You are on page 1of 15

EC COUNCIL PROGRAMS

Purpose of this Session

Network Security and Ethical Hacking Over view . EC Council Certifications CEH ( Certified Ethical Hacking Program ) .

Common Concepts
Why Systems Are Vulnerable Contemporary Security Challenges and Vulnerabilities

S YSTEM VULNERABILITY AND ABUSE


Why Systems Are Vulnerable (Continued)

Internet Vulnerabilities:
Use of fixed Internet addresses through use of cable modems or DSL

Lack of encryption with most Voice over IP (VoIP) Widespread use of e-mail and instant messaging (IM).

Wireless Security Challenges:

Radio frequency bands are easy to scan

The service set identifiers (SSID) identifying the access points broadcast multiple times

Malicious Software: Viruses, Worms, Trojan Horses, and Spyware Hackers and . Cybervandalism
Computer viruses, worms, trojan horses Spyware

Spoofing and Sniffers


Denial of Service (DoS) Attacks Identity theft Cyberterrorism and Cyberwarfare

Vulnerabilities from internal threats (employees software flaws

What is EC-Council? The International Council of Electronic Commerce Consultants (EC-Council) is a member supported professional organization. Purpose of the EC-Council is to support and enhance the role of individuals and organizations that design, create, manage or market Security and E-Business solutions.

EC-Council has certified IT professionals from the following organizations as CEH: (Selected list)

Cisco Corporation, Novell, Canon ,Hewlett Packard, US Air Force Reserve, US Embassy Microsoft Corporation, Worldcom US Department of Defense, Fedex ,British Telecom ,Supreme Court of the Philippines ,

Ministry of Defense, UK, Nortel Networks, KPMG ,Fleet International ,Johnson & Johnson ,Marriott Hotel, SAP, Coca-Cola Corporation ,US Military, IBM Global Services ,American Express ,FBI
Citibank Corporation ,United States Marine Corps ,Reserve Bank of India ,US Air Force

CERTIFICATIONS

EC-Council certifications are designed to provide the foundation needed by every Electronic Commerce and Security Professional. EC-Council curriculum provides broad range of skills and knowledge needed to build and manage an organization's networking and security operations.

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network

CERTIFICATION PATH AND REQUIREMENTS

*THANKS*

You might also like