition by National Security Agency (NSA) and the Committee on National Security Systems (CNSS) Standard based required training for network security professionals Better industry acceptance CNSS 4013 Recognition www.mazenetsolution.com

Editor's Notes

  1. This on the back that demands continue to outstrip supply.