SlideShare uma empresa Scribd logo
1 de 12
CYBER HACKING DEV DAYS
Presented by AES Cyber team, Technovalley
What is hacking?
Hacking is an act of penetrating computer systems to gain
knowledge about the system and how it works. This is considered illegal
since it is like breaking into someone’s house.
What are ‘Hackers’?
Hackers are people who try to gain unauthorized access to
computers. This is normally done through the use of a 'backdoor'
program installed on your machine. A lot of Hackers also try to gain
access to resources through the use of password cracking software,
which tries billions of passwords to find the correct one for accessing a
computer
What damage they can do?
Hackers can see everything you are doing
Can access any file on your disk
Damage/Destroy a system
Sneak into your social media accounts
Can compromise a nation’s security
Can access your phone data through WIFI/Apps
Steal company secrets, deface your websites, terrorist activities and etc etc etc
...........
Can also prevent a attack by thinking like a criminal
Hi-Tech ATM Robbery In Thiruvananthapuram
http://www.ndtv.com/kerala-news/hi-tech-atm-robbery-in-
thiruvananthapuram-many-duped-1441771
http://english.manoramaonline.com/news/just-in/atm-robbery-in-
thiruvananthapuram-police-foreigners.html
http://www.deccanchronicle.com/nation/crime/090816/hi-tech-atm-robbery-
in-thiruvananthapuram.html
What are we going to Learn ?
Introduction to Ethical Hacking, Ethics, and Legality
Defining Ethical Hacking
Understanding the Purpose of Ethical Hacking
What Do Ethical Hackers Do?
Goals Attackers Try to Achieve
An Ethical Hacker’s Skill Set
Ethical Hacking Terminology
The Phases of Ethical Hacking
Identifying Types of Hacking Technologies
Live Demos
Shopping site hacking
CCTV hacking
System password cracking
Private data hacking
Fishing
Email threatening
Minimum Requirement
PC with active internet connection for each candidate
Minimum internet speed of 1Mbps
Confirmation QR code from Technovalley
Projector and sound system
30 Seating capacity
Benefits for Participent
EC-Council accredited Technovalley workshop certificate.
Free membership to Technovalley hacker group.
25% discount for the CEH Certification.
T-Shirt with EC-Council and Technovalley branding.
About AES Cyber team
We are the accredited partner of EC-Council
EC-Council is affiliated with DOD (Department of Defence) USA, ANSI
(American National Standard Institute) USA and also affiliated with many
government bodies and organizations.
Thank you

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Hacking
HackingHacking
Hacking
 
Hacker
HackerHacker
Hacker
 
Hacking
HackingHacking
Hacking
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Hacking
HackingHacking
Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
Hackers
HackersHackers
Hackers
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
 
Hacking
HackingHacking
Hacking
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 

Semelhante a Cyber hacking dev days by aes team

CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 

Semelhante a Cyber hacking dev days by aes team (20)

Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
HackingHacking
Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Hacking
HackingHacking
Hacking
 

Mais de ABIN VARGHESE

Research and research methodology
Research and research methodologyResearch and research methodology
Research and research methodology
ABIN VARGHESE
 

Mais de ABIN VARGHESE (10)

Water Pollution
Water PollutionWater Pollution
Water Pollution
 
Step count sensor
Step count sensorStep count sensor
Step count sensor
 
Technovalley RedHat
Technovalley RedHatTechnovalley RedHat
Technovalley RedHat
 
Smart Remote
Smart RemoteSmart Remote
Smart Remote
 
Entrepreneurship Development Programme
Entrepreneurship Development ProgrammeEntrepreneurship Development Programme
Entrepreneurship Development Programme
 
WiFi Cluster Block Diagram
WiFi Cluster Block DiagramWiFi Cluster Block Diagram
WiFi Cluster Block Diagram
 
ATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker systemATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker system
 
Autonomous drone project part 1
Autonomous drone project part 1Autonomous drone project part 1
Autonomous drone project part 1
 
Intelligent irrigation system
Intelligent irrigation systemIntelligent irrigation system
Intelligent irrigation system
 
Research and research methodology
Research and research methodologyResearch and research methodology
Research and research methodology
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Cyber hacking dev days by aes team

  • 1. CYBER HACKING DEV DAYS Presented by AES Cyber team, Technovalley
  • 2. What is hacking? Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. This is considered illegal since it is like breaking into someone’s house.
  • 3. What are ‘Hackers’? Hackers are people who try to gain unauthorized access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of Hackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer
  • 4. What damage they can do? Hackers can see everything you are doing Can access any file on your disk Damage/Destroy a system Sneak into your social media accounts Can compromise a nation’s security Can access your phone data through WIFI/Apps Steal company secrets, deface your websites, terrorist activities and etc etc etc ........... Can also prevent a attack by thinking like a criminal
  • 5. Hi-Tech ATM Robbery In Thiruvananthapuram http://www.ndtv.com/kerala-news/hi-tech-atm-robbery-in- thiruvananthapuram-many-duped-1441771 http://english.manoramaonline.com/news/just-in/atm-robbery-in- thiruvananthapuram-police-foreigners.html http://www.deccanchronicle.com/nation/crime/090816/hi-tech-atm-robbery- in-thiruvananthapuram.html
  • 6. What are we going to Learn ? Introduction to Ethical Hacking, Ethics, and Legality Defining Ethical Hacking Understanding the Purpose of Ethical Hacking What Do Ethical Hackers Do? Goals Attackers Try to Achieve An Ethical Hacker’s Skill Set Ethical Hacking Terminology The Phases of Ethical Hacking Identifying Types of Hacking Technologies
  • 7. Live Demos Shopping site hacking CCTV hacking System password cracking Private data hacking Fishing Email threatening
  • 8. Minimum Requirement PC with active internet connection for each candidate Minimum internet speed of 1Mbps Confirmation QR code from Technovalley Projector and sound system 30 Seating capacity
  • 9. Benefits for Participent EC-Council accredited Technovalley workshop certificate. Free membership to Technovalley hacker group. 25% discount for the CEH Certification. T-Shirt with EC-Council and Technovalley branding.
  • 10.
  • 11. About AES Cyber team We are the accredited partner of EC-Council EC-Council is affiliated with DOD (Department of Defence) USA, ANSI (American National Standard Institute) USA and also affiliated with many government bodies and organizations.