EC-Council provides a wide range of certification training, including a course to become a "Certified Incident Handler". The 11 module course is taught over 2 days by one of several instructors. The material used to teach the class, and presumably handed out to the class, is branded "EC-Council". Every slide contains a footer saying "Copyright (C) by EC-Council" and "All Rights Reserved. Reproduction is Strictly Prohibited".
While some material in the slide is taken from external sources and properly credited, a significant amount of material is not cited at all. In some cases, an image may be used from a source with credit, but the ten subsequent slides from the same source are not credited. Given that text is often used in full, and in other cases slightly altered, both without citation, that consitutes plagiarism. The following tables detail portions of the presentation material that were taken from other sources, making up 32.2% of the material. Information is included to distinguish not only plagiarized material, but if the text was altered in some fashion. Due to time constraints, only four of the 11 modules were spot checked. Significant plagiarism was detected in two of the modules, and a few instances in the other two. As a result, only two modules are included below.
Slide # | Original Source |
Slide 10 | Text paraphrased from NIST SP 800-30, page 10 |
Slide 11 | "System Characterization Template" taken from State of California Office of HIPAA Implementation, CalOHI Policy Memorandum 2005-56, Exhibit 4 |
Slide 12 | Text paraphrased from NIST SP 800-30, page 12. Flow chart segment from page 9. |
Slide 15 | Text paraphrased from NIST SP 800-30, page 15. Flow chart segment from page 9. |
Slide 16 | "Vulnerability Report Template" widely available on Internet, as early as 2007. |
Slide 17 | Text paraphrased from NIST SP 800-30, page 19. Flow chart segment from page 9. |
Slide 18 | Text and table from NIST SP 800-30, page 21. Flow chart segment from page 9. |
Slide 19 | Text paraphrased from NIST SP 800-30, page 21. Flow chart segment from page 9. |
Slide 20 | Text paraphrased from NIST SP 800-30, page 24. Flow chart segment from page 9. |
Slide 21 | Text paraphrased from NIST SP 800-30, page 26. Flow chart segment from page 9. |
Slide 23 | Report taken from Information Technology Risk Management Guideline, Virginia Information Technologies Agency (VITA), Appendix E - Risk Assessment Template |
Slide 36/37 | Text paraphrased from NIST SP 800-30, page 27. |
Slide 38 | Flow chart from NIST SP 800-30, page 28, with credit to source |
Slide 40 | Text paraphrased from NIST SP 800-30, page 29/30, NIST mentioned in slide title only |
Slide 41 | Text paraphrased from NIST SP 800-30, page 40. |
Slide 42 | Chart from NIST SP 800-30, with credit to source |
Slide 44 | Text from cramm.com. Site mentioned in slide title only |
Slide 45 | Text from cramm.com/overview/howitworks.htm |
Slide 46 | Image from dsec.ru/about/articles/ar_compare/ |
Slide 47 | Text from rm-inv.enisa.europa.eu/methods_tools/t_stream.html |
Slide 49 | Image from acuityrm.com according to tineye.com |
Slide 50 | Text from callio.com/secura.php, callio.com mentioned in title slide |
Slide 51/52 | Images from callio.com/PPT/secura_EN.ppt |
Module 3 was only reviewed up to slide 35.
Modules 10 and 11 both contain a couple slides each with plagiarized content. A more thorough review was not performed, so details are being ommitted from this page.