Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

  • Be the first to comment

  • Be the first to like this


  1. 1. 1
  2. 2. Riphah International University &International Council of E-Commerce Consultants.
  3. 3. History of the CompanyThe September 9/11 Attacks on the World Trade Center ignited a very importantquestion in the hearts of the founders of EC–Council – Jay Bavisi and HajaMohideen.Shortly after the attacks, they researched the web for “Information Security”programs that would be able to provide Information Security professionals withthe necessary tools and education that will help them avert a cyber war shouldthe need ever arise.The results returned from the research were disappointing and that motivatedthem to form the International Council of Electronic Commerce Consultants,known as the EC-Council.They soon gained the support of subject matter experts from all over the worldthat eventually led to the creation of various standards and certifications bothin the electronic commerce and information security space.
  4. 4. About EC-Council Established in 2001 and HQ’ed in the USA, R&D office in India and International office based in Malaysia Creator of the world-famous Certified Ethical Hacker certified program (CEH) Certified more than 28,000 professionals from the FBI, CIA, US DOD, Microsoft, Symantec, Deloitte and Fortune 500 companies More than 450 training partners in over 60 countries Partners with UN/ITU via Cyber security arm - IMPACT Delivery partners include McAfee, PwC, Deloitte, etc More than 350 subject matter experts globally in developing contents Delivers more than 20 different certifications in Information Security and eBusiness
  5. 5. Collaboration With EC Council RIU and EC Council signed 1st Pakistan Academic and Professional Partnership agreement to conduct all EC Council Information Security Certifications. It is an honor for Pakistan community as well as the opportunity for IT Professionals to do the Information Security Certification from EC Council authorized instructor and appear for exam (Free of Cost) under on roof of RIU.
  6. 6. Owner of the Hacker Halted conference and workshop series,which had been organized in international cities such as Miami,Myrtle Beach, Dubai, Singapore, Kuala Lumpur, Mexico City, amongothers. Hacker Halted features renowned international speakerswho are experts in the field of information security.Objective of Hacker Halted conference series is to raiseinternational awareness towards increased education and ethics ininformation security.
  7. 7. EC-Council IT Certification Levels• ECSS• Security • CEH/CNDA Fundamentals • CHFI• Security 5• Network 5• Wireless 5• ENSA Entry Intermediate Level Level Advanced Specialized Level• ECSP/CSAD • ECSA• ECVP • LPT• ECDR/ECVT• ECIH• ECCI
  8. 8. EC-Council Certification Quadrant Security 5 Network 5 ECVPInformation Wireless5 ECDR/ECVT TechnologySecurity ENSA CertificationCertification CEH/CNDA = ECSA/LPT CHFI, ECCI, ECIH ECSP Cyber Law Programming Cyber Marketing Management CSAD E Business Security Certification Certification Knowledge Management Project Management CRM, SCM, ERP
  9. 9. Typical Security Job Roles and responsibilities Job Level Typical Roles Corresponding Certifications & Designations Information IT/IS Assurance, Design, and MSS/ECSO (Coming Soon)Executive Compliance Information Assurance IT/IS oversight and Manager Personnel management Disaster Recovery Secure Penetration Testing Specialist Forensics Specialist VOIP Specialist Specialization Specialist Programmer roles including Pen Testing, Forensics, IT/IS Disaster Recover,Specialist Voice over IP, Secure Programming, etc. Network Installation, Configuration,IT/IS Admin maintenance, Information Assurance Standard Network IT/IS installation &Technician configuration Access toInformation Computing Worker systems
  10. 10. EC-Council IT Security Professional Certification Vs Job Role Information Security Specialist/Engineer/Officer, Vulnerability Management Analysts , IS Consultant CEH Only for Federal Agencies CNDA Penetration Tester, Senior Consultant, Senior Analyst ECSA/LPT ENSA Network/System Admin ECVP VoIP Engineer, Voice Professional/Consultant/Specialist, VoIP System Manager CHFI Computer Crime Investigator, Security Forensic Engineer, Computer Forensics Certification for Lawyers ECCI DR Specialist/Manager/Consultant, BC Manager, Incident Command System Advisor, ECDR/ECVT Virtualization/Infrastructure Engineer, Infrastructure Architect & Admin
  11. 11. Addressing Global Learning Needs EC-Council Industry Academia EC-Council University Corporate University Collaboration University and Direct Market Market Student MarketIT Professionals Universities, technical institutions Education Providers & and end users and education providers Students
  12. 12. Information Security Certifications
  13. 13. EC Council Certifications
  14. 14. EC Council Certifications
  15. 15. EC Council Certifications
  16. 16. • We offer EC-Council Certified Ethical Hacker exam 312-50 preparation by EC-Council Certified Instructor on 27th September-01 October, 2010.• Who Should Attend This course will significantly benefit CIO, CTO, IT security officers, IT Managers, IT auditors, security professionals, Network administrators, and anyone who is concerned about the integrity of the network infrastructure.• Duration: 5 days (9:00 – 5:00)• Certification The Certified Ethical Hacker certification exam 312-50 will be conducted on the last day of training.• Prometic Centre Students need to pass the online Prometric exam to receive the CEH certification. Riphah has the Prometric centre facility as well.
  17. 17. Certified Ethical Hacker (CEH) Course Module Introduction to Ethical Hacking  SQL Injection Hacking Laws  Hacking Wireless Networks Footprinting  Physical Security Google Hacking  Linux Hacking Scanning  Evading IDS, Firewalls and Detecting Honey Enumeration Pots System Hacking  Buffer Overflows Trojans and Backdoors  Cryptography Viruses and Worms  Penetration Testing Sniffers  Covert Hacking Social Engineering  Writing Virus Codes Phishing  Assembly Language Tutorial Hacking Email Accounts  Exploit Writing Denial-of-Service  Smashing the Stack for Fun and Profit Session Hijacking  Windows Based Buffer Overflow Exploit Hacking Web Servers Writing Web Application Vulnerabilities  Reverse Engineering Web-Based Password Cracking  Macintosh Hacking Techniques  Hacking Routers, cable Modems and Firewalls  Hacking Mobile Phones, PDA and Handheld Devices
  18. 18. Certified Ethical Hacker (CEH) Course Module Bluetooth Hacking  Data Loss Prevention VoIP Hacking  Hacking Global Positioning System (GPS) RFID Hacking  Computer Forensics and Incident Handling Spamming  Credit Card Frauds Hacking USB Devices  How to Steal Passwords Hacking Database Servers  Firewall Technologies Cyber Warfare- Hacking, Al-Qaida and Threats and Countermeasures Terrorism  Case Studies Internet Content Filtering Techniques  Privacy on the Internet  Botnets Securing Laptop Computers  Economic Espionage Spying Technologies  Patch Management Corporate Espionage- Hacking Using  Security Convergence Insiders Creating Security Policies Software Piracy and Warez Hacking and Cheating Online Games Hacking RSS and Atom Hacking Web Browsers Proxy Server Technologies
  19. 19. Dedicated EC Council Certification Lab & Prometric Centre
  20. 20. E Business Certifications
  21. 21. Certified Members List….Canon Cingular Wireless Bell CanadaHewlett Packard Columbia Daily Tribune SonyUS Air Force Reserve Marriott Hotel KodakUS Embassy Quantum Research Ontario Provincial PoliceVerizon US Military Harris CorporationPFIZER IBM Global Services XeroxHDFC Bank UPS Riphah International UniversityUniversity of Memphis American Express Philips ElectronicsMicrosoft Corporation FBI U.S. ArmyWorldcom Boehringer IngelheimTrusecure Wipro ScheringUS Department of Defense United States Marine Corps AccentureFedex Reserve Bank of India SAICDunlop US Air Force FujitsuNovell Singapore Airlines Supreme Court of the PhilippinesCisco Nortel Networks United NationsMentor Graphics MCI Ministry of Defense, UKTCS Check Point Software Singapore PoliceNISER
  22. 22. Thank You