Ethical Hacking Introduction EC-Council Introductions Name Company Affiliation Title / Function Job Responsibility System security related experience Expectations EC-Council Course Materials Identity Card Student Courseware Lab Manual / Workbook Compact Disc Course Evaluation Reference Materials EC-Council Course Outline Module I : Introduction to Ethical Hacking Module II: Footprinting Module III: Scanning Module IV: Enumeration Module V: System Hacking EC-Council Course Outline (contd ) Module VI: Trojans and Backdoors Module VII: Sniffers Module VIII: Denial of Service Module IX: Social Engineering Module X: Session Hijacking EC-Council Course Outline (contd ) Module XI: Hacking Web Servers Module XII: Web Application Vulnerabilities Module XIII: Web Based Password Cracking Techniques Module XIV: SQL Injection Module XV: Hacking Wireless Networks EC-Council Course Outline (contd ) Module XVI: Viruses Module XVII: Novell Hacking Module XVIII: Linux Hacking Module XIX: Evading IDS, Firewalls and Honey pots Module XX: Buffer Overflows Module XXI: Cryptography EC-Council EC-Council Certified e- business Certification Program There are five e-Business certification tracks under EC-Council Accreditation body: • 1. Certified e-Business Associate • 2. Certified e-Business Professional • 3. Certified e-Business Consultant • 4. E++ Certified Technical Consultant • 5. Certified Ethical Hacker EC-Council EC-Council Certified Ethical Hacker EC-Council Student Facilities Building Hours Phones Parking Messages Restrooms Smoking RecyclingMeals Class Hours [...]...Lab Sessions EC-Council Lab Sessions are designed to reinforce the classroom sessions The sessions are intended to give a hands on experience only and does not guarantee proficiency . Ethical Hacking Introduction EC-Council Introductions Name Company Affiliation Title / Function. Module I : Introduction to Ethical Hacking Module II: Footprinting Module III: Scanning Module IV: Enumeration Module V: System Hacking EC-Council