SlideShare a Scribd company logo
1 of 12
Download to read offline
Ethical
#Hacking
Ethical Hacking
!! Content !!
* Overview of Ethical Hacking
* Prospectus of Ethical Hacking
* Evaluation of Ethical Hacking
* Training of Ethical Hacking
* Career in Ethical Hacking
* Types of Hacker Motivations
* Scope of Ethical Hacking
* Thank You…
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
Ethical Hacking
!! OVERVIEW OF ETHICAL HACKING !!
Ethical Hacking, as name suggests, is an ethical way of working with technology to find out
weaknesses of a system, taking it to the next level for further development. Hacking is never illegal; it
is an action of using skills and advanced techniques on a target to gain information about a system
and its surroundings, though it depends on the nature of the person who is performing the action.
The main focus of the Ethical Hacking and IT Security course is to train the student into an
interactive environment where the student will learn the skills of performing vulnerability
assessment, pen-testing of systems and networks, patching the weaknesses, making reports of
scanned vulnerabilities.
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
Ethical Hacking
!! PROSPECTUS !!
Module-1 : Introduction to Ethical Hacking
Module-2 : Foot Printing and Reconnaissance
Module-3 : Scanning Network
Module-4 : Enumeration
Module-5 : System Hacking
Module-6 : Trojans and Backdoors
Module-7 : Viruses and Worms
Module-8 : Sniffing
Module-9 : Session Hijacking
Module-10: Social Engineering
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
Ethical Hacking
!! PROSPECTUS !!
Module-11: Denial of Service (DoS)
Module-12: Hacking Webserver
Module-13: SQL Injection
Module-14: Hacking Wireless Networks
Module-15: Evading IDS, Firewalls and Honeypot
Module-16: Buffer Overflow
Module-17: Cryptography
Module-18: Penetration Testing
Module-19: Mobile Hacking
Module-20: Stenography
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
Ethical Hacking
!! EVALUATION OF ETHICAL HACKING !!
The evaluation process varies depending upon the course you enroll for, likewise: if you are enrolled
for Certification, you will be allotted an assignment during the mid-session of the course, which you
are deemed to complete within the month. Similar process is followed in Diploma. But in PG
Diploma, after the completion of the assignment during the mid-sessions; a Project-work is assigned
during the last quarter, which you have to complete in a month’s time.
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
Ethical Hacking
!! TRAINING OF ETHICAL HACKING !!
Training Sutline :
This collaborative training session is designed for online and distance students. The training would
acquaint the students with practical of Ethical Hacking and IT Security, work on real cases and the
digital signature techniques required to be a comparison and examination of the signature and
handwriting and various case studies.
Module Structure:
Cyber being a very vast topic, therefore students will be given an exposure to the training sessions
under two sections. They would be taught theoretically along with interactive practical sessions on
the respective section, which would be as follows:
Module-1: Cyber Forensic Investigation
Module-2: Mobile Phone Investigation
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
Ethical Hacking
!! Careers in Ethical Hacking !!
Career :
As Ethical Hacking has a wider scope, so it opens a lot of career opportunities. The designations that can be
achieved by the person involves:
* Network Security System Administrator/Manager
* Network Security Engineer
* Systems/Applications Security Executive
* Web Security Administrator/Manager
* Ethical Hacker
* Data Security Specialist
* Computer Forensics Investigator
* IT Security Administrator/Consultant/ Manager
* Security Certified Programmer
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
Ethical Hacking
!! TYPES OF HACKER MOTIVATIONS !!
White Hat Hackers:
These are the good guys, computer security experts who specialize in penetration testing and other
methodologies to ensure that a company’s information systems are secure. These IT security
professionals rely on a constantly evolving arsenal of technology to battle hackers.
Black Hat Hackers:
These are the bad guys, who are typically referred to as just plain hackers. The term is often used
specifically for hackers who break into networks or computers, or create computer viruses. Black hat
hackers continue to technologically outpace white hats. They often manage to find the path of least
resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists
often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get
paid.
Hacktivists:
Some hacker activists are motivated by politics or religion, while others may wish to expose
wrongdoing, or exact revenge, or simply harass their target for their own entertainment.
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
Ethical Hacking
!! TYPES OF HACKER MOTIVATIONS !!
Script Kiddies:
This is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface
websites in an attempt to make names for themselves.
State Sponsored Hackers:
Governments around the globe realize that it serves their military objectives to be well positioned online.
The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls
the air controls the world.” Now it’s all about controlling cyberspace. State sponsored hackers have
limitless time and funding to target civilians, corporations, and governments.
Spy Hackers:
Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the
outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists,
but their only agenda is to serve their client’s goals and get paid.
Cyber Terrorists:
These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by
disrupting critical infrastructures. Cyber terrorists are by far the most dangerous, with a wide range of
skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder.
Ethical Hacking
!! FUTURE SCOPE IN ETHICAL HACKING !!
There are many surveys conducted in order to find out the scope of Ethical Hacking course in India.
From this, following results are determined.
Reputed companies like Wipro, Infosys, IBM, Airtel and Reliance are always in look for good Ethical
Hackers. There is an estimate need of 60,000 Ethical Hackers. Within a few minutes, a single
computer intrusion can cause losses amounting to millions of dollars, thus need of ethical hacker is
must to control cyber terrorism.
Thank You…
ADDRESS:
2443, Hudson Lines, !! Follow Us On !!
Kingsway Camp,
Delhi-110009, India
CALL US:
+91 11 47074263
+91 9953546546
+91 9818877002
E-MAIL US:
Email: education@sifsindia.com
Support: info@sifsindia.com
Web: www.sifs.in
© Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved

More Related Content

What's hot

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportRaghav Bisht
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatIntellipaat
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 

Viewers also liked

Day3 Backup
Day3 BackupDay3 Backup
Day3 BackupJai4uk
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive MeasuresShubham Takode
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth HackerTim Homuth
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
How To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 YearsHow To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 Yearsluke_bkk
 
Beyaz Şapkalı Hacker Eğitimi Yardımcı Ders Notları
Beyaz Şapkalı Hacker Eğitimi Yardımcı Ders NotlarıBeyaz Şapkalı Hacker Eğitimi Yardımcı Ders Notları
Beyaz Şapkalı Hacker Eğitimi Yardımcı Ders NotlarıBGA Cyber Security
 

Viewers also liked (12)

Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
How to become a hacker
How to become a hackerHow to become a hacker
How to become a hacker
 
How to Become a Hacker?
How to Become a Hacker?How to Become a Hacker?
How to Become a Hacker?
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth Hacker
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
How To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 YearsHow To Become A Successful Hacker In Only 10 Years
How To Become A Successful Hacker In Only 10 Years
 
Growth Hacker le Social Media - Growth Hacking Paris 10
Growth Hacker le Social Media - Growth Hacking Paris 10Growth Hacker le Social Media - Growth Hacking Paris 10
Growth Hacker le Social Media - Growth Hacking Paris 10
 
Beyaz Şapkalı Hacker Eğitimi Yardımcı Ders Notları
Beyaz Şapkalı Hacker Eğitimi Yardımcı Ders NotlarıBeyaz Şapkalı Hacker Eğitimi Yardımcı Ders Notları
Beyaz Şapkalı Hacker Eğitimi Yardımcı Ders Notları
 

Similar to Ethical Hacking & IT Security Courses in SIFS

Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfvinsys2
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxNarangYadav
 
A Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingA Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingSrashti Jain
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptxInfosectrain3
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
Full Ethical Hacking Course for Beginners in Delhi.pdf
Full Ethical Hacking Course for Beginners in Delhi.pdfFull Ethical Hacking Course for Beginners in Delhi.pdf
Full Ethical Hacking Course for Beginners in Delhi.pdfBytecode Security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Cetpa Infotech
 
Breaking the Code The Art of Ethical Hacking.pdf
Breaking the Code The Art of Ethical Hacking.pdfBreaking the Code The Art of Ethical Hacking.pdf
Breaking the Code The Art of Ethical Hacking.pdfCetpa Infotech
 
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptxCCNMumbai
 
What is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxWhat is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxStrongboxAcademy
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakaleAakash Takale
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 

Similar to Ethical Hacking & IT Security Courses in SIFS (20)

Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
A Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingA Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical Hacking
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Full Ethical Hacking Course for Beginners in Delhi.pdf
Full Ethical Hacking Course for Beginners in Delhi.pdfFull Ethical Hacking Course for Beginners in Delhi.pdf
Full Ethical Hacking Course for Beginners in Delhi.pdf
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
 
Breaking the Code The Art of Ethical Hacking.pdf
Breaking the Code The Art of Ethical Hacking.pdfBreaking the Code The Art of Ethical Hacking.pdf
Breaking the Code The Art of Ethical Hacking.pdf
 
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
What is Ethical Hacking?.pptx
What is Ethical Hacking?.pptxWhat is Ethical Hacking?.pptx
What is Ethical Hacking?.pptx
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 

More from Sifs India

Security Features on New ₹500 & ₹2,000 Currency Notes
Security Features on New ₹500 & ₹2,000 Currency NotesSecurity Features on New ₹500 & ₹2,000 Currency Notes
Security Features on New ₹500 & ₹2,000 Currency NotesSifs India
 
NO SMOKING ZONE - SIFS INDIA
NO SMOKING ZONE - SIFS INDIANO SMOKING ZONE - SIFS INDIA
NO SMOKING ZONE - SIFS INDIASifs India
 
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCEIMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCESifs India
 
Forensic entomology
Forensic entomologyForensic entomology
Forensic entomologySifs India
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowSifs India
 
Supreme Class All Forensic Services
Supreme Class All Forensic ServicesSupreme Class All Forensic Services
Supreme Class All Forensic ServicesSifs India
 
Certified Forensic Services - SIFS INDIA
Certified Forensic Services - SIFS INDIACertified Forensic Services - SIFS INDIA
Certified Forensic Services - SIFS INDIASifs India
 
A report on ebola virus done by sifs india
A report on ebola virus done by sifs indiaA report on ebola virus done by sifs india
A report on ebola virus done by sifs indiaSifs India
 
Fsp 201-ethical-hacking-it-security-courses
Fsp 201-ethical-hacking-it-security-coursesFsp 201-ethical-hacking-it-security-courses
Fsp 201-ethical-hacking-it-security-coursesSifs India
 
Fsp 201-ethical-hacking-it-security-course
Fsp 201-ethical-hacking-it-security-courseFsp 201-ethical-hacking-it-security-course
Fsp 201-ethical-hacking-it-security-courseSifs India
 
105-forensic-graphology-handwriting
105-forensic-graphology-handwriting105-forensic-graphology-handwriting
105-forensic-graphology-handwritingSifs India
 
Fsp 103-questioned-document-examination
Fsp 103-questioned-document-examinationFsp 103-questioned-document-examination
Fsp 103-questioned-document-examinationSifs India
 
Fsp 102-fingerprint-science-identification-prospectus
Fsp 102-fingerprint-science-identification-prospectusFsp 102-fingerprint-science-identification-prospectus
Fsp 102-fingerprint-science-identification-prospectusSifs India
 
Fsp 102-fingerprint-science-identification
Fsp 102-fingerprint-science-identificationFsp 102-fingerprint-science-identification
Fsp 102-fingerprint-science-identificationSifs India
 
Fsp 101 forensic-science-criminal-investigation
Fsp 101 forensic-science-criminal-investigationFsp 101 forensic-science-criminal-investigation
Fsp 101 forensic-science-criminal-investigationSifs India
 
SEO Progress Report and how to make Report for SEO
SEO Progress Report  and how to make Report for SEOSEO Progress Report  and how to make Report for SEO
SEO Progress Report and how to make Report for SEOSifs India
 
Fsp 101-forensic science criminal investigation syllabus for training
Fsp 101-forensic science criminal investigation syllabus for trainingFsp 101-forensic science criminal investigation syllabus for training
Fsp 101-forensic science criminal investigation syllabus for trainingSifs India
 
Online Forensic Graphology Training by SIFS India
Online Forensic Graphology Training by SIFS IndiaOnline Forensic Graphology Training by SIFS India
Online Forensic Graphology Training by SIFS IndiaSifs India
 
Forensic Science In Crime Investigation
Forensic Science In Crime InvestigationForensic Science In Crime Investigation
Forensic Science In Crime InvestigationSifs India
 
Crime Scene Photography and Circumstantial Evidence Collection
Crime Scene Photography and Circumstantial Evidence CollectionCrime Scene Photography and Circumstantial Evidence Collection
Crime Scene Photography and Circumstantial Evidence CollectionSifs India
 

More from Sifs India (20)

Security Features on New ₹500 & ₹2,000 Currency Notes
Security Features on New ₹500 & ₹2,000 Currency NotesSecurity Features on New ₹500 & ₹2,000 Currency Notes
Security Features on New ₹500 & ₹2,000 Currency Notes
 
NO SMOKING ZONE - SIFS INDIA
NO SMOKING ZONE - SIFS INDIANO SMOKING ZONE - SIFS INDIA
NO SMOKING ZONE - SIFS INDIA
 
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCEIMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
IMPORTANCE OF CRIME SCENE: COLLECTION & PRESERVATION OF EVIDENCE
 
Forensic entomology
Forensic entomologyForensic entomology
Forensic entomology
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register Now
 
Supreme Class All Forensic Services
Supreme Class All Forensic ServicesSupreme Class All Forensic Services
Supreme Class All Forensic Services
 
Certified Forensic Services - SIFS INDIA
Certified Forensic Services - SIFS INDIACertified Forensic Services - SIFS INDIA
Certified Forensic Services - SIFS INDIA
 
A report on ebola virus done by sifs india
A report on ebola virus done by sifs indiaA report on ebola virus done by sifs india
A report on ebola virus done by sifs india
 
Fsp 201-ethical-hacking-it-security-courses
Fsp 201-ethical-hacking-it-security-coursesFsp 201-ethical-hacking-it-security-courses
Fsp 201-ethical-hacking-it-security-courses
 
Fsp 201-ethical-hacking-it-security-course
Fsp 201-ethical-hacking-it-security-courseFsp 201-ethical-hacking-it-security-course
Fsp 201-ethical-hacking-it-security-course
 
105-forensic-graphology-handwriting
105-forensic-graphology-handwriting105-forensic-graphology-handwriting
105-forensic-graphology-handwriting
 
Fsp 103-questioned-document-examination
Fsp 103-questioned-document-examinationFsp 103-questioned-document-examination
Fsp 103-questioned-document-examination
 
Fsp 102-fingerprint-science-identification-prospectus
Fsp 102-fingerprint-science-identification-prospectusFsp 102-fingerprint-science-identification-prospectus
Fsp 102-fingerprint-science-identification-prospectus
 
Fsp 102-fingerprint-science-identification
Fsp 102-fingerprint-science-identificationFsp 102-fingerprint-science-identification
Fsp 102-fingerprint-science-identification
 
Fsp 101 forensic-science-criminal-investigation
Fsp 101 forensic-science-criminal-investigationFsp 101 forensic-science-criminal-investigation
Fsp 101 forensic-science-criminal-investigation
 
SEO Progress Report and how to make Report for SEO
SEO Progress Report  and how to make Report for SEOSEO Progress Report  and how to make Report for SEO
SEO Progress Report and how to make Report for SEO
 
Fsp 101-forensic science criminal investigation syllabus for training
Fsp 101-forensic science criminal investigation syllabus for trainingFsp 101-forensic science criminal investigation syllabus for training
Fsp 101-forensic science criminal investigation syllabus for training
 
Online Forensic Graphology Training by SIFS India
Online Forensic Graphology Training by SIFS IndiaOnline Forensic Graphology Training by SIFS India
Online Forensic Graphology Training by SIFS India
 
Forensic Science In Crime Investigation
Forensic Science In Crime InvestigationForensic Science In Crime Investigation
Forensic Science In Crime Investigation
 
Crime Scene Photography and Circumstantial Evidence Collection
Crime Scene Photography and Circumstantial Evidence CollectionCrime Scene Photography and Circumstantial Evidence Collection
Crime Scene Photography and Circumstantial Evidence Collection
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Ethical Hacking & IT Security Courses in SIFS

  • 2. Ethical Hacking !! Content !! * Overview of Ethical Hacking * Prospectus of Ethical Hacking * Evaluation of Ethical Hacking * Training of Ethical Hacking * Career in Ethical Hacking * Types of Hacker Motivations * Scope of Ethical Hacking * Thank You… © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
  • 3. Ethical Hacking !! OVERVIEW OF ETHICAL HACKING !! Ethical Hacking, as name suggests, is an ethical way of working with technology to find out weaknesses of a system, taking it to the next level for further development. Hacking is never illegal; it is an action of using skills and advanced techniques on a target to gain information about a system and its surroundings, though it depends on the nature of the person who is performing the action. The main focus of the Ethical Hacking and IT Security course is to train the student into an interactive environment where the student will learn the skills of performing vulnerability assessment, pen-testing of systems and networks, patching the weaknesses, making reports of scanned vulnerabilities. © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
  • 4. Ethical Hacking !! PROSPECTUS !! Module-1 : Introduction to Ethical Hacking Module-2 : Foot Printing and Reconnaissance Module-3 : Scanning Network Module-4 : Enumeration Module-5 : System Hacking Module-6 : Trojans and Backdoors Module-7 : Viruses and Worms Module-8 : Sniffing Module-9 : Session Hijacking Module-10: Social Engineering © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
  • 5. Ethical Hacking !! PROSPECTUS !! Module-11: Denial of Service (DoS) Module-12: Hacking Webserver Module-13: SQL Injection Module-14: Hacking Wireless Networks Module-15: Evading IDS, Firewalls and Honeypot Module-16: Buffer Overflow Module-17: Cryptography Module-18: Penetration Testing Module-19: Mobile Hacking Module-20: Stenography © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
  • 6. Ethical Hacking !! EVALUATION OF ETHICAL HACKING !! The evaluation process varies depending upon the course you enroll for, likewise: if you are enrolled for Certification, you will be allotted an assignment during the mid-session of the course, which you are deemed to complete within the month. Similar process is followed in Diploma. But in PG Diploma, after the completion of the assignment during the mid-sessions; a Project-work is assigned during the last quarter, which you have to complete in a month’s time. © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
  • 7. Ethical Hacking !! TRAINING OF ETHICAL HACKING !! Training Sutline : This collaborative training session is designed for online and distance students. The training would acquaint the students with practical of Ethical Hacking and IT Security, work on real cases and the digital signature techniques required to be a comparison and examination of the signature and handwriting and various case studies. Module Structure: Cyber being a very vast topic, therefore students will be given an exposure to the training sessions under two sections. They would be taught theoretically along with interactive practical sessions on the respective section, which would be as follows: Module-1: Cyber Forensic Investigation Module-2: Mobile Phone Investigation © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
  • 8. Ethical Hacking !! Careers in Ethical Hacking !! Career : As Ethical Hacking has a wider scope, so it opens a lot of career opportunities. The designations that can be achieved by the person involves: * Network Security System Administrator/Manager * Network Security Engineer * Systems/Applications Security Executive * Web Security Administrator/Manager * Ethical Hacker * Data Security Specialist * Computer Forensics Investigator * IT Security Administrator/Consultant/ Manager * Security Certified Programmer © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
  • 9. Ethical Hacking !! TYPES OF HACKER MOTIVATIONS !! White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers. Black Hat Hackers: These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses. Black hat hackers continue to technologically outpace white hats. They often manage to find the path of least resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get paid. Hacktivists: Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment. © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved
  • 10. Ethical Hacking !! TYPES OF HACKER MOTIVATIONS !! Script Kiddies: This is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves. State Sponsored Hackers: Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace. State sponsored hackers have limitless time and funding to target civilians, corporations, and governments. Spy Hackers: Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid. Cyber Terrorists: These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures. Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder.
  • 11. Ethical Hacking !! FUTURE SCOPE IN ETHICAL HACKING !! There are many surveys conducted in order to find out the scope of Ethical Hacking course in India. From this, following results are determined. Reputed companies like Wipro, Infosys, IBM, Airtel and Reliance are always in look for good Ethical Hackers. There is an estimate need of 60,000 Ethical Hackers. Within a few minutes, a single computer intrusion can cause losses amounting to millions of dollars, thus need of ethical hacker is must to control cyber terrorism.
  • 12. Thank You… ADDRESS: 2443, Hudson Lines, !! Follow Us On !! Kingsway Camp, Delhi-110009, India CALL US: +91 11 47074263 +91 9953546546 +91 9818877002 E-MAIL US: Email: education@sifsindia.com Support: info@sifsindia.com Web: www.sifs.in © Copyright 2010 - 2015 SIFS India Pvt. Ltd. All Rights Reserved