Cyber-Security Webinar | CEH: Understanding Ethical Hacking

Page 1

CEH: Understanding Ethical Hacking

Tom Updegrove NetCom Learning www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Agenda • • • • • • • • • •

What is Hacking? Who is a Hacker? What is Ethical Hacking? Why Ethical Hacking is Necessary? Why should I care? The Phases of Ethical Hacking Network vs Web Browser Attacks Who is Responsible for my Data in the Cloud Vulnerability Assessments & Penetration Testing What is in the Course

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

©1998-2018 NetCom Learning


Think Like a Hacker

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


What is Hacking?

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Who is a Hacker?

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


What is Ethical Hacking?

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Why Ethical Hacking is Necessary?

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Why Ethical Hacking is Necessary?

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Why Should I Care

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


The Phases of Ethical Hacking

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Reconnaissance

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Scanning

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Gaining Access

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Maintaining Access

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Clearing Tracks

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Network vs Web Browser Attacks

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Objectives of Footprinting

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Overview of Network Scanning

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Introduction to Malware

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Impact of Webserver Attacks

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Web Application Attacks

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Who is Responsible for my Data in the Cloud

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


NIST Cloud Computing Reference Architecture

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Cloud Computing Attacks

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Cloud Computing Threats

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Cloud Computing Threats

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Vulnerability Assessments & Penetration Testing

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Elements of Information Security

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Information Security Threat Categories

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


What is Vulnerability Assessment?

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Penetration Testing

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Security Audit vs Vulnerability Assessment vs Penetration Testing

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


What is in the Course

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Outline

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


New Features

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


CEH v10 iLabs

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

©1998-2018 NetCom Learning


Practical

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Practical

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Recorded Webinar Video

To watch the recorded webinar video for live demos, please access the link: https://goo.gl/E4ziQ3

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


About NetCom Learning

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Recommended Courses & Marketing Assets Courses: » EC-Council CEH: Certified Ethical Hacker v10 & CNDA: Certified Network Defense Architect - Class scheduled on Jan 14

» EC-Council Certified Network Defender (CND) - Class scheduled on Jan 14 » EC-Council Computer Hacking Forensic Investigator (CHFI) - Class scheduled on Jan 07 » Certified Information Systems Security Professional (CISSP) Certification - Class scheduled on Jan 07 » CompTIA PenTest+ Certification

Marketing Assets: » Free On-Demand Training - The Five Phases of Ethical Hacking » Whitepaper - Addressing the Cybersecurity Skills Shortage » Blog - The Importance of CHFI-Certified Professionals in an IT Organization www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

©1998-2018 NetCom Learning


SQL Server 2017: Application Development Best Practices Malware Affecting IoT & Smart Devices: Detection, Prevention, and Removal Delivering Real-time Data with Azure and Power BI Connecting Microsoft Azure Virtual Networks ITIL 4 Foundation: Core Concepts and New Version Updates Autodesk Revit: File Management Techniques for BIM Managers

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


Promotions

The year 2018 is coming to an end, though learning is a continuous process! Build your’s, or team’s, or department’s skills with the best training courses of 2018-19. With a range of Cloud, Security, Networking, Data & AI, Design & Multimedia, Business Application, Application Development and Business Process training at limited-time prices, you can imbibe in-demand skills while making a huge saving on the training cost. Learn More www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

©1998-2018 NetCom Learning


Follow Us On:

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

Š1998-2018 NetCom Learning


THANK YOU !!!

www.netcomlearning.com | info@netcomlearning.com | (888) 563 8266

©1998-2018 NetCom Learning


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.