1 / 30

CEH Training and Certification Course

We are going to start training and Certification course on Certified Ethical Hacker in which we cover all the related topics with complete theory and practical approach. We have also special Doubt clearing session apart from Training classes.We conduct Week days batches as well as Weekend batches to provide comfort for Trainees.<br>

csinfotech
Download Presentation

CEH Training and Certification Course

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. <inc0gnito />

  2. Introduction to Information Security

  3. Hacking in general Is hacking illegal?? • You can be punished if:- • You are hacking someone • You are planning to hack someone • You are thinking to hack someone

  4. Types of Hackers Two Content Layout with Table White hat Grey Hat • First bullet point here • Second bullet point here • Third bullet point here Black Hat

  5. Other types of hackers • Elites • Script Kiddies • Neophyte • Blue Hat • Hacktavist • Nation State • Organised Criminal Gangs

  6. Networking Basics Types of Network LAN WAN MAN Protocols HTTP HTTPs TCP/IP UDP SMTP SMTPs DNS FTP

  7. Information Gathering google dorks who-is social networking sites wappalyzer jantakhoj pipl shodan maltego etc…

  8. Gmail Hacking

  9. Call forging, email spoofing, IP Spoofing, MAC Spoofing

  10. Social Engineering Any act that influences a person to take action that may or may not be in their best interest.

  11. But why social engineering attacks happen?

  12. Why do social engineering ?

  13. Phishing Phishing attack happens when someone tries to trick you into sharing personal information online. These attacks are one of the highest visibility problems for banking and e-commerce sites with the potential to destroy a customer’s livelihood.

  14. STEGANOGRAPHY Hiding text in plain sight

  15. Malware

  16. Types of Malware • Virus • Worm • Trojan • Backdoor • Adware • BOTNET • Vulnerability • Exploit

  17. Data Tampering

  18. SQL Injection

  19. SQLInjection

  20. XSS

  21. Port Scanning

  22. Metasploit

  23. Wireless Security • WEP • WPA/WPA2 • WPS

  24. For workshops you can contact us onD-24, Lower Ground Kalka JiNew Delhi (110019), Indiaor give us a call on + 91-9990303336011-41066768or mail us onhr@csinfotech.org ,query@csinfotech.org

More Related