0% found this document useful (0 votes)
25 views14 pages

Module 00 Student Introduction

Module-00-Student-Introduction.pdf

Uploaded by

DRUPEN DRUPEN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views14 pages

Module 00 Student Introduction

Module-00-Student-Introduction.pdf

Uploaded by

DRUPEN DRUPEN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Version 4

EC Council
EC-Council

Class, Please Introduce Yourself

Name
Company Affiliation
Title / Function
Job Responsibility
System security related experience
Expectations

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Materials

~
~
~
~
~
~

EC-Council

Identity Card
Student Courseware
Lab Manual/Workbook
C
Compact
Di
Disc
Course Evaluation
Reference Materials

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline
Module 01: The Need for Security Analysis
Module 02: Advanced Googling
Module 03: TCP/IP Packet Analysis
Module 04: Advanced Sniffing Techniques
Module 05: Vulnerability Analysis with Nessus
Module 06: Advanced Wireless Testing
Module 07: Designing a DMZ
Module 08: Snort Analysis
Module 09: Log Analysis
Module 10: Advanced Exploits and Tools
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline (contd.)


Module 11: Penetration Testing Methodologies
Module 12: Customers and Legal Agreements
Module 13: Rules of Engagement
Module 14: Penetration Testing Planning and Scheduling
Module 15: Pre Penetration Testing Checklist
Module 16: Information Gathering
Module 17: Vulnerability Analysis
Module 18: External Penetration Testing
Module 19: Internal Network Penetration Testing
Module 20: Routers and Switches Penetration Testing
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline (contd.)


Module 21: Firewall Penetration Testing
Module 22: IDS Penetration Testing
Module 23: Wireless Network Penetration Testing
Module 24: Denial of Service Penetration Testing
Module 25: Password Cracking Penetration Testing
Module 26: Social Engineering Penetration Testing
Module 27: Stolen Laptop, PDAs and Cell phones Penetration Testing
Module 28: Application Penetration Testing
Module 29: Physical Security Penetration Testing
Module 30: Database Penetration testing
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline (contd.)


Module 31: VoIP Penetration Testing
Module 32: VPN Penetration Testing
Module 33
33: War Dialing
g
Module 34: Virus and Trojan Detection
Module 35: Log Management Penetration Testing
Module 36: File Integrity Checking
Module 37: Blue Tooth and Hand held Device Penetration Testing
Module 38: Telecommunication and Broadband Communication Penetration Testing
Module 39: Email Security Penetration Testing
Module 40: Security Patches Penetration Testing
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline (contd.)

Module 41: Data Leakage Penetration Testing


Module 42: Penetration Testing Deliverables and Conclusion
Module 43: Penetration Testing Report and Documentation Writing
Module 44: Penetration Testing Report Analysis
Anal sis
Module 45: Post Testing Actions
Module 46: Ethics of a Licensed Penetration Tester
Module 47: Standards and Compliance

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

EC-Council Certification
There are several levels of certification tracks under EC-Council:
1.

Certified e-Business Professional

2.

Certified Ethical Hacker (CEH)

3.

C
Computer
H
Hacking
ki Forensic
F
i IInvestigator
i
(CHFI)

4.

EC-Council Certified Security Analyst (ECSA) You are here

5.

Licensed Penetration Tester (LPT) You are here

6.

EC-Council Certified Secure Programmer (ECSA)

7.

Certified Secure Application Developer (CSAD)

8.

Master of Security Science (MSS)

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

ECSA Track

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

LPT Track

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

What next after ECSA Training?


~

If you have completed the CEH and ECSA programs then


you are eligible to apply for the Licensed Penetration
Tester certification
To apply for the LPT license please visit
http://www.eccouncil.org Certification LPT

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Student Facilities
Class Hours

B ildi H
Building
Hours

Ph
Phones

Parking
k

Messages

Restrooms

Smoking

Meals

Recycling

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Lab Sessions

The ECSA/LPT programs


covers the penetration testing
p and methodology
gy
concepts
80% of the course will be
presented as theoryy (seminar
p
style)
20% of the course will have
hands-on labs

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

You might also like