12
Ethical #Hacking

Ethical Hacking & IT Security Courses in SIFS

Embed Size (px)

DESCRIPTION

The course Ethical Hacking & IT Security (FSP 201) includes all the details regarding the introduction of the ethical hacking, cyber security, cyber law, the vulnerabilities of the network security and the related factors. Course will introduce you to interactive training session and practicals on the scientific and technical methods involved in a sequential examination.

Citation preview

  • Ethical #Hacking

  • Ethical Hacking!! Content !!

    * Overview of Ethical Hacking

    * Prospectus of Ethical Hacking

    * Evaluation of Ethical Hacking

    * Training of Ethical Hacking

    * Career in Ethical Hacking

    * Types of Hacker Motivations

    * Scope of Ethical Hacking

    * Thank You Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

  • Ethical Hacking!! OVERVIEW OF ETHICAL HACKING !!

    Ethical Hacking, as name suggests, is an ethical way of working with technology to find out weaknesses of a system, taking it to the next level for further development. Hacking is never illegal; it is an action of using skills and advanced techniques on a target to gain information about a system and its surroundings, though it depends on the nature of the person who is performing the action. The main focus of the Ethical Hacking and IT Security course is to train the student into an interactive environment where the student will learn the skills of performing vulnerability assessment, pen-testing of systems and networks, patching the weaknesses, making reports of scanned vulnerabilities.

    Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

  • Ethical Hacking!! PROSPECTUS !!

    Module-1 : Introduction to Ethical Hacking

    Module-2 : Foot Printing and Reconnaissance

    Module-3 : Scanning Network

    Module-4 : Enumeration

    Module-5 : System Hacking

    Module-6 : Trojans and Backdoors

    Module-7 : Viruses and Worms

    Module-8 : Sniffing

    Module-9 : Session Hijacking

    Module-10: Social Engineering

    Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

  • Ethical Hacking!! PROSPECTUS !!

    Module-11: Denial of Service (DoS)

    Module-12: Hacking Webserver

    Module-13: SQL Injection

    Module-14: Hacking Wireless Networks

    Module-15: Evading IDS, Firewalls and Honeypot

    Module-16: Buffer Overflow

    Module-17: Cryptography

    Module-18: Penetration Testing

    Module-19: Mobile Hacking

    Module-20: Stenography

    Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

  • Ethical Hacking!! EVALUATION OF ETHICAL HACKING !!

    The evaluation process varies depending upon the course you enroll for, likewise: if you are enrolled for Certification, you will be allotted an assignment during the mid-session of the course, which you are deemed to complete within the month. Similar process is followed in Diploma. But in PG Diploma, after the completion of the assignment during the mid-sessions; a Project-work is assigned during the last quarter, which you have to complete in a months time.

    Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

  • Ethical Hacking!! TRAINING OF ETHICAL HACKING !!

    Training Sutline :

    This collaborative training session is designed for online and distance students. The training would acquaint the students with practical of Ethical Hacking and IT Security, work on real cases and the digital signature techniques required to be a comparison and examination of the signature and handwriting and various case studies.

    Module Structure:

    Cyber being a very vast topic, therefore students will be given an exposure to the training sessions under two sections. They would be taught theoretically along with interactive practical sessions on the respective section, which would be as follows:

    Module-1: Cyber Forensic Investigation

    Module-2: Mobile Phone Investigation

    Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

  • Ethical Hacking!! Careers in Ethical Hacking !!

    Career :As Ethical Hacking has a wider scope, so it opens a lot of career opportunities. The designations that can be achieved by the person involves:

    * Network Security System Administrator/Manager

    * Network Security Engineer

    * Systems/Applications Security Executive

    * Web Security Administrator/Manager

    * Ethical Hacker

    * Data Security Specialist

    * Computer Forensics Investigator

    * IT Security Administrator/Consultant/ Manager

    * Security Certified Programmer

    Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

  • Ethical Hacking!! TYPES OF HACKER MOTIVATIONS !!

    White Hat Hackers:

    These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a companys information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers.

    Black Hat Hackers:

    These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses. Black hat hackers continue to technologically outpace white hats. They often manage to find the path of least resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists often use the term crackers to refer to black hat hackers. Black hats motivation is generally to get paid.

    Hacktivists:

    Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment.

    Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

  • Ethical Hacking!! TYPES OF HACKER MOTIVATIONS !!

    Script Kiddies:

    This is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves.

    State Sponsored Hackers:

    Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, He who controls the seas controls the world, and then it was, He who controls the air controls the world. Now its all about controlling cyberspace. State sponsored hackers have limitless time and funding to target civilians, corporations, and governments.

    Spy Hackers:

    Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their clients goals and get paid.

    Cyber Terrorists:

    These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures. Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder.

  • Ethical Hacking!! FUTURE SCOPE IN ETHICAL HACKING !!

    There are many surveys conducted in order to find out the scope of Ethical Hacking course in India. From this, following results are determined.

    Reputed companies like Wipro, Infosys, IBM, Airtel and Reliance are always in look for good Ethical Hackers. There is an estimate need of 60,000 Ethical Hackers. Within a few minutes, a single computer intrusion can cause losses amounting to millions of dollars, thus need of ethical hacker is must to control cyber terrorism.

  • Thank YouADDRESS:

    2443, Hudson Lines, !! Follow Us On !!Kingsway Camp,Delhi-110009, India

    CALL US:

    +91 11 47074263+91 9953546546+91 9818877002

    E-MAIL US:

    Email: [email protected]: [email protected]: www.sifs.in

    Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved