Cyber-Security Webinar Presentation | CEH: Understanding Ethical Hacking - PowerPoint PPT Presentation

View by Category
About This Presentation
Title:

Cyber-Security Webinar Presentation | CEH: Understanding Ethical Hacking

Description:

Summary This webinar will be an interactive session that gets you familiar with the motivation behind hacking and security attacks and empowers you with know-how of the security infrastructure protection practices from internal and external attackers. The session will focus to provide an outlook to understand the difference between "hacking" and "ethical hacking", hacking phases, types of attacks, and skills essentially required to become an Ethical Hacker. Click to watch the Recorded Session here: Upcoming Webinars: – PowerPoint PPT presentation

Number of Views:30

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Cyber-Security Webinar Presentation | CEH: Understanding Ethical Hacking


1
CEH Understanding Ethical Hacking
Tom Updegrove NetCom Learning
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
2
Agenda
  • What is Hacking?
  • Who is a Hacker?
  • What is Ethical Hacking?
  • Why Ethical Hacking is Necessary?
  • Why should I care?
  • The Phases of Ethical Hacking
  • Network vs Web Browser Attacks
  • Who is Responsible for my Data in the Cloud
  • Vulnerability Assessments Penetration Testing
  • What is in the Course

www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
3
Think Like a Hacker
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
4
What is Hacking?
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
5
Who is a Hacker?
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
6
What is Ethical Hacking?
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
7
Why Ethical Hacking is Necessary?
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
8
Why Ethical Hacking is Necessary?
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
9
Why Should I Care
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
10
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
11
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
12
The Phases of Ethical Hacking
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
13
Reconnaissance
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
14
Scanning
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
15
Gaining Access
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
16
Maintaining Access
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
17
Clearing Tracks
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
18
Network vs Web Browser Attacks
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
19
Objectives of Footprinting
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
20
Overview of Network Scanning
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
21
Introduction to Malware
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
22
Impact of Webserver Attacks
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
23
Web Application Attacks
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
24
Who is Responsible for my Data in the Cloud
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
25
NIST Cloud Computing Reference Architecture
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
26
Cloud Computing Attacks
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
27
Cloud Computing Threats
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
28
Cloud Computing Threats
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
29
Vulnerability Assessments Penetration Testing
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
30
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
31
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
32
Elements of Information Security
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
33
Information Security Threat Categories
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
34
What is Vulnerability Assessment?
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
35
Penetration Testing
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
36
Security Audit vs Vulnerability Assessment vs
Penetration Testing
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
37
What is in the Course
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
38
Outline
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
39
New Features
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
40
CEH v10 iLabs
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
41
Practical
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
42
Practical
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
43
Recorded Webinar Video
To watch the recorded webinar video for live
demos, please access the link https//goo.gl/E4zi
Q3
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
44
About NetCom Learning
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
45
Recommended Courses Marketing Assets
Courses EC-Council CEH Certified Ethical
Hacker v10 CNDA Certified Network Defense
Architect - Class scheduled on Jan 14
EC-Council Certified Network Defender (CND) -
Class scheduled on Jan 14 EC-Council Computer
Hacking Forensic Investigator (CHFI) - Class
scheduled on Jan 07 Certified Information
Systems Security Professional (CISSP)
Certification - Class scheduled on Jan 07
CompTIA PenTest Certification Marketing
Assets Free On-Demand Training - The Five
Phases of Ethical Hacking Whitepaper -
Addressing the Cybersecurity Skills Shortage
Blog - The Importance of CHFI-Certified
Professionals in an IT Organization
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
46
SQL Server 2017 Application Development Best
Practices Malware Affecting IoT Smart Devices
Detection, Prevention, and Removal Delivering
Real-time Data with Azure and Power BI
Connecting Microsoft Azure Virtual Networks ITIL
4 Foundation Core Concepts and New Version
Updates Autodesk Revit File Management
Techniques for BIM Managers
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
47
Promotions
The year 2018 is coming to an end, though
learning is a continuous process! Build yours,
or teams, or departments skills with the best
training courses of 2018-19. With a range of
Cloud, Security, Networking, Data AI, Design
Multimedia, Business Application, Application
Development and Business Process training at
limited-time prices, you can imbibe in-demand
skills while making a huge saving on the training
cost. Learn More
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
48
Follow Us On
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
49
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
50
THANK YOU !!!
www.netcomlearning.com info_at_netcomlearning.com
(888) 563 8266
About PowerShow.com