SlideShare a Scribd company logo
1 of 12
RNB GLOBAL UNIVERSITY
BCA 2nd SEMESTER
Ability and Skill Enhancement
SUBMITTED BY : - Tanishq Soni
Roll No. :- 1613007007
1
Ethical Hacking
2
What is Hacking ?
 The Process of attempting to gain or successfully
gaining, unauthorized access to computer resources
is called Hacking.
3
Who is a hacker?
 In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network.
 The term hacker is reclaimed by computer programmers who
argue that someone breaking into computers is better called
a cracker.
4
1.) Ethical hacking is where a person hacks to find weaknesses in
a system and then usually patches them.
2.) An ethical hacker is a computer and networking expert who
checks system or network on behalf of its owners for the purpose
of finding security vulnerabilities that a malicious hacker could
potentially exploit.
What is ethical hacking?
Required Skills for a Hacker : 5
 Learn programming language(c, c++)
 Learn scripting language ( JSP, Python, PHP)
 Good knowledge of database and query
 Language (SQL, YQL, FQL )
 Learn networking ( TCP/IP)
 Learn to work in Unix
 Start playing with web api’s
5
TYPE OF HACKERS
 Black-Hat Hackers :
 White-Hat Hackers
 Grey-Hat Hackers
7
Famous Hackers In India
Ankit FadiaKaushik Dutta
8
9
Institutions :
1.) Indian school of ethical hacking, Kolkata.
2.) Nexify Training Institute, Bangalore
3.) NIIT, Kolkata
4.) Indian Institute of Hardware Technology, Chennai
5.) Mazenet Solution Pvt Ltd.
Source Of Information
 Cybrary Site and Application.
 The Mary Sue for Hackers information
10
10
Ethical hacking-computer science

More Related Content

What's hot

Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3rEthical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3rTausif Patel
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackinganonymousrider
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module ankit sarode
 
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking   Chapter 5 - Physical Information Gathering - Eric VanderburgEthical hacking   Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking Chapter 5 - Physical Information Gathering - Eric VanderburgEric Vanderburg
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingjustyogesh
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacksStefan Fodor
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Atilim üniversitesi ceh sunum
Atilim üniversitesi ceh sunumAtilim üniversitesi ceh sunum
Atilim üniversitesi ceh sunumEPICROUTERS
 

What's hot (19)

Ethical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3rEthical hacking tausif h4 ck3r
Ethical hacking tausif h4 ck3r
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
N.vinodh
N.vinodhN.vinodh
N.vinodh
 
Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module Basic penetration testing & Ethical Hacking 2nd module
Basic penetration testing & Ethical Hacking 2nd module
 
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking   Chapter 5 - Physical Information Gathering - Eric VanderburgEthical hacking   Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacks
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Hacking
HackingHacking
Hacking
 
Atilim üniversitesi ceh sunum
Atilim üniversitesi ceh sunumAtilim üniversitesi ceh sunum
Atilim üniversitesi ceh sunum
 

Similar to Ethical hacking-computer science

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical HackingAkashy Kale
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingNitish Kasar
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptxdaxgame
 
Ethical hacking for beginners and professionals
Ethical hacking for beginners and professionalsEthical hacking for beginners and professionals
Ethical hacking for beginners and professionalsHackingmantra
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGNathan Mathis
 

Similar to Ethical hacking-computer science (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Ethical hacking for beginners and professionals
Ethical hacking for beginners and professionalsEthical hacking for beginners and professionals
Ethical hacking for beginners and professionals
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking
HackingHacking
Hacking
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 

More from Tanishq Soni

Input output redirection linux
Input output redirection linuxInput output redirection linux
Input output redirection linuxTanishq Soni
 
D.M time series analysis
D.M time series analysisD.M time series analysis
D.M time series analysisTanishq Soni
 
C.N blue eyes technology
C.N blue eyes technologyC.N blue eyes technology
C.N blue eyes technologyTanishq Soni
 
A.I Introduction (Introduction, Producion Rues, Intelligence, Knowledge)
A.I Introduction (Introduction, Producion Rues, Intelligence, Knowledge)A.I Introduction (Introduction, Producion Rues, Intelligence, Knowledge)
A.I Introduction (Introduction, Producion Rues, Intelligence, Knowledge)Tanishq Soni
 
Correlation and regresion-Mathematics
Correlation and regresion-MathematicsCorrelation and regresion-Mathematics
Correlation and regresion-MathematicsTanishq Soni
 
Principles of accounting- adjustments in final accounts
Principles of accounting- adjustments in final accountsPrinciples of accounting- adjustments in final accounts
Principles of accounting- adjustments in final accountsTanishq Soni
 
Principles of accounting
Principles of accountingPrinciples of accounting
Principles of accountingTanishq Soni
 
Operators and it’s types, Operator Precedence,Break and Continue statement
Operators and it’s types, Operator Precedence,Break and Continue statementOperators and it’s types, Operator Precedence,Break and Continue statement
Operators and it’s types, Operator Precedence,Break and Continue statementTanishq Soni
 
WAYS TO GET SUCCESS
WAYS TO GET SUCCESSWAYS TO GET SUCCESS
WAYS TO GET SUCCESSTanishq Soni
 
THE MUTE COMPANIONS From (UNDER THE BANYAN TREE) (By R. K. Narayan)
THE MUTE COMPANIONS  From (UNDER THE BANYAN TREE) (By R. K. Narayan)THE MUTE COMPANIONS  From (UNDER THE BANYAN TREE) (By R. K. Narayan)
THE MUTE COMPANIONS From (UNDER THE BANYAN TREE) (By R. K. Narayan)Tanishq Soni
 
R.K Narayan - UNDER THE BANYAN TREE( Chapter- At the portal )
R.K Narayan - UNDER THE BANYAN TREE( Chapter- At the portal )R.K Narayan - UNDER THE BANYAN TREE( Chapter- At the portal )
R.K Narayan - UNDER THE BANYAN TREE( Chapter- At the portal )Tanishq Soni
 
Literals, primitive datatypes, variables, expressions, identifiers
Literals, primitive datatypes, variables, expressions, identifiersLiterals, primitive datatypes, variables, expressions, identifiers
Literals, primitive datatypes, variables, expressions, identifiersTanishq Soni
 

More from Tanishq Soni (12)

Input output redirection linux
Input output redirection linuxInput output redirection linux
Input output redirection linux
 
D.M time series analysis
D.M time series analysisD.M time series analysis
D.M time series analysis
 
C.N blue eyes technology
C.N blue eyes technologyC.N blue eyes technology
C.N blue eyes technology
 
A.I Introduction (Introduction, Producion Rues, Intelligence, Knowledge)
A.I Introduction (Introduction, Producion Rues, Intelligence, Knowledge)A.I Introduction (Introduction, Producion Rues, Intelligence, Knowledge)
A.I Introduction (Introduction, Producion Rues, Intelligence, Knowledge)
 
Correlation and regresion-Mathematics
Correlation and regresion-MathematicsCorrelation and regresion-Mathematics
Correlation and regresion-Mathematics
 
Principles of accounting- adjustments in final accounts
Principles of accounting- adjustments in final accountsPrinciples of accounting- adjustments in final accounts
Principles of accounting- adjustments in final accounts
 
Principles of accounting
Principles of accountingPrinciples of accounting
Principles of accounting
 
Operators and it’s types, Operator Precedence,Break and Continue statement
Operators and it’s types, Operator Precedence,Break and Continue statementOperators and it’s types, Operator Precedence,Break and Continue statement
Operators and it’s types, Operator Precedence,Break and Continue statement
 
WAYS TO GET SUCCESS
WAYS TO GET SUCCESSWAYS TO GET SUCCESS
WAYS TO GET SUCCESS
 
THE MUTE COMPANIONS From (UNDER THE BANYAN TREE) (By R. K. Narayan)
THE MUTE COMPANIONS  From (UNDER THE BANYAN TREE) (By R. K. Narayan)THE MUTE COMPANIONS  From (UNDER THE BANYAN TREE) (By R. K. Narayan)
THE MUTE COMPANIONS From (UNDER THE BANYAN TREE) (By R. K. Narayan)
 
R.K Narayan - UNDER THE BANYAN TREE( Chapter- At the portal )
R.K Narayan - UNDER THE BANYAN TREE( Chapter- At the portal )R.K Narayan - UNDER THE BANYAN TREE( Chapter- At the portal )
R.K Narayan - UNDER THE BANYAN TREE( Chapter- At the portal )
 
Literals, primitive datatypes, variables, expressions, identifiers
Literals, primitive datatypes, variables, expressions, identifiersLiterals, primitive datatypes, variables, expressions, identifiers
Literals, primitive datatypes, variables, expressions, identifiers
 

Recently uploaded

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 

Recently uploaded (20)

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 

Ethical hacking-computer science

  • 1. RNB GLOBAL UNIVERSITY BCA 2nd SEMESTER Ability and Skill Enhancement SUBMITTED BY : - Tanishq Soni Roll No. :- 1613007007 1 Ethical Hacking
  • 2. 2 What is Hacking ?  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking.
  • 3. 3 Who is a hacker?  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 4. 4 1.) Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them. 2.) An ethical hacker is a computer and networking expert who checks system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit. What is ethical hacking?
  • 5. Required Skills for a Hacker : 5  Learn programming language(c, c++)  Learn scripting language ( JSP, Python, PHP)  Good knowledge of database and query  Language (SQL, YQL, FQL )  Learn networking ( TCP/IP)  Learn to work in Unix  Start playing with web api’s
  • 6. 5
  • 7. TYPE OF HACKERS  Black-Hat Hackers :  White-Hat Hackers  Grey-Hat Hackers 7
  • 8. Famous Hackers In India Ankit FadiaKaushik Dutta 8
  • 9. 9 Institutions : 1.) Indian school of ethical hacking, Kolkata. 2.) Nexify Training Institute, Bangalore 3.) NIIT, Kolkata 4.) Indian Institute of Hardware Technology, Chennai 5.) Mazenet Solution Pvt Ltd.
  • 10. Source Of Information  Cybrary Site and Application.  The Mary Sue for Hackers information 10
  • 11. 10