As cyber attacks increase, so does the demand for information security professionals who possess true network penetration testing, Web Application Security and ethical hacking skills. There are several ethical hacking courses that claim to teach these skills, but few actually do. EC Council's Certified Ethical Hacker (CEH V8) course truly prepares you to conduct successful penetration testing and ethical hacking projects.
2. Critical recognition of
Importance of IS
capacity building from
India’s
Education Authority.
www.mazenetsolution.com
3. Technology
demands
critical
updates
Industries
want better
skills
Better
courseware
and supporting
systems
Professionals
want better
recognition
www.mazenetsolution.com
4. Latest Operating Systems (Windows 8 and
Windows Server 2012)
CEH v8 program focuses on addressing security issues to t
he latest operating systems including Windows 8 and Wind
ows Server 2012
It also focuses on addressing the existing threats to
operating environments dominated by Windows 7 and other
operating systems (backward compatibility)
www.mazenetsolution.com
5. Emphasis on Mobile Platforms and
Tablet Computers
CEHv8 focuses on the latest
hacking attacks targeted to
mobile platform and tablet
computers and covers
countermeasures to secure
mobile infrastructure
Coverage of latest development
in mobile and web technologies
including Andriod OS 4.1 and
Apps, iOS 6 and Apps, BlackBerry
7 OS, Windows Phone 8 and
HTML 5
www.mazenetsolution.com
7. What is New in CEHv8?
New Contents
More than 40
percent new labs
are added
More than 600
new instructor
slides
More than 1500
new/updated
tools
www.mazenetsolution.com
8. Module Comparison of CEHv8 with
CEHv7
The topics highlighted in red under CEHv8 Module 01: Introduction to Ethical Hacking are the new additions
CEHv7 Module 01: Introduction to Ethical Hacking CEHv8 Module 01: Introduction to Ethical Hacking
Data Breach Investigations Report
Essential Terminologies
Elements of Information Security
Top Information Security Attack Vectors
Motives, Goals, and Objectives of Information
Security Attacks
Information Security Threats
Information Warfare
IPv6 Security Threats
Hacking vs. Ethical Hacking
Effects of Hacking on Business
Who Is a Hacker?
Hacking Phases
Types of Attacks on a System
Why Ethical Hacking is Necessary
Skills of an Ethical Hacker
Incident Management Process
Types of Security Policies
Vulnerability Research
What Is Penetration Testing?
Data Breach Investigations Report
Essential Terminologies
Elements of Information Security
Effects of Hacking on Business
Who Is a Hacker?
Hacking Phases
Types of Attacks on a System
Why Ethical Hacking is Necessary
Skills of an Ethical Hacker
Vulnerability Research
What Is Penetration Testing?
www.mazenetsolution.com
9. Module Comparison of CEHv8 with
CEHv7
The topics highlighted in red under CEHv8 Module 05 System Hacking are the new additions
CEHv7 Module 05 System Hacking CEHv8 Module 05 System Hacking
Types of Keystroke Loggers and Spywares
System Hacking: Goals
CEH Hacking Methodology (CHM)
Password Cracking
Stealing Passwords Using Keyloggers
Microsoft Authentication
How to Defend against Password Cracking
Privilege Escalation
Types of Privilege Escalation
Executing Applications
Methodology of Attacker in using Remote Keylogger
Anti-Keylogger and Anti-Spywares
Various methods to place a rootkit
Detecting Rootkits
NTFS Stream Manipulation
Application of steganography
Classification of Steganography
Audio Steganography Methods
Issues in Information hiding
Steganalysis Methods/Attacks on Steganography
Detecting Text, Image, Audio, and Video
Steganography
Covering Tracks
Penetration Testing
System Hacking: Goals
CEH Hacking Methodology (CHM)
Password Cracking
Microsoft Authentication
How to Defend against Password Cracking
Privilege Escalation
Types of Privilege Escalation
Executing Applications
Types of Keystroke Loggers and Spywares
Anti-Keylogger and Anti-Spywares
Detecting Rootkits
NTFS Stream Manipulation
Classification of Steganography
Steganalysis Methods/Attacks on Steganography
Covering Tracks
Penetration Testing
www.mazenetsolution.com
10. Course Outline
Introduction to
Ethical Hacking
Footprinting and
Reconnaissance
Scanning
Networks
Enumeration
System Hacking
Trojans and
Backdoors
Viruses and
Worms
Sniffing
Social
Engineering
Denial-of-Service
Session
Hijacking
Hacking
Webservers
Hacking Web
Applications
SQL Injection
Hacking
Wireless
Networks
Evading IDS,
Firewalls, and
Honeypots
Buffer Overflow Cryptography
Penetration
Testing
www.mazenetsolution.com
11. DVD-ROM Content
CEHv8 DVD-ROMs includes
approximately 24 GBs of hacking tools
All the tools are categories according to
courseware presentation
DVDs include white papers and
reference material on various security
concepts
www.mazenetsolution.com
12. Number of Questions: 125
Passing Score: 70%
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: Prometric
Prime / VUE/APTC
Validity: 3 years
The exam code varies when
taken at different testing
centers.
Exam 315-50-ANSI: Web based
‘Prometric Prime’ at
Accredited Training Centers
(ATC)
Exam 350CEHv8: Proctored
test at Authorized Prometric
Testing Centers (APTC)
globally
Exam 312-50v8: VUE Testing
centers
Exam Info
Exam Portal
and Codes
Exam Info and Exam Portal
www.mazenetsolution.com
13. ANSI Compliant
All CEHv8 members will be accredited under the ANSI’s
personal certification program
www.mazenetsolution.com
14. ANSI Compliant
ANSI Accredited Exam Process
ANSI/ISO/IEC 17024
High quality certification
exam
Standard exam
development process
Imparts high value to
our certifications
1 2
3 4
www.mazenetsolution.com
15. N.I.C.E. Framework
Compliance to
National Initiative
for Cybersecurity
Education (NICE)
100 percent mapping to NICE Protect and
Defend specialty area
Skills and job roles based learning
Standard-based training modules
Better industry acceptance
www.mazenetsolution.com
16. The United States of America Department of Defense issued
Directive 8570 in 2004 to mandate baseline
certifications for all Information Assurance “IA” positions
CND
Analyst
CND
Infrastructure
Support
CND Incident
Responder
CND Auditor
In February of 2010, this directive was enhanced to include
the Certified Ethical Hacker across the Computer Network
Defense Categories “CND”
CEH is a part of:
DoD 8750
www.mazenetsolution.com
17. NSA/CNSS Compliant
Recognition by National Security Agency
(NSA) and the Committee on National
Security Systems (CNSS)
Standard based required training for
network security professionals
Better industry acceptance
CNSS 4013
Recognition
www.mazenetsolution.com
Editor's Notes
This on the back that demands continue to outstrip supply.