Ethical #Hacking. Ethical Hacking !! Content !! * Overview of Ethical Hacking * Prospectus of Ethical Hacking * Evaluation of Ethical Hacking * Training.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Cyber Crime and Technology
Ethical Hacking Introduction. EC-Council Introductions Name Company Affiliation Title / Function Job Responsibility System security related experience.
UNIT 20 The ex-hacker.
ETHICAL HACKING.
Chapter 1  Introduction 1 Chapter 1: Introduction.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Security and Penetration Testing
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Welcome to EECS 354 Network Penetration and Security.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
CYBER CRIME AND SECURITY TRENDS
Computer Hacking Cybercrime (1).
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Computer Crime and Information Technology Security
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
G53SEC Computer Security Introduction to G53SEC 1.
Pen testing to ensure your security
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Unit 9.  Lets finish strong in Unit 9 discussions  Alternative seminars  Final submission of work – Tuesday, October 9 th at midnight.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 3 Network Security Threats Chapter 4.
MIS323 – Business Telecommunications Chapter 10 Security.
Cyber Services Plc BRIEF SUMMARY  Founded in 2015  Founders and members are security veterans with proven international reputation  Resources.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
FORENSIC ENTOMOLOGY Forensic entomology is the application and study of insect and other arthropod biology to criminal matters. It also involves the application.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Seminar On Ethical Hacking Submitted To: Submitted By:
Cyber Security Zafar Sadik
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Cyber Defence Intelligence
Associate Degree in Cyber security
Answer the questions to reveal the blocks and guess the picture.
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
Securing Information Systems
John Butters Running Tiger Teams
Network Intrusion Responder Program
Penetration Testing Computer Science and Software Engineering
National Cyber Security
Introduction to Cybercrime and Security
ECCouncil v10 Certified Ethical Hacker Exam (CEH V10) Get certified in one attempt!
Presentation transcript:

Ethical #Hacking

Ethical Hacking !! Content !! * Overview of Ethical Hacking * Prospectus of Ethical Hacking * Evaluation of Ethical Hacking * Training of Ethical Hacking * Career in Ethical Hacking * Types of Hacker Motivations * Scope of Ethical Hacking * Thank You… © Copyright SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking !! OVERVIEW OF ETHICAL HACKING !! Ethical Hacking, as name suggests, is an ethical way of working with technology to find out weaknesses of a system, taking it to the next level for further development. Hacking is never illegal; it is an action of using skills and advanced techniques on a target to gain information about a system and its surroundings, though it depends on the nature of the person who is performing the action. The main focus of the Ethical Hacking and IT Security course is to train the student into an interactive environment where the student will learn the skills of performing vulnerability assessment, pen-testing of systems and networks, patching the weaknesses, making reports of scanned vulnerabilities. © Copyright SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking !! PROSPECTUS !! Module-1 : Introduction to Ethical Hacking Module-2 : Foot Printing and Reconnaissance Module-3 : Scanning Network Module-4 : Enumeration Module-5 : System Hacking Module-6 : Trojans and Backdoors Module-7 : Viruses and Worms Module-8 : Sniffing Module-9 : Session Hijacking Module-10: Social Engineering © Copyright SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking !! PROSPECTUS !! Module-11: Denial of Service (DoS) Module-12: Hacking Webserver Module-13: SQL Injection Module-14: Hacking Wireless Networks Module-15: Evading IDS, Firewalls and Honeypot Module-16: Buffer Overflow Module-17: Cryptography Module-18: Penetration Testing Module-19: Mobile Hacking Module-20: Stenography © Copyright SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking !! EVALUATION OF ETHICAL HACKING !! The evaluation process varies depending upon the course you enroll for, likewise: if you are enrolled for Certification, you will be allotted an assignment during the mid-session of the course, which you are deemed to complete within the month. Similar process is followed in Diploma. But in PG Diploma, after the completion of the assignment during the mid-sessions; a Project-work is assigned during the last quarter, which you have to complete in a month’s time. © Copyright SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking !! TRAINING OF ETHICAL HACKING !! Training Sutline : This collaborative training session is designed for online and distance students. The training would acquaint the students with practical of Ethical Hacking and IT Security, work on real cases and the digital signature techniques required to be a comparison and examination of the signature and handwriting and various case studies. Module Structure: Cyber being a very vast topic, therefore students will be given an exposure to the training sessions under two sections. They would be taught theoretically along with interactive practical sessions on the respective section, which would be as follows: Module-1: Cyber Forensic Investigation Module-2: Mobile Phone Investigation © Copyright SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking !! Careers in Ethical Hacking !! Career : As Ethical Hacking has a wider scope, so it opens a lot of career opportunities. The designations that can be achieved by the person involves: * Network Security System Administrator/Manager * Network Security Engineer * Systems/Applications Security Executive * Web Security Administrator/Manager * Ethical Hacker * Data Security Specialist * Computer Forensics Investigator * IT Security Administrator/Consultant/ Manager * Security Certified Programmer © Copyright SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking !! TYPES OF HACKER MOTIVATIONS !! White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers. Black Hat Hackers: These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses. Black hat hackers continue to technologically outpace white hats. They often manage to find the path of least resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get paid. Hacktivists: Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment. © Copyright SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking !! TYPES OF HACKER MOTIVATIONS !! Script Kiddies: This is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves. State Sponsored Hackers: Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace. State sponsored hackers have limitless time and funding to target civilians, corporations, and governments. Spy Hackers: Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid. Cyber Terrorists: These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures. Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder.

Ethical Hacking !! FUTURE SCOPE IN ETHICAL HACKING !! There are many surveys conducted in order to find out the scope of Ethical Hacking course in India. From this, following results are determined. Reputed companies like Wipro, Infosys, IBM, Airtel and Reliance are always in look for good Ethical Hackers. There is an estimate need of 60,000 Ethical Hackers. Within a few minutes, a single computer intrusion can cause losses amounting to millions of dollars, thus need of ethical hacker is must to control cyber terrorism.

Thank You… ADDRESS: 2443, Hudson Lines, !! Follow Us On !! Kingsway Camp, Delhi , India CALL US: US: Support: Web: © Copyright SIFS India Pvt. Ltd. All Rights Reserved