Ethical Hacking Introduction Introductions ~ Name ~ Company Affiliation ~ Title / Function ~ Job Responsibility ~ System security related experience ~Expectations EC-Council Course Materials ~ ~ ~ ~ ~ ~ EC-Council Identity Card Student Courseware Lab Manual / Workbook Compact Disc Course Evaluation Reference Materials Course Outline ~ Module I : Introduction to Ethical Hacking ~ Module II: Footprinting ~ Module III: Scanning ~ Module IV: Enumeration ~ Module V: System Hacking EC-Council Course Outline (contd ) ~ Module VI: Trojans and Backdoors ~ Module VII: Sniffers ~ Module VIII: Denial of Service ~ Module IX: Social Engineering ~ Module X: Session Hijacking EC-Council Course Outline (contd ) ~ Module XI: Hacking Web Servers ~ Module XII: Web Application Vulnerabilities ~ Module XIII: Web Based Password Cracking Techniques ~ Module XIV: SQL Injection ~ Module XV: Hacking Wireless Networks EC-Council Course Outline (contd ) ~ Module XVI: Viruses ~ Module XVII: Novell Hacking ~ Module XVIII: Linux Hacking ~ Module XIX: Evading IDS, Firewalls and Honey pots ~ Module XX: Buffer Overflows ~ Module XXI: Cryptography EC-Council EC-Council Certified e- business Certification Program There are five e-Business certification tracks under EC-Council Accreditation body: • Certified e-Business Associate • Certified e-Business Professional • Certified e-Business Consultant • E++ Certified Technical Consultant • Certified Ethical Hacker EC-Council EC-Council Certified Ethical Hacker EC-Council Student Facilities Class Hours Building Hours Phones Parking Messages Restrooms Smoking Meals Recycling EC-Council ... e-Business Professional • Certified e-Business Consultant • E++ Certified Technical Consultant • Certified Ethical Hacker EC-Council EC-Council Certified Ethical Hacker EC-Council Student Facilities Class... related experience ~Expectations EC-Council Course Materials ~ ~ ~ ~ ~ ~ EC-Council Identity Card Student Courseware Lab Manual / Workbook Compact Disc Course Evaluation Reference Materials Course Outline... hacking event will affect any one or more of the essential security elements Security rests on confidentiality, authenticity, integrity, and availability • Confidentiality is the concealment of