We offer CEH training in Delhi

About This Presentation
Title:

We offer CEH training in Delhi

Description:

This PPT good information CEH Certified Ethical Hacking Certification training. We provide CEH Ethical hacking training in Delhi, India. We are top training institute of CEH Certification In Delhi – PowerPoint PPT presentation

Number of Views:28

less

Transcript and Presenter's Notes

Title: We offer CEH training in Delhi


1
(No Transcript)
2
The Most Comprehensive Ethical Hacking Course
in the World -
  • This is the worlds most advanced certified
    ethical hacking course with 18 of the most
    current security domains any individual will ever
    want to know when they are planning to beef up
    the information security posture of their
    organization.
  • In 18 comprehensive modules, the course covers
    270 attack technologies, commonly used by hackers.

3
Certified Ethical Hacking Certification -
  • A Certified Ethical Hacker is a skilled
    professional who understands and knows how to
    look for weaknesses and vulnerabilities in target
    systems and uses the same knowledge and tools as
    a malicious hacker, but in a lawful and
    legitimate manner to assess the security posture
    of a target systems.
  • The CEH credential certifies individuals in the
    specific network security discipline of Ethical
    Hacking from a vendor-neutral perspective.

4
The purpose of the CEH credential -
  • Establish and govern minimum standards for
    credentialing professional information security
    specialists in ethical hacking measures.
  • Inform the public that credentialed individuals
    meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and
    self-regulating profession.

5
About the Exam
  • Number of Questions 125
  • Test Duration 4 Hours
  • Test Format Multiple Choice
  • Test Delivery ECC EXAM, VUE
  • Exam Prefix 312-50 (ECC EXAM), 312-50 (VUE)

6
Who Is It For?
  • The Certified Ethical Hacking training course
    will significantly benefit security officers,
    auditors, security professionals, site
    administrators, and anyone who is concerned about
    the integrity of the network infrastructure.

7
What is New in CEH Version 9 Course
  • New Vulnerabilities Are Addressed -
  • Heartbleed CVE-2014-0160
  • Heartbleed makes the SSL layer used by millions
    of websites and thousands of cloud providers
    vulnerable.
  • Detailed coverage and labs in Module 18
    Cryptography
  • Shellshock CVE-2014-6271
  • Shellshock exposes vulnerability in Bash, the
    widely-used shell for Unix-based operating
    systems such as Linux and OS X.
  • Poodle CVE-2014-3566
  • POODLE lets attackers decrypt SSLv3 connections
    and hijack the cookie session that identifies you
    to a service, allowing them to control your
    account without needing your password.

8
  • Focus on New Attack Vectors-
  • CEHv9 focuses on performing hacking (Foot
    printing, scanning, enumeration, system hacking,
    sniffing, DDoS attack, etc.) using mobile phones.
  • Courseware covers latest mobile hacking tools in
    all the modules .
  • Coverage of latest Trojan, Virus, Backdoors .
  • Courseware covers Information Security Controls
    and Information .
  • Security Laws and Standards .
  • Labs on Hacking Mobile Platforms and Cloud
    Computing .
  • More than 40 percent new labs are added from
    Version 8 .
  • More than 1500 new/updated tools.
  • CEHv9 program focuses on addressing security
    issues to the latest operating systems like
    Windows 8.1 .

9
Frequently Asked Questions
  • 1. Can I pursue self-study and attempt the exam
    instead of attending formal training?
  • The answer is yes. You must show 2 years of work
    experience in security related field. You must
    also submit a CEH exam eligibility application
    and obtain an authorization from EC-Council
    before you can attempt the exam. For more
    details, please click HERE.

10
  • 2. Isn't this knowledge harmful? Why do you make
    it available so easily to the public?
  • EC-Council fulfills its social responsibility by
    ensuring that only persons with a minimum of two
    years of security related experience are eligible
    for the course. In addition, all candidates are
    required to sign an agreement where they agree to
    respect the knowledge acquired and not misuse it
    in any way. The candidate also agrees to abide by
    all legal laws of their respective countries of
    residence in the use of thus acquired knowledge.
    Besides the CEH exam is a tough one to pass as
    students must have in-depth knowledge to achieve
    the globally recognized ethical hacking
    certification.

11
  • 3. Aren't tools meant for script kiddies?
  • Does it matter if an elite hacker writes a buffer
    overflow or a script- Kiddy runs a tool if the
    target system gets compromised anyway? The point
    here is that the enemy may be intellectually
    great or small, but he/she requires just one port
    of entry to wreck damage while the organization
    has the entire perimeter to guard with limited
    time and resources.
  • 4. Do reformed hackers teach your course?
  • EC-Council places great emphasis on the quality
    of its instructors. A 17-year-old will not be
    teaching security to professionals at our
    accredited training centers. Certainly,
    experience is the greatest teacher. However,
    EC-Council adheres to a code of ethics and
    encourages security professionals with
    significant years of teaching experience in the
    industry and a security background to handle our
    security related courses.

12
  • 5. What makes this course different from others
    in the market?
  • The Ethical Hacking and Countermeasures course
    prepares candidates for the CEH exam offered by
    EC-Council. The course focuses on hacking
    techniques and technologies from an offensive
    perspective. This advanced security course is
    regularly updated to reflect the latest
    developments in the domain, including new hacking
    techniques, exploits, automated programs as well
    as defensive recommendations as outlined by
    experts in the field. The CEH body of knowledge
    represents detailed contributions from security
    experts, academicians, industry practitioners and
    the security community at large.

13
  • 6. What can I take back to my organization if I
    certify as a CEH?
  • EC-Council believes in giving back to the
    security community as it has partaken of it. When
    you are a Certified Ethical Hacker, you are more
    than a security auditor or a vulnerability tester
    or a penetration tester alone. You are exposed to
    security checklists that will help you audit the
    organizations information assets, tools which
    will check for vulnerabilities that can be
    exploited and above all a methodology to assess
    the security posture of your organization by
    doing a penetration test against it. In short,
    the knowledge you will acquire has practical
    value to make your work place a more secure and
    efficient one.

14
  • 7. I would like to provide professional service
    as a CEH professional. What can I expect to be
    paid per assignment?
  • The remuneration per assignment will vary with
    specifics of the client environment. However, on
    an average you can expect to be paid around
    15,000 to 45,000 per assignment depending on
    location and class size.
  • 8. Where does CEH stand when compared to other
    educational offerings in the field of information
    security?
  • Consider this A security defense course educates
    candidates regarding proper configuration,
    firewalls, or rather preemptive security. CEH
    takes the alternative approach defense in depth
    by attacking the systems. This is in sharp
    contrast to courses that teach defensive tactics
    alone. CEH imparts offensive tactics supplemented
    with defensive countermeasures. This ensures that
    the CEH professional can have a holistic security
    perspective of the organization.

15
  • 9. What are Hacking techniques and their
    technology?
  • Hacking techniques represent ways and means by
    which computer programs can be made to behave in
    ways they are not meant to. These techniques
    extend beyond the technology domain and can be
    applied to test security policies and procedures.
    Hacking technologies are used to refer to those
    tools and automated programs that can be used by
    perpetrators against an organization to incur
    critical damage. As technology advances, the
    skills required to execute a hack are much lesser
    as pre-compiled programs are available to effect
    havoc with simple point and click.

16
  • 10. It is all too technical. Do you reflect
    real-world business issues?
  • The value of CEH lies in its practical value.
    Over 18 domains, students are exposed to business
    risks and the potential damage that can occur due
    to negligence. Students will be able to make an
    informed decision regarding the amount of risk a
    company can face if it chooses to address a
    security concern.
  • 11. What is the employment value of CEH?
  • The ANSI accredited Ethical Hacking program is
    primarily targeted at security professionals who
    want to acquire a well-rounded body of knowledge
    to have better opportunities in this field.
    Acquiring a Certified Ethical Hacking
    Certification means the candidate has a minimum
    baseline knowledge of security threats, risks and
    countermeasures. Organizations can rest assured
    that they have a candidate who is more than a
    systems administrator, a security auditor, a
    hacking tool analyst or a vulnerability tester.
    The candidate is assured of having both business
    and technical knowledge.

17
  • 12. I am a CEH. What is my level?
  • Congratulations on becoming a CEH! You have
    joined an elite group of professionals around the
    world. Your next level is to become an EC-Council
    Certified Security Analyst (ECSA) .

18
Related Courses -
CNDA ECSA
CEH CND
19
(No Transcript)
20
  • THANK YOU

CODEC NETWORKS PVT LTD 507, New Delhi House,
Barakhamba Road, Connaught Place, New Delhi
110001 Tel 91 11 43752299, 43049696 Mob 91
9971676124, 9015258288, 9911738718, E-Mail
trainings_at_codecnetworks.com, mktg_at_codecnetworks.co
m Branch Offices Greater Noida, Mumbai,
Bangalore, Ahmedabad International Associates
USA Australia Japan Hong Kong Ghana  
www.codecnetworks.com CODEC Networks logo are
trademarks of CODEC Networks. All other
trademarks are the property of their respective
owners. The information presented is subject to
change without notice. CODEC Networks assumes no
responsibility for inaccuracies contained
herein. 2007 CODEC NETWORKS. All rights
reserved. 22137 (10)
Write a Comment
User Comments (0)