Riphah International University &International Council of E-Commerce Consultants.
History of the CompanyThe September 9/11 Attacks on the World Trade Center ignited a very importantquestion in the hearts of the founders of EC–Council – Jay Bavisi and HajaMohideen.Shortly after the attacks, they researched the web for “Information Security”programs that would be able to provide Information Security professionals withthe necessary tools and education that will help them avert a cyber war shouldthe need ever arise.The results returned from the research were disappointing and that motivatedthem to form the International Council of Electronic Commerce Consultants,known as the EC-Council.They soon gained the support of subject matter experts from all over the worldthat eventually led to the creation of various standards and certifications bothin the electronic commerce and information security space.
About EC-Council Established in 2001 and HQ’ed in the USA, R&D office in India and International office based in Malaysia Creator of the world-famous Certified Ethical Hacker certified program (CEH) Certified more than 28,000 professionals from the FBI, CIA, US DOD, Microsoft, Symantec, Deloitte and Fortune 500 companies More than 450 training partners in over 60 countries Partners with UN/ITU via Cyber security arm - IMPACT Delivery partners include McAfee, PwC, Deloitte, etc More than 350 subject matter experts globally in developing contents Delivers more than 20 different certifications in Information Security and eBusiness
Collaboration With EC Council RIU and EC Council signed 1st Pakistan Academic and Professional Partnership agreement to conduct all EC Council Information Security Certifications. It is an honor for Pakistan community as well as the opportunity for IT Professionals to do the Information Security Certification from EC Council authorized instructor and appear for exam (Free of Cost) under on roof of RIU.
Owner of the Hacker Halted conference and workshop series,which had been organized in international cities such as Miami,Myrtle Beach, Dubai, Singapore, Kuala Lumpur, Mexico City, amongothers. Hacker Halted features renowned international speakerswho are experts in the field of information security.Objective of Hacker Halted conference series is to raiseinternational awareness towards increased education and ethics ininformation security.
Typical Security Job Roles and responsibilities Job Level Typical Roles Corresponding Certifications & Designations Information IT/IS Assurance, Design, and MSS/ECSO (Coming Soon)Executive Compliance Information Assurance IT/IS oversight and Manager Personnel management Disaster Recovery Secure Penetration Testing Specialist Forensics Specialist VOIP Specialist Specialization Specialist Programmer roles including Pen Testing, Forensics, IT/IS Disaster Recover,Specialist Voice over IP, Secure Programming, etc. Network Installation, Configuration,IT/IS Admin maintenance, Information Assurance Standard Network IT/IS installation &Technician configuration Access toInformation Computing Worker systems
EC-Council IT Security Professional Certification Vs Job Role Information Security Specialist/Engineer/Officer, Vulnerability Management Analysts , IS Consultant CEH Only for Federal Agencies CNDA Penetration Tester, Senior Consultant, Senior Analyst ECSA/LPT ENSA Network/System Admin ECVP VoIP Engineer, Voice Professional/Consultant/Specialist, VoIP System Manager CHFI Computer Crime Investigator, Security Forensic Engineer, Computer Forensics Certification for Lawyers ECCI DR Specialist/Manager/Consultant, BC Manager, Incident Command System Advisor, ECDR/ECVT Virtualization/Infrastructure Engineer, Infrastructure Architect & Admin
Addressing Global Learning Needs EC-Council Industry Academia EC-Council University Corporate University Collaboration University and Direct Market Market Student MarketIT Professionals Universities, technical institutions Education Providers & and end users and education providers Students
Information Security Certifications
EC Council Certifications
EC Council Certifications
EC Council Certifications
• We offer EC-Council Certified Ethical Hacker exam 312-50 preparation by EC-Council Certified Instructor on 27th September-01 October, 2010.• Who Should Attend This course will significantly benefit CIO, CTO, IT security officers, IT Managers, IT auditors, security professionals, Network administrators, and anyone who is concerned about the integrity of the network infrastructure.• Duration: 5 days (9:00 – 5:00)• Certification The Certified Ethical Hacker certification exam 312-50 will be conducted on the last day of training.• Prometic Centre Students need to pass the online Prometric exam to receive the CEH certification. Riphah has the Prometric centre facility as well.
Certified Ethical Hacker (CEH) Course Module Introduction to Ethical Hacking SQL Injection Hacking Laws Hacking Wireless Networks Footprinting Physical Security Google Hacking Linux Hacking Scanning Evading IDS, Firewalls and Detecting Honey Enumeration Pots System Hacking Buffer Overflows Trojans and Backdoors Cryptography Viruses and Worms Penetration Testing Sniffers Covert Hacking Social Engineering Writing Virus Codes Phishing Assembly Language Tutorial Hacking Email Accounts Exploit Writing Denial-of-Service Smashing the Stack for Fun and Profit Session Hijacking Windows Based Buffer Overflow Exploit Hacking Web Servers Writing Web Application Vulnerabilities Reverse Engineering Web-Based Password Cracking Macintosh Hacking Techniques Hacking Routers, cable Modems and Firewalls Hacking Mobile Phones, PDA and Handheld Devices
Certified Ethical Hacker (CEH) Course Module Bluetooth Hacking Data Loss Prevention VoIP Hacking Hacking Global Positioning System (GPS) RFID Hacking Computer Forensics and Incident Handling Spamming Credit Card Frauds Hacking USB Devices How to Steal Passwords Hacking Database Servers Firewall Technologies Cyber Warfare- Hacking, Al-Qaida and Threats and Countermeasures Terrorism Case Studies Internet Content Filtering Techniques Privacy on the Internet Botnets Securing Laptop Computers Economic Espionage Spying Technologies Patch Management Corporate Espionage- Hacking Using Security Convergence Insiders Creating Security Policies Software Piracy and Warez Hacking and Cheating Online Games Hacking RSS and Atom Hacking Web Browsers Proxy Server Technologies
Dedicated EC Council Certification Lab & Prometric Centre
E Business Certifications
Certified Members List….Canon Cingular Wireless Bell CanadaHewlett Packard Columbia Daily Tribune SonyUS Air Force Reserve Marriott Hotel KodakUS Embassy Quantum Research Ontario Provincial PoliceVerizon US Military Harris CorporationPFIZER IBM Global Services XeroxHDFC Bank UPS Riphah International UniversityUniversity of Memphis American Express Philips ElectronicsMicrosoft Corporation FBI U.S. ArmyWorldcom Boehringer IngelheimTrusecure Wipro ScheringUS Department of Defense United States Marine Corps AccentureFedex Reserve Bank of India SAICDunlop US Air Force FujitsuNovell Singapore Airlines Supreme Court of the PhilippinesCisco Nortel Networks United NationsMentor Graphics MCI Ministry of Defense, UKTCS Check Point Software Singapore PoliceNISER