( ** Edureka Online Training: https://www.edureka.co/cybersecurity-certification-training ** )
This Edureka "Ethical Hacking Tutorial" PPT will give you an introduction to Ethical Hacking. This video will give you an exhaustive video on key topics of Ethical Hacking for beginners! The PPT includes the following topics
What is Ethical Hacking
Goals of Ethical Hacking
Why Ethical Hacking is Important
What is a Security Threat
Types of Security Threats
Security Threats: Preventive Measures
Ethical Hacker Skills
Why Learn Programming
Ethical Hacking Tools
What is Social Engineering
Phases of Social Engineering
Social Engineering Techniques
Cryptography
Cryptanalysis
Cryptanalysis Techniques
Standard Cryptographic Algorithms
RC4 Decryption Demonstration
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
3. Goals of
Ethical Hacking
Protect the privacy of the
organization been hacked.
Transparently report all the identified
weaknesses in the computer system to the
organization
Inform hardware and software vendors of
the identified weaknesses
5. What is a
Security Threat
“Any risk that can potentially harm a computer
system is known a security threat”
Security Threats
Physical Threats Non - Physical Threats
7. Preventive
Measures
Non - Physical Threats
An organization must have logical security measures in place
An organisation must have some sort of cognitive
cybersecurity measure installed
The authentication methods can be, in the
form of user ids and strong passwords, smart
cards or biometric, etc.
Efficient IPS/IDS systems is an essential
in todays cybersecurity era
9. Why learn to
Program Hackers are the
problem solver
and tool builders,
learning how to
program will help
you implement
solutions to
problems.
Writing programs
as a hacker will
help you to
automate many
tasks which
would usually
take lots of time
to complete.
Writing programs
can also help you
identify and
exploit
programming
errors in
applications that
you will be
targeting.
You can
customize the
already existing
applications and
add your
methods to suit
your needs
Why learn to
Program
11. What
is
Social Engineering
“Social engineering is the art of manipulating
users of a computing system into revealing
confidential information that can be used to
gain unauthorized access to a computer
system”
Greed Kindness
Emotions Exploited
14. Cryptography
“Cryptography is the study and application of
techniques that hide the real meaning of
information by transforming it into nonhuman
readable formats and vice versa”
I LOVE APPLES
K NQYG CRRNGU
15. Cryptanalysis
Cryptanalysis is the art of trying to decrypt the
encrypted messages without the use of the key that
was used to encrypt the messages.
Time
Available
Computing
Power
Storage
Capacity
Success Rate Parameter
17. Cryptographic
Algorithms
SHAMD5 RC4
• Stands for Message
Digest 5
• Creates 128 bit hash
values
• Not collision
resistance
• Stands for Secure
Hashing Algorithm
• SHA0, SHA1, SHA2,
SHA3
• One of the most
popular Hashing
Algorithm
• Stands for Rivet
Cipher 4
• Used in Protocols
like SSL and WEP