CEH workshop by CS Infotech - PowerPoint PPT Presentation

About This Presentation
Title:

CEH workshop by CS Infotech

Description:

We are going to start training and Certification course on CEH in which we cover all the related topics with theory and practical approach. We have also special Doubt clearing session apart Training classes.We conduct Week days batches as well as Weekend batches to provide comfort for Trainees. – PowerPoint PPT presentation

Number of Views:97

less

Transcript and Presenter's Notes

Title: CEH workshop by CS Infotech


1
ltinc0gnito /gt
2
Introduction to Information Security
3
Hacking in general
Is hacking illegal??
  • You can be punished if-
  • You are hacking someone
  • You are planning to hack someone
  • You are thinking to hack someone

4
Two Content Layout with Table
Types of Hackers
White hat
Grey Hat
  • First bullet point here
  • Second bullet point here
  • Third bullet point here

Class Group 1 Group 2
Class 1 82 95
Class 2 76 88
Class 3 84 90
Black Hat
5
Other types of hackers
  • Elites
  • Script Kiddies
  • Neophyte
  • Blue Hat
  • Hacktavist
  • Nation State
  • Organised Criminal Gangs

6
Networking Basics
  • Types of Network
  • LAN
  • WAN
  • MAN
  • Protocols
  • HTTP
  • HTTPs
  • TCP/IP
  • UDP
  • SMTP
  • SMTPs
  • DNS
  • FTP

7
Information Gathering
  • google dorks
  • who-is
  • social networking sites
  • wappalyzer
  • janta khoj
  • pipl
  • shodan
  • maltego
  • etc

8
(No Transcript)
9
Gmail Hacking
10
Call forging, email spoofing, IP Spoofing, MAC
Spoofing
11
Social Engineering
Any act that influences a person to take action
that may or may not be in their best interest.
12
But why social engineering attacks happen?
13
Why do social engineering ?
14
Phishing
Phishing attack happens when someone tries to
trick you into sharing personal information
online. These attacks are one of the highest
visibility problems for banking and e-commerce
sites with the potential to destroy a customers
livelihood.
15
(No Transcript)
16
(No Transcript)
17
(No Transcript)
18
STEGANOGRAPHY
  • Hiding text in plain sight

19
Malware
20
Types of Malware
  • Virus
  • Worm
  • Trojan
  • Backdoor
  • Adware
  • BOTNET
  • Vulnerability
  • Exploit

21
Data Tampering
22
SQL Injection
23
SQL Injection
24
XSS
25
Port Scanning
26
Metasploit
27
Wireless Security
  • WEP
  • WPA/WPA2
  • WPS

28
(No Transcript)
29
For workshops you can contact us onD-24, Lower
Ground Kalka JiNew Delhi (110019), Indiaor
give us a call on  91-9990303336 011-41066768
or mail us on hr_at_csinfotech.org
,query_at_csinfotech.org 
30
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com