download proposal - Rhythex Consulting - Information Security ...

kitlunchroomAI and Robotics

Nov 21, 2013 (3 years and 11 months ago)

117 views


CERTIFIED ETHICAL HACKER VERSION 8

(CEHv8)


DATE:
25
TH



29
TH

NOVEMBER,

201
3










Dear Sir/Madam



CERTIFIED ETHICAL HA
CKER VERSION 8



(CEHv8)

EC
-
Council's Certified Ethical Hacker (CEH) course has long been the standard
-
setting certification in
the information security industry, and its new incarnation,
CEHV8
,

is now an
ANSI 17024

accredited
professional certification. The CEH training program has been widely used by the Pentagon to train its
computer network defense service professionals as part of the Department of Defense Directive 8570
and has also been widely used by major def
ense communities around the world.

The newly updated CEH contains

twenty

(
20
)

of the most current security domains any ethical hacker
will ever want to know when they are planning to beef up the information security posture of their
organization. The reva
mped
CEH v8

will contain many enhancements including: core content updates,
well
-
organized content flow, diagrammatic representation of concepts and attacks showcasing the latest
hacking techniques, pentesting components, updated labs and courseware and po
pular hacking and
security tools videos. Here are a few of the latest advancements the
CEH v8

will address and focus on:



CEH v8

program focuses on addressing security issues to the latest operating systems including
Windows 8 and Windows Server 2012



It
also focuses on addressing the existing threats to operating environments dominated by
Windows 7 and other operating systems (backward compatibility)



CEH v8

focuses on the latest hacking attacks targeted to mobile platform and tablet computers
and covers c
ountermeasures to secure mobile infrastructure



Coverage of latest development in mobile and web technologies including Andriod OS 4.1 and
Apps, iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8 and HTML 5





What is New in the CEH v8?



More than 600 new
instructor slides



More than 40 percent new labs are added



More than 1500 new/updated tools




CEH v8

program focuses on addressing security issues to the latest operating systems including
Windows 8 and Windows Server 2012



It also focuses on addressing the e
xisting threats to operating environments dominated by
Windows 7 and other operating systems (backward compatibility)



CEHv8
focuses on the latest hacking attacks targeted to mobile platform and tablet computers
and covers countermeasures to secure mobile i
nfrastructure



Coverage of latest development in mobile and web technologies including Andriod OS 4.1 and
Apps, iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8 and HTML 5

CEH v8

Key

Features



20 Modules



110 Labs



1770 Slides



Slides with written text (Online)



Updated information as per the latest developments with a proper flow



Classroom friendly with diagrammatic representation of concepts and attacks



Robust best practices to follow to protect information systems against various attacks



New and rich
presentation style with eye catching graphics



Latest Operating Systems (Windows 8 and Windows Server 2012)covered and a patched testing
environment



Well tested, result oriented, descriptive and analytical lab manual to evaluate the presented concepts


Who
Should Attend

This course will significantly benefit security officers, auditors, security professionals, site
administrators, and anyone who is concerned about the integrity of the network infrastructure.








TRAINING
DETAILS

Duration:

5 Days

Batch

Size:

15 Participants

Date

25
th



29
th

November
, 2013

Fees

$1,3
0
0

(One Thousand
Three

Hundred

US Dollars)


VAT+NHIL Exclusive

Venue

Rhythex Training Centre, Opposite Dan Morton Tailors, Adjacent the Church
of Latter Day Saint, The Road behind Trust
Towers, Asylum Down, Accra.

Course Fees Refund
Policy:

Full refund shall be given only if request for cancellation is received 7 working
days prior to the commencement of the course. These rules are subject to
change without notice.

Courseware:

An
official EC
-
Council Courseware, CD of latest ha
cking tools and demos and
a two

Examination Voucher
s
.

Instructor:

EC
-
Council Accredited Instructor

Registration
deadline

Registration and payment for this batch must be completed on or before

18
th

November
,

2013 to secure a space.


NOTE: The CEH Exam can be taken at a later date at Rhythex Exam Centre (web based Prometric
centre) for CEH (312
-
50). The Centre is open to all for examinations.


For any clarification or registration, you can contact Rhythex on 0302231305, or
0244929913. You can also send us a mail on
info@rhythexconsultingghana.com



WARNING:
Students are warned against attending CEH training at
unauthorized training centers. Only those who attend CEH training at
EC
-
Council ATCs are eligible for CEH certification. Also you will be
required to show proof of official CEH training attendance when
you
apply for EC
-
Council’s LPT certification and Master of Security Science
(MSS) degree program.


Please e
-
mail at
info@eccouncil.org

to check the authorized validity of a training center.










CEH V8 COURSE DETAILS

Some of the concepts you will learn to master during this hands
on hacking and penetration testing course include



Module 01:
Introduction to Ethical Hacking



Module 02:
Footprinting

and Reconnaissance



Module 03:
Scanning Networks



Module 04
Enumeration



Module 05:
System Hacking



Module 06:
Trojans and Backdoors



Module 07:
Viruses and Worms



Module 08:
Sniffers



Module 09:
Social Engineering



Module 10:
Denial of Service



Module 11:

Session Hijacking



Module 12:

Hacking Webservers



Module 13:

Hacking Web Applications



Module 14
:
SQL Injection



Module 15
:
Hacking Wireless Networks



Module 16:

Evading IDS, Firewalls and Honeypots



Module 17:

Buffer Overflows



Module 18:

Cryptography



Module 19:
Penetration Testing



Module

20:
Mobile Hacking






SOME ORGANIZATIONS THAT HAVE GONE THROUGH THE CERTIFIED ETHICAL
HACKER AND COUNTERMEASURES TRAINING / CERTIFICATION IN GHANA

1.

GHANA ARMED
FORCES

2.

GHANA POLICE

3.

VRA

4.

MTN

5.

UNIV. OF GHANA

6.

MINISTRY OF INFORMATION

7.

BANK OF GHANA

8.

BNI

9.

NATIONAL SECURITY

10.

CIPD GIMPA

11.

IPMC

12.

SSNIT

13.

ZENITH BANK

14.

UBA

15.

INTERCONTINENTAL BANK

16.

MERCHANT BANK

17.

ECOBANK EPROCESS INTERNATIONAL

18.

NHIA

19.

VODAFONE

20.

GHANA COMMERCIAL BANK