

The Certified Ethical Hacker (C|EH) is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.)
An Ethical Hacker is one name given to a Penetration Tester. An ethical hacker is usually employed by an organization who trusts him to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Illegal hacking (i.e.; gaining unauthorized access to computer systems) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not, except in Germany.
A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.
The EC-Council offers another certification, known as Certified Network Defense Architect (C|NDA). This certification is designed for United States Government Agencies, and is available only to members of selected agencies. Other than the name, the content of the course is exactly the same. The exam code for CNDA is 312-99.[1]
To get a more detailed understanding of this process see the Ethical Hack page.
Module 1: Student Introduction
Module 2: Introduction to Ethical Hacking
Module 3: Footprinting
Module 4: Scanning
Module 5: Enumeration
Module 6: System Hacking
Module 7: Trojans and Backdoors
Module 8: Sniffers
Module 9: Denial of Service
Module 10: Social Engineering
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Web Application Vulnerabilities
Module 14: Web-Based Password Cracking Techniques
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Virus and Worms
Module 18: Physical Security
Module 19: Linux Hacking
Module 20: Evading IDS Firewall and Honeypot
Module 21: Buffer Overflow
Module 22: Cryptography
Module 23: Penetration Testing
-Module 23a: Exploit Writing
-Module 23b: Exploit Writing
-Module 23c: Exploit Writing
Module 24: Covert Hacking
Module 25: Writing Virus Codes
Module 26: Reverse Engineering Techniques
Module 27: Objectives
Code:
http://rapidshare.com/files/336454109/9387.part1.rar
http://rapidshare.com/files/336456688/9387.part2.rar
http://rapidshare.com/files/336459636/9387.part3.rar
No comments:
Post a Comment