Suche senden
Hochladen
What is ethical hacking
•
Als PPTX, PDF herunterladen
•
1 gefällt mir
•
442 views
Technopundits Business Solutions
Folgen
Bildung
Melden
Teilen
Melden
Teilen
1 von 20
Jetzt herunterladen
Empfohlen
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Persentation
Persentation
Mehar Tayyab
ethical hacking
ethical hacking
samprada123
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
Stephen Cobb
Building a cybercrime case
Building a cybercrime case
Online
Cyber Security Awareness
Cyber Security Awareness
M.Syarifudin, ST, OSCP, OSWP
Ethical Hacking
Ethical Hacking
Pushkar Pashupat
Cyber security
Cyber security
Samidha Gandhi
Empfohlen
Introduction To Ethical Hacking
Introduction To Ethical Hacking
Akshay Kale
Persentation
Persentation
Mehar Tayyab
ethical hacking
ethical hacking
samprada123
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
Stephen Cobb
Building a cybercrime case
Building a cybercrime case
Online
Cyber Security Awareness
Cyber Security Awareness
M.Syarifudin, ST, OSCP, OSWP
Ethical Hacking
Ethical Hacking
Pushkar Pashupat
Cyber security
Cyber security
Samidha Gandhi
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
IBM Security
hacking presentation slide
hacking presentation slide
Tauhidul islam
Hacking presentation
Hacking presentation
dineshgarhwal77
Ethical hacking
Ethical hacking
Goutham Shetty
IoT & Robotics Overview
IoT & Robotics Overview
Karthik Sarma
Computerworld Conference (2002)
Computerworld Conference (2002)
Skeeve Stevens
Computer crime hacking
Computer crime hacking
tangytangling
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
Hackers
Hackers
guesta04f59b
Computer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
Cyber security basics
Cyber security basics
Rohit Srivastava
Ethical Hacking
Ethical Hacking
Binit Kumar
Threats & Cyber Protection Measures
Threats & Cyber Protection Measures
Shiva Bissessar
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
Challenges in implementating cyber security
Challenges in implementating cyber security
Inderjeet Singh
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
Cyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
Deepak Kumar (D3)
Hacking and its terms
Hacking and its terms
kunalverma12345
Hacking presentation
Hacking presentation
Ajith Reddy
A Look Into Cyber Security
A Look Into Cyber Security
GTreasury
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
Team Sistemi
E security and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
Weitere ähnliche Inhalte
Was ist angesagt?
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
IBM Security
hacking presentation slide
hacking presentation slide
Tauhidul islam
Hacking presentation
Hacking presentation
dineshgarhwal77
Ethical hacking
Ethical hacking
Goutham Shetty
IoT & Robotics Overview
IoT & Robotics Overview
Karthik Sarma
Computerworld Conference (2002)
Computerworld Conference (2002)
Skeeve Stevens
Computer crime hacking
Computer crime hacking
tangytangling
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
Hackers
Hackers
guesta04f59b
Computer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon
Cyber security basics
Cyber security basics
Rohit Srivastava
Ethical Hacking
Ethical Hacking
Binit Kumar
Threats & Cyber Protection Measures
Threats & Cyber Protection Measures
Shiva Bissessar
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
Challenges in implementating cyber security
Challenges in implementating cyber security
Inderjeet Singh
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
Cyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
Deepak Kumar (D3)
Hacking and its terms
Hacking and its terms
kunalverma12345
Hacking presentation
Hacking presentation
Ajith Reddy
A Look Into Cyber Security
A Look Into Cyber Security
GTreasury
Was ist angesagt?
(20)
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
hacking presentation slide
hacking presentation slide
Hacking presentation
Hacking presentation
Ethical hacking
Ethical hacking
IoT & Robotics Overview
IoT & Robotics Overview
Computerworld Conference (2002)
Computerworld Conference (2002)
Computer crime hacking
Computer crime hacking
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Hackers
Hackers
Computer Hacking - An Introduction
Computer Hacking - An Introduction
Cyber security basics
Cyber security basics
Ethical Hacking
Ethical Hacking
Threats & Cyber Protection Measures
Threats & Cyber Protection Measures
Basic of Ethical Hacking and Penetration Testing - 1st Module
Basic of Ethical Hacking and Penetration Testing - 1st Module
Challenges in implementating cyber security
Challenges in implementating cyber security
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Cyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
Hacking and its terms
Hacking and its terms
Hacking presentation
Hacking presentation
A Look Into Cyber Security
A Look Into Cyber Security
Ähnlich wie What is ethical hacking
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
Team Sistemi
E security and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
Staying Safe and Secure Online
Staying Safe and Secure Online
evolutionaryit
Secure Coding 2013
Secure Coding 2013
The eCore Group
CYBER51-FYLER
CYBER51-FYLER
Cyber 51 LLC
Ethical hacking
Ethical hacking
hcls
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptx
Master Infotech
Trending it security threats in the public sector
Trending it security threats in the public sector
Core Security
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
12990739.ppt
12990739.ppt
MuhammadShahidulIsla8
Iot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
Cyber security with ai
Cyber security with ai
Burhan Ahmed
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Infosectrain3
The Secret Of Hacking Trial Pages
The Secret Of Hacking Trial Pages
leoimpact
It security &_ethical_hacking
It security &_ethical_hacking
satish kumar
Phish training final
Phish training final
Jen Ruhman
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Mark Henshaw
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
umair jawaid
Ähnlich wie What is ethical hacking
(20)
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
E security and payment 2013-1
E security and payment 2013-1
Staying Safe and Secure Online
Staying Safe and Secure Online
Secure Coding 2013
Secure Coding 2013
CYBER51-FYLER
CYBER51-FYLER
Ethical hacking
Ethical hacking
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptx
Trending it security threats in the public sector
Trending it security threats in the public sector
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
12990739.ppt
12990739.ppt
Iot Security, Internet of Things
Iot Security, Internet of Things
Cyber security with ai
Cyber security with ai
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
The Secret Of Hacking Trial Pages
The Secret Of Hacking Trial Pages
It security &_ethical_hacking
It security &_ethical_hacking
Phish training final
Phish training final
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
2014 09-waysofthesoftwarepeople-ctia-20minutesv3-140910235341-phpapp02
Kürzlich hochgeladen
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
MaryamAhmad92
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
dhanalakshmis0310
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
Spatium Project Simulation student brief
Spatium Project Simulation student brief
Association for Project Management
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
AreebaZafar22
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
Poonam Aher Patil
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
David Douglas School District
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
Celine George
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
Association for Project Management
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
callscotland1987
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
Celine George
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
christianmathematics
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
Nguyen Thanh Tu Collection
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Admir Softic
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
VishalSingh1417
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
jbellavia9
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
Kürzlich hochgeladen
(20)
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Spatium Project Simulation student brief
Spatium Project Simulation student brief
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
What is ethical hacking
1.
2.
How secure are
you……? www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
3.
Agenda • What is
Information Security and Ethical Hacking • Career options in Information Security and Ethical Hacking www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
4.
Did you know
In 1980 a computer cracked a 3-character password within one minute. In 1999 a team of computers cracked a 56- character password within one day. In 2004 a computer virus infected 1 million computers within one hour. www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
5.
What is Ethical
Hacking Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats. www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
6.
Types of Hackers •
Black Hat Hackers • Gray Hat Hackers • White Hat Hackers www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
7.
Types of Hacking •
Website Hacking • Email Hacking • Network Hacking • Password Hacking • Online banking Hacking • Computer Hacking www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
8.
Malwares •
Virus and Worms • Logic Bombs • Spywares • Trojan Horse • Bots www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
9.
Protect yourself from
Malwares • Antivirus software and keep it upto date • Email attachment should be scanned • Download files should be scanned • External drives should be scanned • Security patches should be applied • Symptoms of virus infection must not be overlooked www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
10.
Hacking Attacks • Social
Engineering Attack – Impersonation – Shoulder surfing – Popup windows • Phishing – Fake pages – Email Scams • DOS Attack (Denial of Service) www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
11.
Fake GMAIL Page www.technopundits.in
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
12.
Phishing Email -
Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
13.
Phishing Email -
Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
14.
Phishing Email -
Example www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
15.
Nigerian Phishing Email
Scam www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
16.
Offer Letter Fraud www.technopundits.in
Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
17.
A World of
Opportunities The Asia-Pacific region is anticipated to account for the majority of Information security solutions market by 2012. In this world of Opportunities you will see almost every sector emphasizing on information Security. Banking Sector Aviation Industry Corporate Sector Educational Institutions Government Sector Cyber Crime Investigation cells Global Security agencies Information system Security association National Information Security Testing, Evaluation and certification centres www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
18.
Career options that
you have Cyber Security Professional Information Security Professional IS Executive Information System Auditor Security Advisors Software Developers IT Specialists IT System Executives IT Consultants Junior Programmer Assistant Software Engineer R&D Executive Security Consultant System Engineer Network Engineer … and many more www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
19.
What do we
do? • Education • Online Reputation Management • Fraud Investigations • Reference checks • Antivirus solutions • Network Penetration Testing www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
20.
Accelerating your career
growth Building your future contact@technopundits.in 9962006587 www.technopundits.in Copyright © 2011 Technopundits Business Solutions LLP. All Rights Reserved.
Jetzt herunterladen