Best Ethical Hacking course from NetTech India - PowerPoint PPT Presentation

About This Presentation
Title:

Best Ethical Hacking course from NetTech India

Description:

Nettech India located in Thane, Mumbai & Navi Mumbai focuses on the necessity of Certified Ethical Hackers in terms of Today's Internet and Network security point of view.NetTech India provide their students bright and lucrative career options in CEH(Certified Ethhical hacker) certification for Internet and security purposes.For more information please call us on 9870803004/5. – PowerPoint PPT presentation

Number of Views:95

less

Transcript and Presenter's Notes

Title: Best Ethical Hacking course from NetTech India


1
Ethical Hacking
  • www.nettechindia.com
  • Mob 9870803004/5

2
Introduction
  • Ethical Hacking and Ethical Hacker are terms used
    to describe hacking performed by a company or
    individual to help identify potential threats on
    a computer or network.
  • The purpose of ethical hacking is to evaluate the
    security of and identify vulnerabilities in
    systems, networks or system infrastructure.
  • It includes finding and attempting to exploit any
    vulnerabilities to determine whether unauthorized
    access or other malicious activities are
    possible.

3
Ethical Hacker
  • An Ethical Hacker is a person who attempts to
    bypass system security and search for any weak
    points that could be exploited by malicious
    hackers.
  • An Ehical hacker is a person who hacks into a
    computer network in order to test or evaluate its
    security, rather than with malicious or criminal
    intent
  • There are 3 types of Ethical Hacker based on
    their intent of hacking a system.
  • 1)White hat hackers
  • 2)Black hat hackers
  • 3)Gray hat hackers

4
Types of Ethical Hacker
  • White Hat Hackers They try to find out
    weaknesses in a computer or a network system as a
    part of penetration testing and vulnerability
    assessments.
  • Black Hat Hackers are those who hack in order
    to gain unauthorized access to a system and harm
    its operations or steal sensitive information.
  • Gray Hat Hackers They are a blend of both black
    hat and white hat hackers. They act without
    malicious intent but for their fun, they exploit
    a security weakness in a computer system or
    network without the owners permission or
    knowledge.

5
Penetration Testing
  • Penetration Testing popularly called as a pen
    test.
  • This test safeguards the computer system from
    the unauthorized access.
  • The test is typically performed using manual or
    automated technologies
  • Once the vulnerabilities are identified on a
    particular system, the testers are used to find
    the loopholes and to launch subsequent exploits
    to achieve higher levels of security clearance.

6
Benefits of Penetration Testing
  • It helps to manage vulnerabilities easily.
  • It reduces the network downtime
  • Helps to adhere to the regulatory requirements
    and avoid penalties
  • Helps to build brand image and customer loyalty

7
Thank You NetTech India
  • www.nettechindia.com
  • Mob9870803004/9870803005
  • 203, Ratnamani Building, Dada
    Patil Wadi,
  • Thane, Maharashtra,400601.
Write a Comment
User Comments (0)
About PowerShow.com