Best Ethical Hacking course from NetTech India PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: Best Ethical Hacking course from NetTech India


1
Ethical Hacking
  • www.nettechindia.com
  • Mob 9870803004/5

2
Introduction
  • Ethical Hacking and Ethical Hacker are terms used
    to describe hacking performed by a company or
    individual to help identify potential threats on
    a computer or network.
  • The purpose of ethical hacking is to evaluate the
    security of and identify vulnerabilities in
    systems, networks or system infrastructure.
  • It includes finding and attempting to exploit any
    vulnerabilities to determine whether unauthorized
    access or other malicious activities are
    possible.

3
Ethical Hacker
  • An Ethical Hacker is a person who attempts to
    bypass system security and search for any weak
    points that could be exploited by malicious
    hackers.
  • An Ehical hacker is a person who hacks into a
    computer network in order to test or evaluate its
    security, rather than with malicious or criminal
    intent
  • There are 3 types of Ethical Hacker based on
    their intent of hacking a system.
  • 1)White hat hackers
  • 2)Black hat hackers
  • 3)Gray hat hackers

4
Types of Ethical Hacker
  • White Hat Hackers They try to find out
    weaknesses in a computer or a network system as a
    part of penetration testing and vulnerability
    assessments.
  • Black Hat Hackers are those who hack in order
    to gain unauthorized access to a system and harm
    its operations or steal sensitive information.
  • Gray Hat Hackers They are a blend of both black
    hat and white hat hackers. They act without
    malicious intent but for their fun, they exploit
    a security weakness in a computer system or
    network without the owners permission or
    knowledge.

5
Penetration Testing
  • Penetration Testing popularly called as a pen
    test.
  • This test safeguards the computer system from
    the unauthorized access.
  • The test is typically performed using manual or
    automated technologies
  • Once the vulnerabilities are identified on a
    particular system, the testers are used to find
    the loopholes and to launch subsequent exploits
    to achieve higher levels of security clearance.

6
Benefits of Penetration Testing
  • It helps to manage vulnerabilities easily.
  • It reduces the network downtime
  • Helps to adhere to the regulatory requirements
    and avoid penalties
  • Helps to build brand image and customer loyalty

7
Thank You NetTech India
  • www.nettechindia.com
  • Mob9870803004/9870803005
  • 203, Ratnamani Building, Dada
    Patil Wadi,
  • Thane, Maharashtra,400601.
Write a Comment
User Comments (0)
About PowerShow.com