The Internet is home to seemingly infinite amounts of confidential and personal information. As a result of this mass storage of information, the system needs to be constantly updated and enforced to prevent hackers from retrieving such valuable and sensitive data. This increasing number of cyber-attacks has led to an increasing importance of Ethical Hacking. So Ethical hackers' job is to scan vulnerabilities and to find potential threats on a computer or networks. An ethical hacker finds the weakness or loopholes in a computer, web applications or network and reports them to the organization. It requires a thorough knowledge of Networks, web servers, computer viruses, SQL (Structured Query Language), cryptography, penetration testing, Attacks etc. In this session, you will learn all about ethical hacking. You will understand the what ethical hacking, Cyber- attacks, Tools and some hands-on demos. This session will also guide you with the various ethical hacking certifications available today.
Driving Behavioral Change for Information Management through Data-Driven Gree...
Ethical Hacking
1. Best Of The World In Security Conference
Best Of The World In Security
12-13 November 2020
ETHICAL HACKING
Roshna Khalid
CEH
Cyber security Trainer and Consultant
ROSHNA KHALID
2. Best Of The World In Security Conference
1. HACKING
2. HACKERS AND TYPES
3. OTHER TYPES
4. ETHICAL HACKING
5. WHY ETHICAL HACKERS ARE IMPORTANT TO A COMPANY?
6. SKILLS REQUIRED FOR AN ETHICAL HACKER
7. WHY ETHICAL HACKERS ARE IMPORTANT TO A COMPANY
8. SKILLS REQUIRED FOR AN ETHICAL HACKER
9. TOOLS
10. PHASES OF ETHICAL HACKING
11. TOOLS
12. DEMO IN KALI LINUX
13. HOW TO PROTECT YOURSELG FROM HACKER
AGENDA
ROSHNA KHALID
ROSHNA KHALID
3. Best Of The World In Security Conference
HACKING
• Legal Hacking
• Illegal Hacking
ROSHNA KHALID
4. Best Of The World In Security Conference
HACKERS
Types of hackers Black Hat
Hackers
Grey Hat
Hackers
White Hat
Hackers
ROSHNA KHALID
5. Best Of The World In Security Conference
OTHER TYPES
Suicide Hackers Script Kiddies
Hacktivists State Sponsored hackers
ROSHNA KHALID
6. Best Of The World In Security Conference
• Getting permission from the owner of the computer system
• Protect the privacy of the organization
• Transparently report
• Inform hardware and software vendors
ETHICAL HACKING
ROSHNA KHALID
7. Best Of The World In Security Conference
WHY ETHICAL HACKERS ARE IMPORTANT TO A COMPANY?
Getting lacked can lead to serious
Business Loss
Information is valuable
ROSHNA KHALID
8. Best Of The World In Security Conference
SKILLS REQUIRED FOR AN ETHICAL
HACKER
Programming
Knowledge
Operating system
knowledge
Network
Knowledge
ROSHNA KHALID
9. Best Of The World In Security Conference
CERTIFICATIONS
• CEH(Certified Ethical Hacking)
• CISM(Certified Information Security
Manager)
• CISSP (Certified Information Systems
Security Professional)
• (C|HFI) Computer Hacking Forensics
Investigator
• CompTIA Security+
ROSHNA KHALID
10. Best Of The World In Security Conference
PHASES OF ETHICAL HACKING
Reconnaissance Scanning
Gaining
Access
Maintaining
Access
Clearing
Tracks
ROSHNA KHALID
11. Best Of The World In Security Conference
TOOLS
ROSHNA KHALID
12. Best Of The World In Security Conference
OPEATING
SYSTEM
• Kali linux
• Parrot os
• Black Box
• BlackArch
• Live Hacking OS
• DEFT Linux
Used by ethical hackers
ROSHNA KHALID
13. Best Of The World In Security Conference
DEMO IN KALI LINUX
ROSHNA KHALID
14. Best Of The World In Security Conference
• Keep software and operating system updated
• Use anti-virus software and keep it updated
• Use strong passwords
• Do not open attachments in spam emails
• Do not click on links in spam emails or untrusted websites
• Do not give out personal information unless secure
• Keep an eye on every website URLs you visit
• Keep an eye on your bank statements
HOW TO PROTECT YOURSELG FROM HACKER
ROSHNA KHALID
15. Best Of The World In Security Conference
THANK YOU
ROSHNA KHALID