Presentation is loading. Please wait.

Presentation is loading. Please wait.

CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.

Similar presentations


Presentation on theme: "CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner."— Presentation transcript:

1

2 CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner of EC- Council. I prefer to all join CertStore solution for best basic computer course & advance course & EC – Council. You are flexible to choose your preferred certification course from Certstore solution.  Online- online class, via online chat sessions, video conference,  Offline- you can choose faculty to visit your venue to take the session.

3 The first hacker was appeared on 1960’s at the Massachusetts instituted of technology (MIT). During the 1970’s a different kind of hacker appeared phone phreaker or phone hacker. In the 1980’s phreak started to migrate to computer and the first Bulletin Board System appeared. During the 1990’s when the use of internet wide spread around the world hacker multiplied.

4 Hack Examine Something Very minutely Hacker The person who hacks Cracker System intruder/ destroyer

5 Computer Hacking is a process that lets us modify any computer software or hardware. Hacking is important in Networking or computing You can access any network or computer. its help to You can secure your data with. Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for the testing purpose. This sort of hacking is what we call Ethical Hacking.

6 1. Black hat hacker 2. White hat hacker 3. Grey hat hacker

7 Black hat hacker Black hat hacker is a hacker who is used to break the rules of personal purpose example credit card number, computer network money break, Facebook, etc., it is called cracker.

8 White hat hacker the white hat hacker is count for good person; he is the hacker who has the ability to fix the computer's weakness. White hat hacker is opposite black hat hacker. It is the legal and it is called the ethical hacker.

9 Grey hat hacker it is white hat hacker and black hat hacker combination. This hacker breaks the system for any good work. But still, it is illegal. Because it breaks the system without owner permission.it is called the grey hat hacker.

10 1.Reconnaissance 2.Scanning 3.Gaining Access 4.Maintaining Access 5.Clerrining Tracks 6.Reposting

11

12 Footprinting Scanning Enumeration Who is ping, Traceroot,nslookup nmp,nessas Net cat,tcpdump,Telnet, firewalk

13  Duration: 15 Days Regular and Weekend batches available  Training Method: Classroom Training | Virtual Training  Number of Questions: 125  Test Duration: 4 Hours  Test Format: Multiple Choices

14 Corporate Center: Office No.47, Ground Floor, Vijay Block, Lakshmi Nagar, New Delhi 110092 (India) Landmark: Near Nathu's Sweet Nearest Metro Station: Nirman ViharNirman Vihar Support: +91-954-094-HACK (4225) Telephone: 011-4301-9304 Mobile/WhatsApp: +91-954-094-HACK (4225)

15 Any question ? Please go on my website www.certstore.in


Download ppt "CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner."

Similar presentations


Ads by Google