CEH Training - PowerPoint PPT Presentation

About This Presentation
Title:

CEH Training

Description:

To beat a hacker, you need to think like one. It is the pinnacle of the most desired information security Training program any information security professional will ever want to be in. – PowerPoint PPT presentation

Number of Views:53
Slides: 10
Provided by: ssuryajo
Category: Other

less

Transcript and Presenter's Notes

Title: CEH Training


1
ETHICAL HACKING
2
WHAT IS ETHICAL HACKING??
  • Hacking is the act of finding the conceivable
    opening focuses that exist in a PC framework or a
    PC organize lastly going into them.
  • Hacking is generally legitimate as long as it is
    being done to discover weakness in a PC or system
    framework for testing reason. This kind of
    hacking is called as Ethical Hacking.
  • Hackers are the individuals who look for
    information, to see how frameworks work, how they
    are composed, and after that endeavor to play
    with these frameworks.

3
TYPES OF HACKING
  • Website Hacking
  • Network Hacking
  • Email Hacking
  • Ethical Hacking 
  • Password Hacking
  • Computer Hacking

4
BASIC SKILLS TO BE A HACKER
  • A moral programmer must be a PC frameworks master
    and needs extremely solid programming and PC
    organizing abilities.
  • A Ethical Hacker needs a great deal of tolerance,
    tirelessness, and diligence to attempt over and
    over and sit tight for the required outcome.

5
ADVANTAGES
  • To recover lost data, particularly on the off
    chance that you lost your secret word.
  • To perform infiltration testing to fortify PC and
    system security.
  • To set up sufficient deterrent measures to avoid
    security breaks.
  • To have a PC framework that keeps vindictive
    programmers from getting entrance.

6
DISADVANTAGES
  • Unapproved framework access on private data.
  • Protection infringement.
  • Hampering framework operation.
  • Disavowal of administration assaults.
  • Malevolent assault on the framework.

7
  • Foot printing
  • Foot printing is a piece of surveillance process
    which is utilized for social occasion conceivable
    data about an objective PC framework or system.

8
CERTIFICATIONS SALARY PACKAGES
  • Pay rates for Certified Ethical Hackers and other
    EC-Council guaranteed experts
  • ENSA Network Security Administrator 85,000
  • CEH Certified Ethical Hacker 89,000
  • ECSA Certified Security Analyst 90,000
  • LPT Licensed Penetration Tester 92,000
  • CHFI Computer Hacking Forensic Investigator
    96,000

9
  • THANK YOU!!!
Write a Comment
User Comments (0)
About PowerShow.com