Over 1,200 - Certified Ethical Hacker

2y ago
319 Views
69 Downloads
8.71 MB
38 Pages
Last View : 1d ago
Last Download : 3m ago
Upload by : Nixon Dill
Transcription

Over 1,200Highly QualifiedCertified Instructorsw w w.e ccouncil.org

Table of ContentsWho We Are03Certified Threat Intelligence Analyst (CTIA)23Security Wall04Certified SOC Analyst (CSA)24EC-Council at a Glance05EC-Council Certified Incident Handler (ECIH)25AccreditationsCourse Description06Computer Hacking Forensic Investigator (CHFI)26Your Learning Options09Certified Application Security Engineer (CASE) Java27Certified Application Security Engineer (CASE) .NET28TracksCourse OutlineThe Licensed Penetration Tester (Master) Credential – LPT (Master) 29Foundation Track10EC-Council Disaster Recovery Professional (EDRP)30Vulnerability Assessment and Penetration Testing11Certified Chief Information Security Officer (C CISO)31Cyber Forensics12OhPhish32Network Defense and Operations13Code Red Subscription/ EC-Council Micro-degrees33Software Security14GovernanceKey Outcomes15Academic ProgramsExamInformationCertificationsBachelor of Science in Cyber Security (BSCS)34Graduate Certificate Programs35Certified Secure Computer User (CSCU)16Master of Science in Cyber Security (MSCS)36EC-Council Certified Security Specialist (ECSS)17EC-Council Masterclass37EC-Council Certified Encryption Specialist (ECES)18Certified Network Defender (CND)19Certified Ethical Hacker (CEH)20Certified Ethical Hacker (Practical)21Certified Penetration Testing Professional (CPENT)2202

Who We AreThe EC-Council group is made up of several entitiesthat all help serve the same goal which is to createa better, safer cyber world through awareness andeducation. Our entities include InternationalCouncil of eCommerce Consultants (EC-Council),iClass, EC-Council University, EC-Council GlobalServices (EGS),and EC-CouncilConferences andCourseDescriptionEvents.EC-Council creates content (course materials andexams) and certification delivered through ourchannel of authorized training centers whichconsists of over 700 partners representing over2,000 physical locations in more than 145 countriesacross the globe. We are the owner and developerof the world-famous Certified Ethical Hacker (CEH),Computer Hacking Forensics Investigator (CHFI),EC-Council Certified Security Analyst (ECSA), andLicense Penetration Tester (LPT)(Master) programs.Our certification programs are recognizedworldwide and have received endorsements fromKey Outcomesvarious government agencies, including the UnitedStates Federal Government (via the Montgomery GIBill), the National Security Agency (NSA), and theCommittee on National Security Systems (CNSS).All these reputed organizations have certifiedCertified Ethical Hacking (CEH), Computer HackingForensics Investigator (CHFI), EC-Council DisasterRecovery Professional (EDRP), EC-Council CertifiedSecurity Analyst (ECSA) and The AdvancedPenetration Testing Program and The LicensedPenetration Tester (LPT)(Master) programs formeeting the 4011, 4012, 4013A, 4014, 4015 and4016 training standards for information securityprofessionals. EC-Council has receivedaccreditation from the American NationalStandards Institute (ANSI) for our coveted CEH,CCISO, CHFI, and CND programs. We have so farcertified over 2,20,000 professionals in variouse-business and cybersecurity skills.iClass is EC-Council’s direct certification trainingprogram. iClass delivers EC-Council certificationcourses through various training methodologies:instructor-led at client facilities, synchronousdelivery through live, online instructor-led, andasynchronously through our streaming videoplatform. iClass course videos can also be loadedonto a mobile device, such as an iPad, and shippedto a client location.“Our lives are dedicated to themitigation and remediationof the cyber plague that isExam Informationmenacing the world today”Jay BavisiPresident & CEOEC-CouncilEC-Council University is accredited by the DistanceEducation Accrediting Commission. The universityoffering programs such as Bachelor of Science inCyber Security, Master of Science in Cyber Security,and Graduate Certificate Program.EC-Council Global Services (EGS) is dedicated tohelping organizations understand and managetheir cyber-security risk posture effectively. EGSspecializes in helping clients make informedbusiness decisions to protect their organizations.EGS has over 20 dedicated cyber security practiceareas informedby theOutlinebest cyber securityCoursepractitioners, each of whom have dedicated theirlives to defending organizations fromcyber-attacks.EC-Council’s Conference and Events Group isresponsible for planning, organizing, and runningconferences throughout the globe. TakeDownConand Hacker Halted are IT security conferences thatbring world renowned speakers together forkeynotes, panels, debates, and breakout sessions.Conferences have been run in Dallas, Las Vegas, St.Louis, Huntsville, Maryland, Connecticut, MyrtleBeach, Miami, Atlanta, Iceland, Hong Kong, Egypt,Singapore, Mumbai, Dubai, Bahrain, London, AbuDhabi and Kuala Lumpur.Other events include CISO Summits, Global CISOForums, and Executive Cocktail Receptions whereEC-Council brings speakers and content toexecutive level IT Security Professionals.The Global Cyberlympics competition is a “capturethe flag” type competition with approximately1,000 global participants. EC-Council brings thehackers together online for preliminary eliminationrounds and then brings the top two teams (6-8players per team) from each region to compete inthe final head-to-head competition.03

EC-Council Uni-Aid - Don’t stop learningEC-Council Uni Aid is an EC-Councilscholarship that provides informationtechnology students at public y-recognized information securityeducation and certification and relatedtechnical disciplines.Universities and student recipients will bepart of a global community of scholarshiprecipients from the United States, Europe,Middle East, Africa and Asia-Pacific, all ofwhom share similar passion forinformation security and academicexcellence.Course OutlineCourse DescriptionEC-Council has pledged 1,000,000worthofinformationsecurityscholarships for the 2011-2012 academicyear to universities globally.EC-CouncilEC-Council Featured in CNN The Wolf Blitzer ShowAug 4, 2011 Albuquerque, NM - JayBavisi, president of EC-Council, wasearlier interviewed by CNN, to commenton the massive cyber spying incidentwhich targeted agencies and groups in14 countries, including U.S governmentagencies, the United Nations, defencecontractors and Olympic bodies.Key OutcomesExam InformationAs reported by CNN McAfee said theattacks, which it calls Operation ShadyRAT, have allowed hackers potentiallyto gain access to military and industrialsecrets from 72 targets, most of them inthe United States, over a five-yearperiod.EC-Council“EC-Council - Trusted worldwide for its end-to-end enterprise cybersecurity solutions for human capital development”04

EC-Council at a GlanceEC-Council Group is a multidisciplinary institution of global Information Security professional services.EC-Council Group is a dedicated Information Security organization that aims at creating knowledge, facilitating innovation, executing research, implementingdevelopment, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.Some of the finest organizations around the world such as the US Army, US Navy, DoD, the FBI, Microsoft, IBM, and the United Nations have trusted EC-Council to developand advance their security infrastructure.Course OutlineCourse DescriptionECCICECCEC-Council Training & CertificationDivision of Professional WorkforceDevelopmentInternational Council of E-CommerceConsultantsEC-Council GroupEGEECCUEC-Council Global EventsDivision of Conferences, Forums, Summits,Workshops & Industry AwardsEC-Council UniversityDivision of Academic EducationExam InformationKey OutcomesEGSEC-Council Global ServicesDivision of Corporate Consulting &Advisory ServicesECFEC-Council FoundationNon-Profit Organization for Cyber SecurityAwareness Increase.19 40 145 1000 2830 3000 YEARSEXPERIENCETRAINING &CERTIFICATIONPROGRAMSCOUNTRIESSUBJECT MATTEREXPERTSTRAINING PARTNERSWORLDWIDETOOLS &TECHNOLOGIES237,580 CERTIFIED MEMBERS05

AccreditationsAmerican National Standards Institute (ANSI)EC-Council has achieved accreditation for its Certified Ethical Hacker (C EH), Certified Chief Information Security Officer (C CISO), Certified NetworkDefender (C ND), and Computer Hacking Forensic Investigator (C HFI), to meet the ANSI/ISO/IEC 17024 Personnel Certification Accreditationstandard. EC-Council is one of a handful of certification bodies, whose primary specialization is information security, to be awarded this muchsought-after quality standard.Course DescriptionCourse OutlineCandidates who complete the EC-Council Certified Ethical Hacker (C EH), Computer Hacking Forensics Investigator (C HFI), Certified NetworkDefender (C ND), and Certified Chief Information Security Officer (C CISO) certification will also have that extra credential meeting therequirements of the respective ANSI Certification Training Standards.Learn more Committee on National Security Systems (CNSS) & National Security Agency (NSA)EC-Council was honored at the 13th Colloquium for Information Systems Security Education (CISSE) by the United States National SecurityAgency (NSA) and the Committee on NationalSecuritySystems (CNSS) when its Certified Ethical Hacker (CEH), Computer Hacking ForensicsExamInformationKey OutcomesInvestigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst (ECSA) and Licensed Penetration Tester (LPT) coursewarewas certified to have met the 4012 (Senior System Managers), 4013A (System Administrators), 4014 (Information Systems Security Officers),4015 (Systems Certifiers) and 4016 (Information Security Risk Analyst) training standards for information security professionals in the federalgovernment. The CNSS is a federal government entity under the U.S. Department of Defense that providesprocedures and guidance for theprotection of national security systems.Candidates who complete the EC-Council Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), Disaster RecoveryProfessional (EDRP), Certified Security Analyst (ECSA) or Licensed Penetration Tester (LPT) certification will also have that extra credential meetingthe requirements of the respective CNSS 4011-4016 Federal Security Certification Training Standards.06

Department of Defense (DoD)EC-Council Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (C HFI), and Certified Chief Information Security Officerprograms are formally integrated as baseline skill certification options for the U.S. Department of Defense (DoD) cyber workforce in severalcategories. Specifically, the C CISO program is a recognized certification for the DoD IAM Level II, IAM Level III, and CSSP Manager, all specializedcyber management personnel classifications within the DoD’s information assurance workforce. C HFI is now recognized as a baseline certificationfor CSSP Incident Responder and C EH is now required for the DoD’s computer network defenders (CND’s) – CND Analyst, CND InfrastructureSupport, CND Incident Responder, and CND Auditor.Course DescriptionCourse OutlineLearn more NCSC Certified TrainingEC-Council has achieved accreditation for its Certified Ethical Hacker (C EH), Certified S ecurity A nalyst (ECSA), and Chief I nformation S ecurity O fficer(C CISO), to meet the GCHQ Certified Training standard. This recognition is a feather in the cap for EC-Council’s much sought-after credentials,which are among the most comprehensive programs in the field of Vulnerability Assessment and Penetration Testing, and Information SecurityLeadership.This affirms EC-Council’s commitment to offering high-quality certification programs that are developed to help arm information securityprofessionals with the right skills to safeguardthe cyberworld and achieve successful professional roles.ExamInformationKey OutcomesLearn more CREST EquivalencyLeading cyber security certification bodies CREST and EC-Council have announced mutual equivalency for their professional entry-pointtechnical qualifications. The direct equivalency relates to the EC-Council Security Analyst (ECSA v10) qualification with the CREST PractitionerSecurity Analyst (CPSA) qualification. In addition, equivalency can also be granted for the for ECSA (Practical) with the CREST Registered Tester(CRT) certification, provided that the candidate already holds a valid CREST CPSA qualification.Learn more 07

National Infocomm Competency Framework (NICF)EC-Council Certified Ethical Hacker (CEH) and Computer Hacking Forensic Investigator (CHFI) programs have been accepted into NationalInfocomm Competency Framework (NICF) Infocomm professionals competency requirement list. In addition to the inclusion, Infocommprofessionals training to be certified for the EC-Council programs at NICF accredited training centers, will be entitled to receive partial fundingfrom Critical Infocomm Technology Resource Program (CITREP) upon certification completion.NICF determines the skills and competencies; and develops training strategies for Infocomm professionals to build a niche Infocomm workforcein Singapore. CITREP is a training incentive program that assists Infocomm professionals with fundingCourseto gain recognizedand specialized skills.OutlineCourse DescriptionDepartment of Veterans AffairsThe Department of Veterans Affairs has included EC-Council Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI),and EC-Council Certified Security Analyst (ECSA) under its GI Bill for the reimbursement of test fees for veterans and other eligible persons inaccordance with the provisions of PL 106-4Distance Education Accrediting Commission (DEAC)Key OutcomesExam InformationEC-Council University is accredited by the Distance Education Accrediting Commission. The Distance Education Accrediting Commission is listedby the U.S. Department of Education as a recognized accrediting agency. The Distance Education Accrediting Commission is recognized by theCouncil for Higher Education Accreditation (CHEA).A national advocate and institutional voice for promoting academic quality through accreditation, CHEA is an association of 3,000 degreegranting colleges and universities and recognizes approximately 60 institutional and programmatic accrediting organizations.EC-Council University as well as our accreditor are acknowledged members of The Council for Higher Accreditation (CHEA).08

Your Learning OptionsInstructor-led Trainingfacility in your city.Course OutlineCourseDescriptionOnlineTrainingiLearn online training is a distance learning program designed for those who cannot attend a live course. The program is for the people who have a very busy schedule and want to learn at their ownpace through self-study. This modality is also available from our enterprise teams.Mobile LearningOur world class content is also available on a mobile device, allowing our students to learn on the go. This program is designed for those who are cannot attend a live course, but are keen to improvetheir cyber security skills. This modality is also available from our enterprise teams.Computer-based Trainingbase iLearn program and are not sold independently. This modality is also available from our enterprise teams.Key OutcomesExam InformationHands-on Experience with the EC-Council Cyber Range ( iLabs)EC-Council iLabs allows students to dynamically access a host of virtual machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere. Our simplistic web portal enablesthe student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost-effective, easy to use, live range lab solution available. Most of ourcourses are equipped with iLabs, but iLabs can be purchased independently as well.Customized Learningchannel. Let us know where and when you want the training delivered, and we will arrange for an instructor and all that’s required for a course to be taught at a location of your choice. Contact ouraccredited training partners for a custom solution.EC-Council client-site training includes official courseware, certification exam (ECC-Exam or VUE), iLabs, online labs (wherever available), and our test-pass guarantee.Live Online TrainingWith iWeek, an instructor will teach you live online while you are seated in the comfort of your home. This training method gives you the freedom to get trained from a location of your choice.Individuals who choose this delivery method consistently attribute their choice to the preference of having a live instructor available for which questions can be asked and answered. We offer early-birdrates, group rates, and get even private courses delivered anytime.09

Foundation TrackTargetAudienceCourse DescriptionCSCU112-12Computer UserECSSEC-Council CertifiedSecurity SpecialistECES212-81EC-Council CertifiedEncryption SpecialistCourse OutlineThis track focuses on todays’computer users who use the internetextensively to work, study and play.What will You Learnare Employed at:Exam InformationKeyOutcomesOutcomesKeyCloud SecurityPasswordSecuritySocial EngineeringCountermeasuresMitigatingIdentity TheftEmail SecuritySafe BrowsingData ProtectionPhysical SecurityMobile DeviceSecurityEncryptionSocial overyInternet SecurityCredit CardSecurityMonitoring KidsOnlineWireless & HomeNetwork Security.OS Security*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.0710

Vulnerability Assessment & Penetration Testing (VAPT)JobRolesCourse OutlineCourse Description- Information Assurance (IA) Security Officer- Information Security Analyst/Administrator- Information Security Manager/Specialist- Information Systems SecurityEngineer/Manager- Security Analyst- Information Security Officers- Information Security Auditors- Risk/Vulnerability AnalystOur Certified VAPT Professionalsare Employed at:Exam InformationKey OutcomesThis track maps to NICE’s Specialty Areas:1. Protect and Defend (PR)a. CybersecurityDefense Analysis (DA)b. CybersecurityDefense InfrastructureSupport (INF)c. Incident Response (IR)d. VulnerabilityAssessment andManagement (VA)2. Securely Provision (SP)a. Test and Evaluation3. Analyze (AN)a. Threat Analysis (TA)b. Exploitation Analysis (XA)*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.11

JobRolesCourse OutlineCertified EthicalCourseCEHDescription(MASTER)Hacker (Master)CTIA312-85312-38*B e s p o k eKey Outcomesm o d u l e sa v a i l a b l ef o rCertified ThreatIntelligence Analyste n t e r p r i s e sExam InformationGraduate Certificate in DigitalForensics, Incident Managementand Business Continuity* Additional University courses/pre-requisites may be required.*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.12

Course OutlineCourse DescriptionCSA312-39312-38CTIA312-85Key OutcomesIntelligence AnalystExam InformationGraduate Certificate inIncident Management andBusiness Continuity*Additional University courses/pre-requisites may be required.*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.13

CPENTCertified PenetrationTesting ProfessionalLPT(MASTER)Licensed PenetrationTester (Master)JobRolesCourse OutlineCourse DescriptionCertified ApplicationCASE Java Security Engineer312-96CEHJavaHacker (Master)Certified ApplicationCASE .Net Security Engineer312-95.Net312-38Our Certified Software Security Professionalsare Employed at:Key OutcomesExam InformationGraduate Certificate inInformation SecurityProfessional, Security AnalystThis Track Maps to NICE’s Specialty Areas:1. Securely Provisiona. Software Development (DE

Aug 04, 2011 · Certified Secure Computer User (CSCU) 16 EC-Council Certified Security Specialist (ECSS) 17 EC-Council Certified Encryption Specialist (ECES) 18 Certified Network Defender (CND) 19 Certified Ethical Hacker (CEH) 20 Certified Penetration Testing Professional (CPENT)

Related Documents:

Cv 1.04 1.67 2.33 3.61 7.12 10.6 4 6.63 11.66 19.69 24 7.00 10.87 17.00 25.00 44 36.32 128 Actuator Model Diagram Num. Maximum Close-Off Pressure (PSI) VSI Electric Acutators 24, 120, or 220 VAC 1005-X 4 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 1005S-X 4 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 .

pass4sure 200-120, 200-120 dumps, 200-120 real questions, 200-120 Question bank, 200-120 braindumps, 200-120 questions and answers, 200-120 Q&A, 200-120 vce, free 200-120 download, Free 200-120 braindumps, 200-120 practice test, 200-120 practice exam, killexams.com 200-120, 200-120 actual test, 200-120 PDF download, 200-120 examcollection .

private sectors is ethical hacking. Hacking and Ethical Hacking Ethical hacking can be conceptualized through three disciplinary perspectives: ethical, technical, and management. First, from a broad sociocultural perspective, ethical hacking can be understood on ethical terms, by the intentions of hackers. In a broad brush, ethical

CERTIFIED ETHICAL HACKERCERTIFIED ETHICAL HACKER 0101 CERTIFIED ETHICAL HACKER v11 Demanded by Employers. Respected by Peers. CERTIFIED ETHICAL HACKER 02 Ê Û â Ü æ Ô ¶ Ø å ç Ü Ø ç Û Ü Ö Ô ß » Ô Ö Þ Ø å ² .

that can be constructed as a dry mortarless wall or core-filled to provide a max 1m height. Recommended Use Structural retaining wall that can be concrete core filled. Max. wall height of 1m without reinforcement. Typical Cross Section Dimensions END STANDARD HALF 400 200 200 200 400 200 400 200 200 200 200 200 200 200 200 200 CAP 390 40 240190 .

Dec 04, 2014 · EC-Council – Certified Ethical Hacker, Certified Security Analyst, Certified Hacking & Forensics Investigator etc. SANS – GIAC Certified Reverse Engineering Malware, Incident Handler, Intrusion Analyst etc. ISACA – Certified Information Systems Auditor etc. ISC2 – Certified Information Sys

Model-Based Calibration Toolbox 13, 21, 23, 24, 27 500 600 Control System Design and Analysis Control System Toolbox 200 200 System Identification Toolbox 200 200 Fuzzy Logic Toolbox 200 200 Robust Control Toolbox 4 200 200 Model Predictive Control Toolbox 4 200 23200 Aerospace Toolbox 200 200 Signal Processing and Communications

According to ASTM E562-08 [8] a manual point-count on 30 evenly distributed fields with a 100-point-layer each on a Olympus BX60M with a JVC TK-C181 Color-video-camera, using the Piscara 9.4-software was conducted, from which the porosity could be calculated. adhesion (glue and braze testing) According to ASTM C633 [9] a tensile-strength-test on glued and brazed coatings with a surface .