About Ethical Hacking Classes?
Ethical Hacking sometimes called as Penetration Testing is an act of penetrating into system or networks to find out threats in those systems.Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security.
Ethical hacking is considered legal because the actions are used to increase the security of a computer system.
I. White Hat- Hackers :Ethical hackers or White hat hackers do not intend to harm the system or organization but they do so, officially with permission , to penetrate and locate the vulnerabilities, providing solutions to fix them and ensure safety.
II. Black Hat- Hackers : Black hat hackers or non-ethical hackers perform hacking to fulfill their selfish intentions to collect monetary benefits.
III. Grey Hat- Hackers : Grey hat hackers are the combination of white and black hat hackers. They hack without any malicious intention , to disclose all loopholes. They perform the hacking without any approval from the targeted organization.They do so to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately, offering to correct the defect for a nominal fee
According to Data Security Council of India, the Cyber security market is expected to grow to USD 35 billion by 2025. A report by NASSCOM states that the country needs at least one million skilled people by 2025 in various fields like renowned companies, financial institutions,cyber security firms , government organizations etc.
Tthey hire ethical hackers for Penetration testing which basically means that the hackers have to try and hack the software made by them to ensure there are no security flaws.
Trishneet Arora (25 yrs old, Founder of TAC Security), Ankit Fadia , Rishiraj Sharma, Rahul Tyagi, Anand Prakash, Vivek Ramchandran, Devjeet Singh, Sangeet Chopra and many others.
1. Introduction to ethical hacking
2. Virus and worms
3. Physical security
4. Session hijacking
6. Legality and ethics
8. Networking and basics
9. System hacking
10. Windows hacking
11. Hacking Web servers
12. Trojans and backdoors
13. Proxy servers
15. Social engineering
17. Denial of service attack
18. Penetration testing