KEMBAR78
Basic of Ethical Hacking and Penetration Testing - 1st Module | PPT
Basic Penetration Testing &
Ethical Hacking
by Cyber Security Researcher and Ethical-Hacking
Organization
-CSREH-
1st
Module: Introduction to Information
Security
https://www.facebook.com/whatdehack
Information Security field(InfoSec)
• What is Penetration testing
• What is Hacking
• What is Difference between Hacking and
Ethical hacking
• Hacker Vs. Cracker
• InfoSec Field
• Career Path
• InfoSec Key Terms
What is Penetration testing
• A penetration test, or the short form
pentest, is an attack on a computer
system with the intention of finding
security weaknesses, potentially gaining
access to it, its functionality and data.
• Types of Penetration test-
http://www.pen-tests.com/types-of-
penetration-tests.html
What is Hacking?
• In the simple word's
hacking means finding
the loopholes or
vulnerabilities in
computerized system and
exploiting them in the
different-different ways.
More info:-
http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
What is Difference between
Hacking and Ethical Hacking
• In hacking the attacker can exploit the
vulnerabilities in system without having the
legal permission.
• And on the other Hand in the ethical
hacking the Ethical hacker or Penetration
Tester is do the same task as the hacker
do but in Legal Permission or in the
Ethical manner.
Hacker Vs. Cracker
• Hacker • Cracker
Good Guys Hacker+Criminal=Cracker
InfoSec Field
• Information security, sometimes shortened
to InfoSec, is the practice of defending
information from unauthorized access,
use, disclosure, disruption, modification,
perusal, inspection, recording or
destruction.
Carrer Path & Opportunites in
InfoSec
Carrer in InfoSec
• Penetration Tester
• Cyber Crime
Investigator
• Network Security
Engineer
• Security Researcher
• And so on....
Refrence
-http://www.sans.org/
20coolestcareers/
InfoSec Key Terms
• http://www.sans.org/security-
resources/glossary-of-terms/
• nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.
7298r2.pdf

Basic of Ethical Hacking and Penetration Testing - 1st Module

  • 1.
    Basic Penetration Testing& Ethical Hacking by Cyber Security Researcher and Ethical-Hacking Organization -CSREH- 1st Module: Introduction to Information Security https://www.facebook.com/whatdehack
  • 2.
    Information Security field(InfoSec) •What is Penetration testing • What is Hacking • What is Difference between Hacking and Ethical hacking • Hacker Vs. Cracker • InfoSec Field • Career Path • InfoSec Key Terms
  • 3.
    What is Penetrationtesting • A penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. • Types of Penetration test- http://www.pen-tests.com/types-of- penetration-tests.html
  • 4.
    What is Hacking? •In the simple word's hacking means finding the loopholes or vulnerabilities in computerized system and exploiting them in the different-different ways. More info:- http://en.wikipedia.org/wiki/Hacker_%28computer_security%29
  • 5.
    What is Differencebetween Hacking and Ethical Hacking • In hacking the attacker can exploit the vulnerabilities in system without having the legal permission. • And on the other Hand in the ethical hacking the Ethical hacker or Penetration Tester is do the same task as the hacker do but in Legal Permission or in the Ethical manner.
  • 6.
    Hacker Vs. Cracker •Hacker • Cracker Good Guys Hacker+Criminal=Cracker
  • 7.
    InfoSec Field • Informationsecurity, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
  • 8.
    Carrer Path &Opportunites in InfoSec
  • 9.
    Carrer in InfoSec •Penetration Tester • Cyber Crime Investigator • Network Security Engineer • Security Researcher • And so on.... Refrence -http://www.sans.org/ 20coolestcareers/
  • 10.
    InfoSec Key Terms •http://www.sans.org/security- resources/glossary-of-terms/ • nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR. 7298r2.pdf