SlideShare a Scribd company logo
Ethical Hacking & Penetration Test ting
      Bachelor Degree in Computer Engineering (CPE)
              Faculty of Engineering, KMUTT
                       18-Sep_2009




                   Surachai Chatchalermpun
Global Certificate
• EC-Council
     – CEH (Certified Ethical Hacker)
     – ECSA (EC-Council Certified Security Analyst)
     – LPT (Lice sensed Penetration Tester)
• SANS GIAC (Global Information Assurance Certification)
     – GPEN (GIAC Certified Penetration Tester )
     – GWAPT (GIAC Web Application Penetration Tester)
•   OSSTMM (The Open Source Security Testing Methodology Manual)
     – OPST (OSSTMM PROFESSIONAL SECURITY TESTER ACCREDITED CERTIFICATION)
     – OPSA (OSSTMM PROFESSIONAL SECURITY ANALYST ACCREDITED CERTIFICATION)
                                   • NIST (SP800-115)
     – OPSE (OSSTMM PROFESSIONAL SECURITY EXPERT ACCREDITED CERTIFICATION)
        OSSTMM
•   Mile2
     – CPTEngineer (Certified Pen Testing Engineer)
Government-US with standards such as the NSA Infrastructure Evaluation Methodology (IEM).
Open Web Application Security Project (OWASP) provides a framework of recommendations       2
OSSTMM   • NIST (SP800-115)




                              3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50

More Related Content

PDF
Vulnerability Assessment and Penetration Testing Report
PPT
PDF
Penetration Security Testing
PDF
Penetration testing the cloud - vlad gostom
PPTX
Vapt pci dss methodology ppt v1.0
PDF
Running a Software Security Program with Open Source Tools (Course)
PDF
Application Security in the Age of Open Source
Vulnerability Assessment and Penetration Testing Report
Penetration Security Testing
Penetration testing the cloud - vlad gostom
Vapt pci dss methodology ppt v1.0
Running a Software Security Program with Open Source Tools (Course)
Application Security in the Age of Open Source

Viewers also liked (18)

PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
PDF
Running a Software Security Program with Open Source Tools
PDF
Don't Let Open Source be the Deal Breaker In Your M&A
PDF
PCI and Vulnerability Assessments - What’s Missing
PPTX
Introduction to SSH & PGP
PDF
Securing Docker Containers
PPTX
Pen Testing Explained
PPT
The Security Vulnerability Assessment Process & Best Practices
PDF
Vulnerability Assessment Report
PDF
Open Source in Application Security
PPTX
ASP.NET Web Security
PDF
Btpsec Sample Penetration Test Report
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
PPT
Arp spoofing
PDF
The 4 Levels of Open Source Risk Management
PPTX
Arp (address resolution protocol)
PPT
Address resolution protocol
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Running a Software Security Program with Open Source Tools
Don't Let Open Source be the Deal Breaker In Your M&A
PCI and Vulnerability Assessments - What’s Missing
Introduction to SSH & PGP
Securing Docker Containers
Pen Testing Explained
The Security Vulnerability Assessment Process & Best Practices
Vulnerability Assessment Report
Open Source in Application Security
ASP.NET Web Security
Btpsec Sample Penetration Test Report
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Arp spoofing
The 4 Levels of Open Source Risk Management
Arp (address resolution protocol)
Address resolution protocol

Similar to Ethical Hacking & Penetration Testing (20)

PPT
Recruiters' guide to hire an Ethical hacker
PDF
N3XAsec CPTE plan de estudios detallado
PDF
WTF is Penetration Testing
PPTX
Ethical hacking
PPTX
GETTING STARTED WITH THE ETHICAL HACKING.pptx
PDF
Cyber Security Company.pdf
PDF
Penetration and hacking training brief
PPTX
Ethical Hacking Dilemma Thesis Defense by Slidesgo.pptx
PPTX
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
PPTX
Lect0INT245.pptx
PPTX
mille2.pptx
PDF
ethical Hack
PDF
PDF
PPTX
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
PDF
Pen test free_01_2012
DOCX
Analyzing and implementing of network penetration testing
PDF
What is pentest
PDF
BASICS OF ETHICAL HACKING
Recruiters' guide to hire an Ethical hacker
N3XAsec CPTE plan de estudios detallado
WTF is Penetration Testing
Ethical hacking
GETTING STARTED WITH THE ETHICAL HACKING.pptx
Cyber Security Company.pdf
Penetration and hacking training brief
Ethical Hacking Dilemma Thesis Defense by Slidesgo.pptx
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Lect0INT245.pptx
mille2.pptx
ethical Hack
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
Pen test free_01_2012
Analyzing and implementing of network penetration testing
What is pentest
BASICS OF ETHICAL HACKING

Ethical Hacking & Penetration Testing

  • 1. Ethical Hacking & Penetration Test ting Bachelor Degree in Computer Engineering (CPE) Faculty of Engineering, KMUTT 18-Sep_2009 Surachai Chatchalermpun
  • 2. Global Certificate • EC-Council – CEH (Certified Ethical Hacker) – ECSA (EC-Council Certified Security Analyst) – LPT (Lice sensed Penetration Tester) • SANS GIAC (Global Information Assurance Certification) – GPEN (GIAC Certified Penetration Tester ) – GWAPT (GIAC Web Application Penetration Tester) • OSSTMM (The Open Source Security Testing Methodology Manual) – OPST (OSSTMM PROFESSIONAL SECURITY TESTER ACCREDITED CERTIFICATION) – OPSA (OSSTMM PROFESSIONAL SECURITY ANALYST ACCREDITED CERTIFICATION) • NIST (SP800-115) – OPSE (OSSTMM PROFESSIONAL SECURITY EXPERT ACCREDITED CERTIFICATION) OSSTMM • Mile2 – CPTEngineer (Certified Pen Testing Engineer) Government-US with standards such as the NSA Infrastructure Evaluation Methodology (IEM). Open Web Application Security Project (OWASP) provides a framework of recommendations 2
  • 3. OSSTMM • NIST (SP800-115) 3
  • 4. 4
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36
  • 37. 37
  • 38. 38
  • 39. 39
  • 40. 40
  • 41. 41
  • 42. 42
  • 43. 43
  • 44. 44
  • 45. 45
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. 50