Download presentation
Presentation is loading. Please wait.
Published bycert store Modified over 7 years ago
2
CertStore Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner of EC- Council. I prefer to all join CertStore solution for best basic computer course & advance course & EC – Council. You are flexible to choose your preferred certification course from Certstore solution. Online- online class, via online chat sessions, video conference, Offline- you can choose faculty to visit your venue to take the session.
3
The first hacker was appeared on 1960’s at the Massachusetts instituted of technology (MIT). During the 1970’s a different kind of hacker appeared phone phreaker or phone hacker. In the 1980’s phreak started to migrate to computer and the first Bulletin Board System appeared. During the 1990’s when the use of internet wide spread around the world hacker multiplied.
4
Hack Examine Something Very minutely Hacker The person who hacks Cracker System intruder/ destroyer
5
Computer Hacking is a process that lets us modify any computer software or hardware. Hacking is important in Networking or computing You can access any network or computer. its help to You can secure your data with. Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for the testing purpose. This sort of hacking is what we call Ethical Hacking.
6
1. Black hat hacker 2. White hat hacker 3. Grey hat hacker
7
Black hat hacker Black hat hacker is a hacker who is used to break the rules of personal purpose example credit card number, computer network money break, Facebook, etc., it is called cracker.
8
White hat hacker the white hat hacker is count for good person; he is the hacker who has the ability to fix the computer's weakness. White hat hacker is opposite black hat hacker. It is the legal and it is called the ethical hacker.
9
Grey hat hacker it is white hat hacker and black hat hacker combination. This hacker breaks the system for any good work. But still, it is illegal. Because it breaks the system without owner permission.it is called the grey hat hacker.
10
1.Reconnaissance 2.Scanning 3.Gaining Access 4.Maintaining Access 5.Clerrining Tracks 6.Reposting
12
Footprinting Scanning Enumeration Who is ping, Traceroot,nslookup nmp,nessas Net cat,tcpdump,Telnet, firewalk
13
Duration: 15 Days Regular and Weekend batches available Training Method: Classroom Training | Virtual Training Number of Questions: 125 Test Duration: 4 Hours Test Format: Multiple Choices
14
Corporate Center: Office No.47, Ground Floor, Vijay Block, Lakshmi Nagar, New Delhi 110092 (India) Landmark: Near Nathu's Sweet Nearest Metro Station: Nirman ViharNirman Vihar Support: +91-954-094-HACK (4225) Telephone: 011-4301-9304 Mobile/WhatsApp: +91-954-094-HACK (4225)
15
Any question ? Please go on my website www.certstore.in
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.