Ethical hacking

16
256

Sun Tzu said, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate.

Hacking preys on weak security practices and undisclosed vulnerabilities. These security systems often focus on high-level vulnerabilities, such as viruses and traffic through a firewall, without affecting how hackers work.

But ethical hacking is much different. It brings positive change in environment of the company and organisation. As hackers expand their knowledge, so should you. You must think like them to protect your systems from them.

Don’t take ethical hacking too far, though. It makes little sense to harden your systems from unlikely attacks. The reason for conducting an ethical hack, obviously, is to keep information assets secure.

One survey respondent stated that “It (ethical hacking) is very important and helps save you money and reputation in the long run.”

Ethical hackers use the same techniques and tactics as those used by illegal hackers to breach corporate security systems. The end result is the company’s ability to prevent an intrusion before it ever occurs.

There are basic programmes on training for ethical hacking. There are 11 modules which have to be done for completion of this course. It consist of expert pen tester, team leader and security consultant in it basic education. They will then responsible for planning, managing, conducting and writing the pen test report.

Ethical hacking training students will be able to confidently undertake the laboratory simulated examination.

ZUBAIR AMJAD

Lahore

 

16 COMMENTS

  1. Dear Zubair.
    If you are certified ethical hacker then please contact me because i also want to learn ethical hacking and also want to be a certified ethical hacker
    Waqas Sagheer
    +92 322 2666991

  2. Dear student Ethical Hacking classes is starting from Monday (21/05/2012).

    Please contact 03459461846 ,

  3. http://www.stscomps.com/eccouncil.htm

    Ethical Hacker CEH Course Outline , We offer Low Cost

    Ø Module 01: Introduction to Ethical Hacking
    Ø Module 02: Footprinting and Reconnaissance
    Ø Module 03: Scanning Networks
    Ø Module 04: Enumeration
    Ø Module 05: System Hacking
    Ø Module 06: Trojans and Backdoors
    Ø Module 07: Viruses and Worms
    Ø Module 08: Sniffers
    Ø Module 09: Social Engineering
    Ø Module 10: Denial of Service
    Ø Module 11: Session Hijacking
    Ø Module 12: Hijacking Webservers
    Ø Module 13: Hacking Web Applications
    Ø Module 14: SQL Injection
    Ø Module 15: Hacking Wireless Networks
    Ø Module 16: Evading IDS, Firewalls, and Honeypots
    Ø Module 17: Buffer Overflow
    Ø Module 18: Cryptography
    Ø Module 19: Penetration Testing
    http://www.stscomps.com/eccouncil.htm

    Student Shelter In Computers ® EC-Council Academic Partner
    Abbas Shahid Baqir (Director)
    Cell: 0300-4738405
    E-mail: [email protected]

  4. I am not certified ethical hacker but have been working in security and linux field since 10 years and can teach 100% practical ways to hack facebook/hotmail/ secured wifi …breaking into system etc etc. please contact me if someone interested all course will be online and I will provide all the lab server online on my cost. [email protected]

Comments are closed.