Your True Business Partner.

Thursday 11 July 2019

Certified Ethical Hacking Course


Module Objective:



  1. Understanding the importance of security
  2. Introducing ethical hacking and essential terminology for the module
  3. Understanding the different phases involved in an exploit by a hacker
  4. Overview of attacks and identification of exploit categories
  5. Comprehending ethical hacking
  6. Legal implications of hacking
  7. Hacking, law and punishment


Why Security:



  1. Evolution of technology focused on ease of use Increasing complexity of computer infrastructure administration and management
  2. Decreasing skill level needed for exploits
  3. Direct impact of security breach on corporate asset base and goodwill
  4. Increased networked environment and network based applications


Can Hacking Be Ethical?


  1. The noun ‘hacker’ refers to a person who enjoys learning the details of computer systems and stretch their capabilities.
  2. The verb ‘hacking’ describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient.
  3. The term ‘cracker’ refers to a person who uses his hacking skills for offensive purposes.
  4. The term ‘ethical hacker’ refers to security professionals who apply their hacking skills for defensive purposes.

Elements of Security:



  1. Security is a state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of
  2. information and services is kept low or tolerable
  3. Any hacking event will affect any one or more of the essential security elements.
  4. Security rests on confidentiality, authenticity, integrity, and availability
    1. Confidentiality is the concealment of information or resources.
    2. Authenticity is the identification and assurance of the origin of information.
    3. Integrity refers to the trustworthiness of data or resources in terms of preventing improper and unauthorized changes.
    4. Availability refers to the ability to use the information or resource desired

What Does a Malicious Hacker Do?



  1. Reconnaissance
    • Active / passive
  2. Scanning
  3. Gaining access
    • Operating system level / application level
    • Network level
    • Denial of service
  4. Maintaining access
    • Uploading / altering / downloading programs or data
  5. Covering tracks



Hacker Classes:


  1. Black hats
  2. Ethical Hacker Classes
  3. Former Black Hats
  4. White Hats
  5. White Hats
  6. Gray Hats
  7. Consulting Firms


Security Testing:


  1. There are many different forms of security testing.
  2. Examples include vulnerability scanning, ethical hacking and penetration testing.
  3. Security testing can be conducted using one of two approaches:
  4. Black-box (with no prior knowledge of the infrastructure to be tested)
  5. White-box (with a complete knowledge of the network infrastructure).
  6. Internal Testing is also known as Gray-box testing and this examines the extent of access by insiders within the network.


Final Comments:


  1. Security is critical across sectors and industries.
  2. Ethical Hacking is a methodology to simulate a malicious attack without causing damage.
  3. Hacking involves five distinct phases.
  4. Security evaluation includes preparation, conduct and evaluation phases.
  5. Cyber crime can be differentiated into two categories.
  6. U.S. Statutes ξ 1029 and 1030 primarily address cyber crime.


Thank You for Your support.


Feel Free to Contact us for any help.

No comments:

Post a Comment