EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ethical Hacking
i
6
Vers on
Student Introduction
Version: CEH 6.02
Introductions
~ Name
~ Company Affiliation
~ Title / Function
~ Job Responsibility
~ System security related experience
~ Expectations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Course Materials
~ Identity Card
~ Student Courseware
~ Lab Manual/Workbook
C
Di
~
ompact
sc
~ Course Evaluation
~ Reference Materials
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Course Outline
~ Module 1: Introduction to Ethical Hacking
~ Module 2: Hacking Laws
~ Module 3: Footprinting
M d l
G
l H ki
~
o u e 4: oog e ac ng
~ Module 5: Scanning
~ Module 6: Enumeration
~ Module 7: System Hacking
~ Module 8: Trojans and Backdoors
~ Module 9: Viruses and Worms
~ Module 10: Sniffers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Course Outline (contd.)
~ Module 11: Social Engineering
M d l
Phi hi
~
o u e 12:
s ng
~ Module 13: Hacking Email Accounts
~ Module 14: Denial-of-Service
~ Module 15: Session Hijacking
~ Module 16: Hacking Web Servers
~ Module 17: Web Application Vulnerabilities
~ Module 18: Web-Based Password Cracking Techniques
~ Module 19: SQL Injection
~ Module 20: Hacking Wireless Networks
~ Module 21: Physical Security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
~ Module 22: Linux Hacking
Course Outline (contd.)
~ Module 23: Evading IDS, Firewalls and Detecting Honey Pots
~ Module 24: Buffer Overflows
~ Module 25: Cryptography
~ Module 26: Penetration Testing
~ Module 27: Covert Hacking
~ Module 28: Writing Virus Codes
~ Module 29: Assembly Language Tutorial
~ Module 30: Exploit WritingModule 31: Smashing the Stack for Fun and Profit
~ Module 32: Windows Based Buffer Overflow Exploit Writing
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproducti