Ethical Hacking & IT Security Courses in SIFS - PowerPoint PPT Presentation

About This Presentation
Title:

Ethical Hacking & IT Security Courses in SIFS

Description:

The course Ethical Hacking & IT Security (FSP 201) includes all the details regarding the introduction of the ethical hacking, cyber security, cyber law, the vulnerabilities of the network security and the related factors. Course will introduce you to interactive training session and practicals on the scientific and technical methods involved in a sequential examination. – PowerPoint PPT presentation

Number of Views:547

less

Transcript and Presenter's Notes

Title: Ethical Hacking & IT Security Courses in SIFS


1
Ethical Hacking
2
Ethical Hacking
  • !! Content !!
  • Overview of Ethical Hacking
  • Prospectus of Ethical Hacking
  • Evaluation of Ethical Hacking
  • Training of Ethical Hacking
  • Career in Ethical Hacking
  • Types of Hacker Motivations
  • Scope of Ethical Hacking
  • Thank You

  • Copyright
    2010 - 2015 SIFS India Pvt. Ltd. All Rights
    Reserved

3
Ethical Hacking
  • !! OVERVIEW OF ETHICAL HACKING !!
  • Ethical Hacking, as name suggests, is an ethical
    way of working with technology to find out
    weaknesses of a system, taking it to the next
    level for further development. Hacking is never
    illegal it is an action of using skills and
    advanced techniques on a target to gain
    information about a system and its surroundings,
    though it depends on the nature of the person who
    is performing the action. The main focus of the
    Ethical Hacking and IT Security course is to
    train the student into an interactive environment
    where the student will learn the skills of
    performing vulnerability assessment, pen-testing
    of systems and networks, patching the weaknesses,
    making reports of scanned vulnerabilities.


  • Copyright 2010 - 2015 SIFS India Pvt. Ltd.
    All Rights Reserved

4
Ethical Hacking
  • !! PROSPECTUS !!
  • Module-1 Introduction to Ethical Hacking
  • Module-2 Foot Printing and Reconnaissance
  • Module-3 Scanning Network
  • Module-4 Enumeration
  • Module-5 System Hacking
  • Module-6 Trojans and Backdoors
  • Module-7 Viruses and Worms
  • Module-8 Sniffing
  • Module-9 Session Hijacking
  • Module-10 Social Engineering


  • Copyright 2010 -
    2015 SIFS India Pvt. Ltd. All Rights Reserved

5
Ethical Hacking
  • !! PROSPECTUS !!
  • Module-11 Denial of Service (DoS)
  • Module-12 Hacking Webserver
  • Module-13 SQL Injection
  • Module-14 Hacking Wireless Networks
  • Module-15 Evading IDS, Firewalls and Honeypot
  • Module-16 Buffer Overflow
  • Module-17 Cryptography
  • Module-18 Penetration Testing
  • Module-19 Mobile Hacking
  • Module-20 Stenography


  • Copyright 2010 - 2015 SIFS India
    Pvt. Ltd. All Rights Reserved

6
Ethical Hacking
  • !! EVALUATION OF ETHICAL HACKING !!
  • The evaluation process varies depending upon the
    course you enroll for, likewise if you are
    enrolled for Certification, you will be allotted
    an assignment during the mid-session of the
    course, which you are deemed to complete within
    the month. Similar process is followed in
    Diploma. But in PG Diploma, after the completion
    of the assignment during the mid-sessions a
    Project-work is assigned during the last quarter,
    which you have to complete in a months time.


  • Copyright 2010 -
    2015 SIFS India Pvt. Ltd. All Rights Reserved

7
Ethical Hacking
  • !! TRAINING OF ETHICAL HACKING !!
  • Training Sutline
  • This collaborative training session is designed
    for online and distance students. The training
    would acquaint the students with practical of
    Ethical Hacking and IT Security, work on real
    cases and the digital signature techniques
    required to be a comparison and examination of
    the signature and handwriting and various case
    studies.
  • Module Structure
  • Cyber being a very vast topic, therefore students
    will be given an exposure to the training
    sessions under two sections. They would be taught
    theoretically along with interactive practical
    sessions on the respective section, which would
    be as follows
  • Module-1 Cyber Forensic Investigation
  • Module-2 Mobile Phone Investigation





  • Copyright 2010 - 2015 SIFS India Pvt. Ltd. All
    Rights Reserved

8
Ethical Hacking
  • !! Careers in Ethical Hacking !!
  • Career
  • As Ethical Hacking has a wider scope, so it opens
    a lot of career opportunities. The designations
    that can be achieved by the person involves
  • Network Security System Administrator/Manager
  • Network Security Engineer
  • Systems/Applications Security Executive
  • Web Security Administrator/Manager
  • Ethical Hacker
  • Data Security Specialist
  • Computer Forensics Investigator
  • IT Security Administrator/Consultant/ Manager
  • Security Certified Programmer


  • Copyright 2010 - 2015 SIFS India Pvt.
    Ltd. All Rights Reserved

9
Ethical Hacking
  • !! TYPES OF HACKER MOTIVATIONS !!
  • White Hat Hackers
  • These are the good guys, computer security
    experts who specialize in penetration testing and
    other methodologies to ensure that a companys
    information systems are secure. These IT security
    professionals rely on a constantly evolving
    arsenal of technology to battle hackers.
  • Black Hat Hackers
  • These are the bad guys, who are typically
    referred to as just plain hackers. The term is
    often used specifically for hackers who break
    into networks or computers, or create computer
    viruses. Black hat hackers continue to
    technologically outpace white hats. They often
    manage to find the path of least resistance,
    whether due to human error or laziness, or with a
    new type of attack. Hacking purists often use the
    term crackers to refer to black hat hackers.
    Black hats motivation is generally to get paid.
  • Hacktivists
  • Some hacker activists are motivated by politics
    or religion, while others may wish to expose
    wrongdoing, or exact revenge, or simply harass
    their target for their own entertainment.

  • Copyright 2010 -
    2015 SIFS India Pvt. Ltd. All Rights Reserved

10
Ethical Hacking
  • !! TYPES OF HACKER MOTIVATIONS !!
  • Script Kiddies
  • This is a derogatory term for black hat hackers
    who use borrowed programs to attack networks and
    deface websites in an attempt to make names for
    themselves.
  • State Sponsored Hackers
  • Governments around the globe realize that it
    serves their military objectives to be well
    positioned online. The saying used to be, He who
    controls the seas controls the world, and then
    it was, He who controls the air controls the
    world. Now its all about controlling
    cyberspace. State sponsored hackers have
    limitless time and funding to target civilians,
    corporations, and governments.
  • Spy Hackers
  • Corporations hire hackers to infiltrate the
    competition and steal trade secrets. They may
    hack in from the outside or gain employment in
    order to act as a mole. Spy hackers may use
    similar tactics as hacktivists, but their only
    agenda is to serve their clients goals and get
    paid.
  • Cyber Terrorists
  • These hackers, generally motivated by religious
    or political beliefs, attempt to create fear and
    chaos by disrupting critical infrastructures.
    Cyber terrorists are by far the most dangerous,
    with a wide range of skills and goals. Cyber
    Terrorists ultimate motivation is to spread fear,
    terror and commit murder.

11
Ethical Hacking
  • !! FUTURE SCOPE IN ETHICAL HACKING !!
  • There are many surveys conducted in order to find
    out the scope of Ethical Hacking course in
    India. From this, following results are
    determined.
  • Reputed companies like Wipro, Infosys, IBM,
    Airtel and Reliance are always in look for good
    Ethical Hackers. There is an estimate need of
    60,000 Ethical Hackers. Within a few minutes, a
    single computer intrusion can cause losses
    amounting to millions of dollars, thus need of
    ethical hacker is must to control cyber
    terrorism.

12
Thank You
  • ADDRESS
  • 2443, Hudson Lines,
    !!
    Follow Us On !!Kingsway Camp, Delhi-110009,
    India
  • CALL US
  • 91 11 4707426391 995354654691 9818877002
  • E-MAIL US
  • Email education_at_sifsindia.comSupport info_at_sifsi
    ndia.comWeb www.sifs.in


  • Copyright 2010 - 2015 SIFS
    India Pvt. Ltd. All Rights Reserved
Write a Comment
User Comments (0)
About PowerShow.com