ethical hacking
TRANSCRIPT
Critical recognition of Importance of IS
capacity building fromIndia’s
Education Authority.
www.mazenetsolution.com
Technology demands critical updates
Industries want better skills
Better courseware and supporting systems
Professionals want better recognition
www.mazenetsolution.com
Latest Operating Systems (Windows 8 and
Windows Server 2012)
CEH v8 program focuses on addressing security issues to the latest operating systems including Windows 8 and Windows Server 2012
It also focuses on addressing the existing threats to operating environments dominated by Windows 7 and other operating systems (backward compatibility)
www.mazenetsolution.com
Emphasis on Mobile Platforms and
Tablet Computers
CEHv8 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
Coverage of latest development in mobile and web technologies including Andriod OS 4.1 and Apps, iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8 and HTML 5
www.mazenetsolution.com
New Contents
More than 40 percent new labsare added
More than 600 new instructor slides
More than 1500 new/updated tools
What is New in CEHv8?
www.mazenetsolution.com
Data Breach Investigations Report
Essential Terminologies
Elements of Information Security
Top Information Security Attack Vectors
Motives, Goals, and Objectives of Information Security Attacks
Information Security Threats
Information Warfare
IPv6 Security Threats
Hacking vs. Ethical Hacking
Effects of Hacking on Business
Who Is a Hacker?
Hacking Phases
Types of Attacks on a System
Why Ethical Hacking is Necessary
Skills of an Ethical Hacker
Incident Management Process
Types of Security Policies
Vulnerability Research
What Is Penetration Testing?
Data Breach Investigations Report
Essential Terminologies
Elements of Information Security
Effects of Hacking on Business
Who Is a Hacker?
Hacking Phases
Types of Attacks on a System
Why Ethical Hacking is Necessary
Skills of an Ethical Hacker
Vulnerability Research
What Is Penetration Testing?
The topics highlighted in red under CEHv8 Module 01: Introduction to Ethical Hacking are the new additions
Module Comparison of CEHv8 with
CEHv7
CEHv7 Module 01: Introduction to Ethical Hacking CEHv8 Module 01: Introduction to Ethical Hacking
www.mazenetsolution.com
Types of Keystroke Loggers and Spywares
System Hacking: Goals
CEH Hacking Methodology (CHM)
Password Cracking
Stealing Passwords Using Keyloggers
Microsoft Authentication
How to Defend against Password Cracking
Privilege Escalation
Types of Privilege Escalation
Executing Applications
Methodology of Attacker in using Remote Keylogger
Anti-Keylogger and Anti-Spywares
Various methods to place a rootkit
Detecting Rootkits
NTFS Stream Manipulation
Application of steganography
Classification of Steganography
Audio Steganography Methods
Issues in Information hiding
Steganalysis Methods/Attacks on Steganography
Detecting Text, Image, Audio, and Video Steganography
Covering Tracks
Penetration Testing
The topics highlighted in red under CEHv8 Module 05 System Hacking are the new additions
Module Comparison of CEHv8 with
CEHv7
CEHv7 Module 05 System Hacking CEHv8 Module 05 System Hacking
System Hacking: Goals
CEH Hacking Methodology (CHM)
Password Cracking
Microsoft Authentication
How to Defend against Password Cracking
Privilege Escalation
Types of Privilege Escalation
Executing Applications
Types of Keystroke Loggers and Spywares
Anti-Keylogger and Anti-Spywares
Detecting Rootkits
NTFS Stream Manipulation
Classification of Steganography
Steganalysis Methods/Attacks on Steganography
Covering Tracks
Penetration Testing
www.mazenetsolution.com
Course Outline
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System HackingTrojans and Backdoors
Viruses and Worms
Sniffing
Social Engineering
Denial-of-ServiceSession
HijackingHacking
Webservers
Hacking Web Applications
SQL InjectionHacking Wireless
Networks
Evading IDS, Firewalls, and
Honeypots
Buffer Overflow CryptographyPenetration
Testing
www.mazenetsolution.com
DVD-ROM Content
CEHv8 DVD-ROMs includes approximately 24 GBs of hacking tools
All the tools are categories according to courseware presentation
DVDs include white papers and reference material on various security concepts
www.mazenetsolution.com
Number of Questions: 125
Passing Score: 70%
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: PrometricPrime / VUE/APTC
Validity: 3 years
The exam code varies when taken at different testing centers.
Exam 315-50-ANSI: Web based ‘Prometric Prime’ at Accredited Training Centers (ATC)
Exam 350CEHv8: Proctored test at Authorized PrometricTesting Centers (APTC) globally
Exam 312-50v8: VUE Testing centers
Exam InfoExam Portal
and Codes
Exam Info and Exam Portal
www.mazenetsolution.com
All CEHv8 members will be accredited under the ANSI’s
personal certification program
ANSI Compliant
www.mazenetsolution.com
ANSI Accredited Exam Process
ANSI/ISO/IEC 17024High quality certification
exam
Standard exam
development process
Imparts high value to
our certifications
1 2
3 4
ANSI Compliant
www.mazenetsolution.com
Compliance to
National Initiative
for Cybersecurity
Education (NICE)
100 percent mapping to NICE Protect and
Defend specialty area
Skills and job roles based learning
Standard-based training modules
Better industry acceptance
N.I.C.E. Framework
www.mazenetsolution.com
The United States of America Department of Defense issued
Directive 8570 in 2004 to mandate baseline
certifications for all Information Assurance “IA” positions
CND
Analyst
CND
Infrastructure
Support
CND Incident
ResponderCND Auditor
In February of 2010, this directive was enhanced to include the Certified Ethical Hacker across the Computer Network Defense Categories “CND”
CEH is a part of:
DoD 8750
www.mazenetsolution.com