2
CERTIFIED ETHICAL HACKER WHAT IS ETHICAL HACKING ETHICAL HACKING LANDSCAPE JOBS IN THE SEGMENT ...And many more Hacking is trying to gain unauthorized entry into any network or system with the intention of stealing information or making money. When this entry in any system or network is authorized based on permissions taken from requisite authorities then it is called as Ethical Hacking and such people who hack into the system with permissions without any malicious intent are called as Ethical Hackers. As per the report by security solutions provider Symantec, India continues to be second most impacted by spam and bots, third most impacted by network attacks, and fourth most impacted by ransomware. The report also pointed out that with the threat landscape becoming more diverse, attackers are working harder to discover new avenues of attack and cover their tracks while doing so. Security Consultant Security Architect Security Administrator Security Analyst

CERTIFIED ETHICAL HACKER

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CERTIFIED ETHICAL HACKER

C E RT I F I E DE T H I C A L H AC K E R

WHAT ISETHICAL HACKING

ETHICAL HACKINGLANDSCAPE

C E RT I F I E DC E RT I F I E DE T H I C A L H AC K E RE T H I C A L H AC K E R

JOBS IN THE SEGMENT

...And many more

Hacking is trying to gain unauthorized entry into any

network or system with the intention of stealing

information or making money. When this entry in

any system or network is authorized based on

permissions taken from requisite authorities then it

is called as Ethical Hacking and such people who

hack into the system with permissions without any

malicious intent are called as Ethical Hackers.

As per the report by security solutions provider

Symantec, India continues to be second most

impacted by spam and bots, third most impacted

by network attacks, and fourth most impacted by

ransomware. The report also pointed out that with

the threat landscape becoming more diverse,

attackers are working harder to discover new

avenues of attack and cover their tracks while

doing so.

SecurityConsultant

SecurityArchitect

SecurityAdministrator

SecurityAnalyst

Page 2: CERTIFIED ETHICAL HACKER

Ethical Hacking• Introduction to Ethical Hacking

• Information gathering using

Footprinting and Reconnaissance

• Network Scanning techniques

• Enumeration and countermeasures

• Vulnerability Assessment

• Hacking Systems

• Malware Threats

• Packet sniffing techniques

• Social Engineering and countermeasures

• Denial of Services and Buffer Overflows

ETHICAL HACKING

WINDOWS 10 (MD-100)

C E R T I F I E D E T H I C A L H A C K E R

• Session hijacking techniques and countermeasures

• Web server Hacking and countermeasures

• Web applications Hacking and countermeasures

• SQL injection attacks and detection

• Wireless Hacking and Security

• Mobile Hacking

• Evading IDS, firewall and honeypots and

countermeasures

• Hacking IoT devices

• Cloud computing threats and security techniques

• Cryptography

• Basics of penetration testing

• Project

Jetking Certified Ethical HackingExam & Certificate

ETHICAL HACKING

Disclaimer and Terms & Conditions:

• The course content may change without any prior information.

• Syllabus is only mapped to Global Certifications. Student shall receive a Jetking certification on completion of course.

• Global Certification & exam Voucher is not included in the course.

$ $$

$ $$