Ethical Hacking & Countermeasure Specialist - EC-Council
Ethical Hacking & Countermeasure Specialist - EC-Council Ethical Hacking & Countermeasure Specialist - EC-Council
Ethical Hacking & Countermeasure Specialist EHS305 Course Title: Ethical Hacking & Countermeasure Specialist: Secure Network Infrastructures Page 1 of 14 Secure Network Infrastructures Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
- Page 2 and 3: Ethical Hacking & Countermeasure Sp
- Page 4 and 5: Ethical Hacking & Countermeasure Sp
- Page 6 and 7: Ethical Hacking & Countermeasure Sp
- Page 8 and 9: Ethical Hacking & Countermeasure Sp
- Page 10 and 11: Ethical Hacking & Countermeasure Sp
- Page 12 and 13: Ethical Hacking & Countermeasure Sp
- Page 14: Ethical Hacking & Countermeasure Sp
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
EHS305<br />
Course Title:<br />
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong>: Secure Network Infrastructures<br />
Page 1 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
Course Description<br />
EHS305<br />
This certification covers a plethora of offensive security topics ranging from how perimeter defenses work<br />
to scanning and attacking the simulated networks. A wide variety of tools, viruses, and malware is<br />
presented in this and the other four books, providing a complete understanding of the tactics and tools<br />
used by hackers. By gaining a thorough understanding of how hackers operate, an <strong>Ethical</strong> Hacker will be<br />
able to set up strong countermeasures and defensive systems to protect an organization's critical<br />
infrastructure and information.<br />
CertificateInfo<br />
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong>: Secure Network Infrastructures<br />
Who Should Attend<br />
This course will significantly benefit security officers, auditors, security professionals, site administrators,<br />
and anyone who is concerned about the integrity of the network infrastructure.<br />
Course Duration<br />
2 days (9:00AM – 5:00PM)<br />
CPE/<strong>EC</strong>E Qualification<br />
16 <strong>EC</strong>E Credits awarded for attendance (1 for each classroom hour)<br />
Suggested Retail:<br />
$799 USD<br />
Page 2 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
EHS305<br />
Required Courseware:<br />
Visit www.cengage.com/community/eccouncil and click on Training Workshops for ordering details.<br />
What’s included<br />
Physical Courseware<br />
1 year Access To <strong>EC</strong>-<strong>Council</strong> Student LMS for Practical Labs (if applicable), testing, and Certificate<br />
Course + Supplement Cost:<br />
See the “Training Workshops” section at www.cengage.com/community/eccouncil for current pricing<br />
information.<br />
Related Certificates:<br />
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong>: Attack Phases<br />
<strong>Ethical</strong> <strong>Hacking</strong> and <strong>Countermeasure</strong>s: Threats and Defense Mechanisms<br />
<strong>Ethical</strong> <strong>Hacking</strong> and <strong>Countermeasure</strong>s: Web Applications and Data Servers<br />
<strong>Ethical</strong> <strong>Hacking</strong> and <strong>Countermeasure</strong>s: Linux, Macintosh and Mobile Systems<br />
Page 3 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
Course Briefing<br />
EHS305<br />
1. <strong>Hacking</strong> Wireless Networks<br />
Chapter Brief:<br />
A Wireless LAN (WLAN) is an interconnection of computers over a local area network that<br />
exchanges data and other information without the use of cables. As more and more firms adopt<br />
wireless networks, the security issue becomes more crucial. Business is at high risk from whackers<br />
(wireless hackers) who do not need physical entry into the business network to hack, but can<br />
compromise a network with the help of freely available tools.<br />
The module explains about hacking on the wireless networks. It describes about the types of<br />
wireless networks and its standards. It explains about the concepts in wireless technology,<br />
wireless devices, Wired Equivalent Privacy, and Wi-Fi Protected Access. It briefs the steps to<br />
break WEP encryption and attacking WPA encrypted networks. It explains about TKIP and LEAP<br />
concepts, the hacking methods, and the tools on Scanning and Sniffing.<br />
2. Physical Security<br />
Chapter Brief:<br />
Physical security includes the measures to protect personnel, critical assets, and systems against<br />
deliberate attacks and accidents. It intends to prevent the unauthorized access of information and<br />
other assets of a company. Physical security does not just cater to securing systems only, but it<br />
also involves securing the entire premises, boundaries, workstations, and any other area that may<br />
be unique to a company. It provides an added layer of security for networks, by restricting the<br />
access of the network resources.<br />
This module deals with securing of personnel and critical assets from different threats. The<br />
module gives introduction to physical security and the factors that affect the physical security.<br />
The module shows different authentication and access control devices. It explains about the<br />
attacks that are possible in access control. It explains about facility management, housekeeping,<br />
physical security attacks, and countermeasures to avoid the attacks.<br />
3. Evading IDS, Firewall and Honeypots<br />
Chapter Brief:<br />
The Intrusion Detection Systems (IDS) and firewalls, honeypots serve various purposes in<br />
securing the organization from Internet threats. While the IDS detects any attempts made by an<br />
attacker to break into a system, the firewall only allows the authorized users to utilize the network<br />
resources and the honeypots are helpful in studying the mode of attacks the attackers use. The<br />
attacker will have to somehow come around these security features to remain undetected and not<br />
leave any tracks of the attack.<br />
This module deals with how to evade IDS, Firewall, and Honeypots. It explains about the ways to<br />
detect an intrusion, detection of attack by IDS, ways to evade IDS, and the tools used to evade<br />
IDS. It describes the working of firewalls, types of firewalls, ways of bypassing firewalls, and the<br />
tools used to evade firewalls. It introduces Honeypots, the types of Honeypots, the steps to setup<br />
honeypot, and the tools for honeypot.<br />
4. Cryptography<br />
Chapter Brief:<br />
Page 4 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
EHS305<br />
Cryptography is defined as a method of transmitting and storing the information such that only<br />
the intended individuals can read and process the data. The sensitive information is protected by<br />
encrypting the information. The cryptographic attacks circumvent the security of a cryptographic<br />
system by finding a weakness in a code, cipher, and cryptographic protocol in the encryption.<br />
This module familiarizes you with cryptography and the different techniques used in<br />
cryptography. It explains about the types of cryptosystems and the types of cryptographic<br />
algorithms. It discusses about the private and public key cryptography. It explains about the<br />
different RSA attacks, Hash Functions, and Encryption. It also briefs about digital signatures and<br />
the attacks on digital signatures and explains the attacks on cryptography and the tools used in<br />
cryptography.<br />
Page 5 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
Course Outline<br />
EHS305<br />
<strong>Hacking</strong> Book 5: Secure Network Infrastructure<br />
Chapter 1: <strong>Hacking</strong> Wireless Networks<br />
• Introduction to <strong>Hacking</strong> Wireless Networks<br />
o Wireless Networking<br />
o Wired Network vs. Wireless Network<br />
o Effects of Wireless Attacks on Business<br />
o Types of Wireless Network<br />
• Wireless Standards<br />
o Wireless Standard: 802.11a<br />
o Wireless Standard: 802.11b – “WiFi”<br />
o Wireless Standard: 802.11g<br />
o Wireless Standard: 802.11i<br />
o Wireless Standard: 802.11n<br />
o Wireless Standard:802.15 (Bluetooth)<br />
o Wireless Standard:802.16 (WiMax)<br />
• WiMax Featured Companies<br />
• WiMax Equipment Vendors<br />
• Wireless Concepts<br />
o Related Technology and Carrier Networks<br />
o SSID<br />
o Is the SSID a Secret<br />
o Authentication and Association<br />
o Authentication Modes<br />
o The 802.1X Authentication Process<br />
o 802.11 Specific Vulnerabilities<br />
o Authentication and (Dis)Association Attacks<br />
o MAC Sniffing and AP Spoofing<br />
• Wireless Devices<br />
o Antennas<br />
o Cantenna<br />
o Wireless Access Points<br />
o Beacon Frames<br />
o Phone Jammers<br />
• Phone Jamming Devices<br />
Page 6 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
• Wired Equivalent Privacy (WEP)<br />
EHS305<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
WEP Issues<br />
WEP - Authentication Phase<br />
WEP - Shared Key Authentication<br />
WEP - Association Phase<br />
WEP Flaws<br />
Breaking WEP Encryption<br />
o<br />
• WPA<br />
Steps to Break WEP Encryption<br />
o<br />
o<br />
o<br />
o<br />
o<br />
What is WPA<br />
WPA Vulnerabilities<br />
WEP. WPA. and WPA2<br />
Wi-Fi Protected Access 2 (WPA2)<br />
Attacking WPA Encrypted Networks<br />
o<br />
Evil Twin: Attack<br />
• TKIP and LEAP<br />
o<br />
Temporal Key Integrity Protocol (TKIP)<br />
• Working of TKIP<br />
• Changing WEP to TKIP<br />
o<br />
o<br />
o<br />
LEAP: The Lightweight Extensible Authentication Protocol<br />
LEAP Attacks<br />
LEAP Attack Tool: ASLEAP<br />
• Working of ASLEAP<br />
• <strong>Hacking</strong> Methods<br />
o<br />
o<br />
Techniques to Detect Open Wireless Networks<br />
Steps for <strong>Hacking</strong> Wireless Networks<br />
• Step 1: Find Networks to Attack<br />
• Step 2: Choose the Network to Attack<br />
• Step 3: Analyzing the Network<br />
• Step 4: Sniffing the Network<br />
• Step 4-1: Sniffing Wireless Data<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Step 5: Cracking the WEP Key<br />
Super Bluetooth Hack<br />
Man-in-the-Middle Attack (MITM)<br />
Denial-of-Service Attacks<br />
Hijacking and Modifying a Wireless Network<br />
• Cracking WEP<br />
Page 7 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
o Automated WEP Crackers<br />
EHS305<br />
o<br />
o<br />
o<br />
Pad-Collection Attacks<br />
XOR Encryption<br />
Stream Cipher<br />
• Rogue Access Points<br />
• Scanning Tools<br />
• Sniffing Tools<br />
• Wireless Security Tools<br />
Chapter 2: Physical Security<br />
• Introduction to Physical Security<br />
o<br />
o<br />
Physical Security<br />
Physical Security Challenges<br />
• Authentications and Access Controls<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Authentication Mechanisms<br />
Smart Cards<br />
Security Token<br />
Keys and Locks<br />
Biometric Identification Techniques<br />
Biometric <strong>Hacking</strong> Tool: Biologger<br />
Biometrics Authentication<br />
Types of Biometrics Authentication<br />
• Fingerprint-based Identification<br />
• Hand Geometry-based Identification<br />
• Retina Scanning<br />
• Afghan Woman Recognized After 17 Years<br />
• Face Recognition<br />
• Face Code: Webcam Based Biometrics Authentication System<br />
• TEMPEST<br />
• Mantrap<br />
• Attacks against Access Controls<br />
o<br />
o<br />
Authentication Mechanism Challenges: Biometrics<br />
Faking Fingerprints<br />
• Facility Management<br />
o<br />
o<br />
o<br />
Page 8 of 14<br />
Locks<br />
Lock Picking<br />
Lock Picking Tools<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
• Housekeeping<br />
EHS305<br />
o<br />
o<br />
o<br />
Housekeeping Procedures<br />
HVAC (Heating. Ventilating. and Air conditioning) Considerations<br />
Fire Prevention<br />
• Auditing Fire Prevention Preparedness<br />
• Fire Prevention Requirements<br />
• Safeguards<br />
• Physical Security Attacks<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Challenges in Ensuring Physical Security<br />
Spyware Technologies<br />
Spying Devices<br />
Wiretapping<br />
Remote Access<br />
Laptop Theft<br />
Laptop Security Tools<br />
Laptop Tracker - XTool Computer Tracker<br />
Tools to Locate Stolen Laptops<br />
Stop's Unique. Tamper-proof Patented Plate<br />
Tool: TrueCrypt<br />
Laptop Security <strong>Countermeasure</strong>s<br />
• Physical Security Checklist<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Company’s Surroundings<br />
Gates<br />
Security Guards<br />
Premises<br />
CCTV Cameras<br />
Reception<br />
Server<br />
Server Room<br />
Workstation Area<br />
Wireless Access Points<br />
Other Equipment<br />
FAX Security<br />
• Procedures Governing FAX Security: Sending<br />
• Procedures Governing FAX Security: Receiving<br />
• Procedures Governing FAX Security: Storing<br />
o<br />
Security Checklist<br />
Page 9 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
o Access Control<br />
EHS305<br />
o<br />
o<br />
Biometric Devices<br />
Computer Equipment Maintenance<br />
• Policies and Procedures<br />
o<br />
o<br />
o<br />
o<br />
Facility Management Procedures<br />
Physical Security Policies<br />
Environmental Policy<br />
Air Conditioning Policy<br />
Chapter 3: Evading IDS, Firewalls, and Honeypots<br />
• Introduction to Evading IDS, Firewalls, and Honeypots<br />
• Introduction to Intrusion Detection Systems<br />
• Intrusion Detection Systems (IDS)<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
IDS Placement<br />
Ways to Detect an Intrusion<br />
Types of Intrusion Detection Systems<br />
Network Intrusion Detection System (NIDS)<br />
NIDS Evasion Technique<br />
System Integrity Verifiers (SIV)<br />
Indications of Intrusion<br />
General Indications of System Intrusions<br />
General Indications of File System Intrusions<br />
General Indications of Network Intrusions<br />
Intrusion Detection Tools<br />
• Snort Console<br />
• Testing Snort<br />
• Configuring Snort (snort.conf)<br />
• Snort Rules<br />
• Set up Snort to Log to the Event Logs and to Run as a Service<br />
• Using EventTriggers.exe for Eventlog Notifications<br />
o<br />
o<br />
o<br />
Steps to Perform after an IDS Detects an Attack<br />
Evading IDS Systems<br />
Ways to Evade IDS<br />
• Intrusion Prevention Systems (IPS)<br />
• Firewall<br />
o<br />
o<br />
What is a Firewall<br />
What does a Firewall do<br />
Page 10 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
o Packet Filtering<br />
EHS305<br />
o<br />
o<br />
o<br />
o<br />
o<br />
What can't a Firewall do<br />
How does a Firewall Work<br />
Hardware Firewall<br />
Software Firewall<br />
Types of Firewalls<br />
• Packet Filtering Firewall<br />
• IP Packet Filtering Firewall<br />
• Circuit-Level Gateway<br />
• TCP Packet Filtering Firewall<br />
• Application-Level Firewall<br />
• Application Packet Filtering Firewall<br />
• Stateful Multilayer Inspection Firewall<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Firewall <strong>Countermeasure</strong>s<br />
Firewall Identification<br />
Firewalking<br />
Banner Grabbing<br />
Breaching Firewalls<br />
Bypassing a Firewall Using HTTP Tunnel<br />
Placing Backdoors through Firewalls<br />
Hiding behind a Covert Channel: LOKI<br />
• Honeypot<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
What is a Honeypot<br />
The Honeynet Project<br />
Types of Honeypots<br />
Advantages and Disadvantages of a Honeypot<br />
Where to Place a Honeypot<br />
Honeypots<br />
How to Set Up a Honey Pot<br />
Honeypot-SP<strong>EC</strong>TER<br />
Honeypot - honeyd<br />
Honeypot – KFSensor<br />
Sebek<br />
Google Hack Honeypot (GHH)<br />
Physical and Virtual Honeypots<br />
• Security Responses to <strong>Hacking</strong> Attacks<br />
• Tools<br />
Page 11 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
o Tripwire (www.tripwire.com)<br />
o Tool: NCovert<br />
o ACK Tunneling<br />
o Tools to Breach Firewalls<br />
o Common Tool for Testing Firewall and IDS<br />
• Tomahawk<br />
• RedSeal Network Advisor<br />
• IDS Testing Tool – Traffic IQ Gateway<br />
• IDS Tool: EMERALD<br />
• IDS Tool: BlackICE<br />
• BlackICE: Screenshot<br />
• IDS Tool: Next-Generation Intrusion Detection Expert System (NIDES)<br />
• IDS Tool: SecureHost<br />
• IDS Tool: Snare<br />
• IDS Testing Tool: Traffic IQ Professional<br />
• IDS Testing Tool: TCPOpera<br />
• Atelier Web Firewall Tester<br />
EHS305<br />
Chapter 4: Cryptography<br />
• Introduction to Cryptography<br />
o Cryptography: Introduction<br />
o Symmetric and Asymmetric Key Cryptosystems<br />
o Algorithms and Security<br />
o Types of Cryptography Algorithms<br />
o A Hybrid Cryptographic Scheme: Example<br />
• Private Key Cryptography<br />
o Data Encryption Standard (DES)<br />
o DES Challenge III. II. I<br />
o AES (RIJNDAEL)<br />
o AES (RIJNDAEL)<br />
o Related-key Cryptanalysis of the Full AES-192 and AES-256<br />
o RC4. RC5. RC6. Blowfish<br />
o RC5<br />
• Public-key Cryptography<br />
o The DSA and related signature schemes<br />
o RSA (Rivest Shamir Adleman)<br />
o Example of RSA Algorithm<br />
Page 12 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
o The RSA Signature Scheme<br />
EHS305<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Possible Attack on RSA Signatures: Integer Factorization<br />
RSA Attacks<br />
RSA Challenge<br />
Elliptic Curve Cryptography (<strong>EC</strong>C)<br />
<strong>EC</strong>C and RSA Key Comparison<br />
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS Systems<br />
• Digital Signature<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Digital Signature Algorithm Validation System (DSAVS)<br />
Digital Signature Assurance Methodology<br />
Digital Signature Assurance Reference Model<br />
Digital Signed Record<br />
Entrust: Securing Digital Identities and Information<br />
Attacks on Digital Signatures<br />
• Meet-in-the-Middle Attack<br />
• Rabin Public-key Signature Scheme<br />
• Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Message Digest Functions<br />
One-way Bash Functions<br />
MD5<br />
MD5: Timeline<br />
SHA (Secure Hash Algorithm)<br />
distributed.net<br />
Server-Gated Cryptography (SGC)<br />
• Encryption<br />
o<br />
o<br />
o<br />
o<br />
SSL (Secure Sockets Layer)<br />
Secure Shell (SSH)<br />
Disk Encryption<br />
Encryption-Breaking Initiatives<br />
• Cryptographic Attacks<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
Brute-Force Attack<br />
Code Breaking: Methodologies<br />
Cryptography Attacks<br />
The Full Cost of Cryptanalytic Attacks<br />
Types of Attacks on Signature Schemes<br />
Magic Lantern<br />
WEPCrack: Screenshot<br />
Page 13 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.
<strong>Ethical</strong> <strong>Hacking</strong> & <strong>Countermeasure</strong> <strong>Specialist</strong><br />
o Cracking S/MIME Encryption Using Idle CPU Time<br />
EHS305<br />
o<br />
Attacking and defending the McEliece cryptosystem<br />
• Cryptographic Tools<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
o<br />
PGP<br />
Cryptomathic Authenticator<br />
Cryptographic Algorithm Validation Program (CAVP)<br />
Cryptographic Module Testing<br />
Cleversafe Grid Builder<br />
PGP (Pretty Good Privacy)<br />
CypherCalc<br />
Command Line Scriptor<br />
o<br />
CryptoHeaven<br />
• Microsoft Cryptography Tools<br />
Page 14 of 14<br />
Secure Network Infrastructures Copyright © by <strong>EC</strong>-<strong>Council</strong><br />
All Rights Reserved. Reproduction is Strictly Prohibited.