PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Send a file File manager PDF Toolbox Search Help Contact



Ethical Hacking .pdf



Original filename: Ethical Hacking.pdf
Title: PowerPoint Presentation
Author: sifs

This PDF 1.5 document has been generated by Microsoft® PowerPoint® 2013, and has been sent on pdf-archive.com on 19/06/2015 at 10:03, from IP address 182.68.x.x. The current document download page has been viewed 819 times.
File size: 1.7 MB (12 pages).
Privacy: public file




Download original PDF file









Document preview


Ethical
#Hacking

Ethical Hacking
!! Content !!
*
*
*
*
*
*
*
*

Overview of Ethical Hacking
Prospectus of Ethical Hacking
Evaluation of Ethical Hacking
Training of Ethical Hacking
Career in Ethical Hacking
Types of Hacker Motivations
Scope of Ethical Hacking
Thank You…
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking
!! OVERVIEW OF ETHICAL HACKING !!
Ethical Hacking, as name suggests, is an ethical way of working with technology to find out
weaknesses of a system, taking it to the next level for further development. Hacking is never illegal; it
is an action of using skills and advanced techniques on a target to gain information about a system
and its surroundings, though it depends on the nature of the person who is performing the action.
The main focus of the Ethical Hacking and IT Security course is to train the student into an
interactive environment where the student will learn the skills of performing vulnerability
assessment, pen-testing of systems and networks, patching the weaknesses, making reports of
scanned vulnerabilities.

© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking
!! PROSPECTUS !!
Module-1 : Introduction to Ethical Hacking
Module-2 : Foot Printing and Reconnaissance
Module-3 : Scanning Network
Module-4 : Enumeration
Module-5 : System Hacking
Module-6 : Trojans and Backdoors
Module-7 : Viruses and Worms
Module-8 : Sniffing
Module-9 : Session Hijacking
Module-10: Social Engineering
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking
!! PROSPECTUS !!
Module-11:
Module-12:
Module-13:
Module-14:
Module-15:
Module-16:
Module-17:
Module-18:
Module-19:
Module-20:

Denial of Service (DoS)
Hacking Webserver
SQL Injection
Hacking Wireless Networks
Evading IDS, Firewalls and Honeypot
Buffer Overflow
Cryptography
Penetration Testing
Mobile Hacking
Stenography
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking
!! EVALUATION OF ETHICAL HACKING !!
The evaluation process varies depending upon the course you enroll for, likewise: if you are enrolled
for Certification, you will be allotted an assignment during the mid-session of the course, which you
are deemed to complete within the month. Similar process is followed in Diploma. But in PG
Diploma, after the completion of the assignment during the mid-sessions; a Project-work is assigned
during the last quarter, which you have to complete in a month’s time.

© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking
!! TRAINING OF ETHICAL HACKING !!
Training Sutline :
This collaborative training session is designed for online and distance students. The training would
acquaint the students with practical of Ethical Hacking and IT Security, work on real cases and the
digital signature techniques required to be a comparison and examination of the signature and
handwriting and various case studies.
Module Structure:
Cyber being a very vast topic, therefore students will be given an exposure to the training sessions
under two sections. They would be taught theoretically along with interactive practical sessions on
the respective section, which would be as follows:
Module-1: Cyber Forensic Investigation
Module-2: Mobile Phone Investigation

© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking
!! Careers in Ethical Hacking !!
Career :
As Ethical Hacking has a wider scope, so it opens a lot of career opportunities. The designations that can be
achieved by the person involves:
* Network Security System Administrator/Manager
* Network Security Engineer
* Systems/Applications Security Executive
* Web Security Administrator/Manager
* Ethical Hacker
* Data Security Specialist
* Computer Forensics Investigator
* IT Security Administrator/Consultant/ Manager
* Security Certified Programmer
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

Ethical Hacking
!! TYPES OF HACKER MOTIVATIONS !!
White Hat Hackers:
These are the good guys, computer security experts who specialize in penetration testing and other
methodologies to ensure that a company’s information systems are secure. These IT security
professionals rely on a constantly evolving arsenal of technology to battle hackers.
Black Hat Hackers:
These are the bad guys, who are typically referred to as just plain hackers. The term is often used
specifically for hackers who break into networks or computers, or create computer viruses. Black hat
hackers continue to technologically outpace white hats. They often manage to find the path of least
resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists
often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get
paid.
Hacktivists:
Some hacker activists are motivated by politics or religion, while others may wish to expose
wrongdoing, or exact revenge, or simply harass their target for their own entertainment.
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved


Related documents


PDF Document ethical hacking
PDF Document cloudnet ethical hacker
PDF Document ethical hacker exam path
PDF Document ceh ppt
PDF Document cyber security
PDF Document first step to learn hacking compiled by qamar abbas


Related keywords