Monday, August 16, 2010

Certified Ethical Hacking -28 Modules



The Certified Ethical Hacker (C|EH) is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.)

An Ethical Hacker is one name given to a Penetration Tester. An ethical hacker is usually employed by an organization who trusts him to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Illegal hacking (i.e.; gaining unauthorized access to computer systems) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not, except in Germany.

A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.

The EC-Council offers another certification, known as Certified Network Defense Architect (C|NDA). This certification is designed for United States Government Agencies, and is available only to members of selected agencies. Other than the name, the content of the course is exactly the same. The exam code for CNDA is 312-99.[1]

To get a more detailed understanding of this process see the Ethical Hack page.

Module 1: Student Introduction
Module 2: Introduction to Ethical Hacking
Module 3: Footprinting
Module 4: Scanning
Module 5: Enumeration
Module 6: System Hacking
Module 7: Trojans and Backdoors
Module 8: Sniffers
Module 9: Denial of Service
Module 10: Social Engineering
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Web Application Vulnerabilities
Module 14: Web-Based Password Cracking Techniques
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Virus and Worms
Module 18: Physical Security
Module 19: Linux Hacking
Module 20: Evading IDS Firewall and Honeypot
Module 21: Buffer Overflow
Module 22: Cryptography
Module 23: Penetration Testing
-Module 23a: Exploit Writing
-Module 23b: Exploit Writing
-Module 23c: Exploit Writing
Module 24: Covert Hacking
Module 25: Writing Virus Codes
Module 26: Reverse Engineering Techniques
Module 27: Objectives

Code:

http://rapidshare.com/files/336454109/9387.part1.rar
http://rapidshare.com/files/336456688/9387.part2.rar
http://rapidshare.com/files/336459636/9387.part3.rar

No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...

Disclaimer

All the postings of mine in this whole BLOG is not my own collection. All are downloaded from internet posted by some one else. I am just saving some time of our blog users to avoid searching everywhere. Am not violating any copy rights law or not any illegal action am not supposed to do.If anything is against law please notify so that they can be removed