SlideShare a Scribd company logo
CYBER HACKING DEV DAYS
Presented by AES Cyber team, Technovalley
What is hacking?
Hacking is an act of penetrating computer systems to gain
knowledge about the system and how it works. This is considered illegal
since it is like breaking into someone’s house.
What are ‘Hackers’?
Hackers are people who try to gain unauthorized access to
computers. This is normally done through the use of a 'backdoor'
program installed on your machine. A lot of Hackers also try to gain
access to resources through the use of password cracking software,
which tries billions of passwords to find the correct one for accessing a
computer
What damage they can do?
Hackers can see everything you are doing
Can access any file on your disk
Damage/Destroy a system
Sneak into your social media accounts
Can compromise a nation’s security
Can access your phone data through WIFI/Apps
Steal company secrets, deface your websites, terrorist activities and etc etc etc
...........
Can also prevent a attack by thinking like a criminal
Hi-Tech ATM Robbery In Thiruvananthapuram
http://www.ndtv.com/kerala-news/hi-tech-atm-robbery-in-
thiruvananthapuram-many-duped-1441771
http://english.manoramaonline.com/news/just-in/atm-robbery-in-
thiruvananthapuram-police-foreigners.html
http://www.deccanchronicle.com/nation/crime/090816/hi-tech-atm-robbery-
in-thiruvananthapuram.html
What are we going to Learn ?
Introduction to Ethical Hacking, Ethics, and Legality
Defining Ethical Hacking
Understanding the Purpose of Ethical Hacking
What Do Ethical Hackers Do?
Goals Attackers Try to Achieve
An Ethical Hacker’s Skill Set
Ethical Hacking Terminology
The Phases of Ethical Hacking
Identifying Types of Hacking Technologies
Live Demos
Shopping site hacking
CCTV hacking
System password cracking
Private data hacking
Fishing
Email threatening
Minimum Requirement
PC with active internet connection for each candidate
Minimum internet speed of 1Mbps
Confirmation QR code from Technovalley
Projector and sound system
30 Seating capacity
Benefits for Participent
EC-Council accredited Technovalley workshop certificate.
Free membership to Technovalley hacker group.
25% discount for the CEH Certification.
T-Shirt with EC-Council and Technovalley branding.
About AES Cyber team
We are the accredited partner of EC-Council
EC-Council is affiliated with DOD (Department of Defence) USA, ANSI
(American National Standard Institute) USA and also affiliated with many
government bodies and organizations.
Thank you

More Related Content

What's hot

Hacking
HackingHacking
Hacking
Virus
 
Hacker
HackerHacker
Hacker
Ramasubbu .P
 
Hacking
HackingHacking
Hacking
Asma Khan
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
Mian Khayyam
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
BareetSingh
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
hamza javed
 
Hacking
HackingHacking
Hacking
j naga sai
 
Hacking
HackingHacking
Hacking
Ravi Raj
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
soukigirishkumar1
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
iuvmtech
 
Hacking
Hacking Hacking
Hacking
Nafeesa Naeem
 
Hacking
HackingHacking
Hacking
akam bajalan
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
miltonnancy
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
 
Hacking
HackingHacking
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
GoldenPartsAE101
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
Hacker
HackerHacker
Hacker
 
Hacking
HackingHacking
Hacking
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Hacking
HackingHacking
Hacking
 
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
Hackers
HackersHackers
Hackers
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
 
Hacking
HackingHacking
Hacking
 
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
 

Similar to Cyber hacking dev days by aes team

Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Hacking
HackingHacking
Hacking
NishaPariyar
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
Jayanth Vinay
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
kunalverma12345
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 

Similar to Cyber hacking dev days by aes team (20)

Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
HackingHacking
Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Hacking
HackingHacking
Hacking
 

More from ABIN VARGHESE

Water Pollution
Water PollutionWater Pollution
Water Pollution
ABIN VARGHESE
 
Step count sensor
Step count sensorStep count sensor
Step count sensor
ABIN VARGHESE
 
Technovalley RedHat
Technovalley RedHatTechnovalley RedHat
Technovalley RedHat
ABIN VARGHESE
 
Smart Remote
Smart RemoteSmart Remote
Smart Remote
ABIN VARGHESE
 
Entrepreneurship Development Programme
Entrepreneurship Development ProgrammeEntrepreneurship Development Programme
Entrepreneurship Development Programme
ABIN VARGHESE
 
WiFi Cluster Block Diagram
WiFi Cluster Block DiagramWiFi Cluster Block Diagram
WiFi Cluster Block Diagram
ABIN VARGHESE
 
ATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker systemATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker system
ABIN VARGHESE
 
Autonomous drone project part 1
Autonomous drone project part 1Autonomous drone project part 1
Autonomous drone project part 1
ABIN VARGHESE
 
Intelligent irrigation system
Intelligent irrigation systemIntelligent irrigation system
Intelligent irrigation system
ABIN VARGHESE
 
Research and research methodology
Research and research methodologyResearch and research methodology
Research and research methodologyABIN VARGHESE
 

More from ABIN VARGHESE (10)

Water Pollution
Water PollutionWater Pollution
Water Pollution
 
Step count sensor
Step count sensorStep count sensor
Step count sensor
 
Technovalley RedHat
Technovalley RedHatTechnovalley RedHat
Technovalley RedHat
 
Smart Remote
Smart RemoteSmart Remote
Smart Remote
 
Entrepreneurship Development Programme
Entrepreneurship Development ProgrammeEntrepreneurship Development Programme
Entrepreneurship Development Programme
 
WiFi Cluster Block Diagram
WiFi Cluster Block DiagramWiFi Cluster Block Diagram
WiFi Cluster Block Diagram
 
ATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker systemATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker system
 
Autonomous drone project part 1
Autonomous drone project part 1Autonomous drone project part 1
Autonomous drone project part 1
 
Intelligent irrigation system
Intelligent irrigation systemIntelligent irrigation system
Intelligent irrigation system
 
Research and research methodology
Research and research methodologyResearch and research methodology
Research and research methodology
 

Recently uploaded

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Cyber hacking dev days by aes team

  • 1. CYBER HACKING DEV DAYS Presented by AES Cyber team, Technovalley
  • 2. What is hacking? Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. This is considered illegal since it is like breaking into someone’s house.
  • 3. What are ‘Hackers’? Hackers are people who try to gain unauthorized access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of Hackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer
  • 4. What damage they can do? Hackers can see everything you are doing Can access any file on your disk Damage/Destroy a system Sneak into your social media accounts Can compromise a nation’s security Can access your phone data through WIFI/Apps Steal company secrets, deface your websites, terrorist activities and etc etc etc ........... Can also prevent a attack by thinking like a criminal
  • 5. Hi-Tech ATM Robbery In Thiruvananthapuram http://www.ndtv.com/kerala-news/hi-tech-atm-robbery-in- thiruvananthapuram-many-duped-1441771 http://english.manoramaonline.com/news/just-in/atm-robbery-in- thiruvananthapuram-police-foreigners.html http://www.deccanchronicle.com/nation/crime/090816/hi-tech-atm-robbery- in-thiruvananthapuram.html
  • 6. What are we going to Learn ? Introduction to Ethical Hacking, Ethics, and Legality Defining Ethical Hacking Understanding the Purpose of Ethical Hacking What Do Ethical Hackers Do? Goals Attackers Try to Achieve An Ethical Hacker’s Skill Set Ethical Hacking Terminology The Phases of Ethical Hacking Identifying Types of Hacking Technologies
  • 7. Live Demos Shopping site hacking CCTV hacking System password cracking Private data hacking Fishing Email threatening
  • 8. Minimum Requirement PC with active internet connection for each candidate Minimum internet speed of 1Mbps Confirmation QR code from Technovalley Projector and sound system 30 Seating capacity
  • 9. Benefits for Participent EC-Council accredited Technovalley workshop certificate. Free membership to Technovalley hacker group. 25% discount for the CEH Certification. T-Shirt with EC-Council and Technovalley branding.
  • 10.
  • 11. About AES Cyber team We are the accredited partner of EC-Council EC-Council is affiliated with DOD (Department of Defence) USA, ANSI (American National Standard Institute) USA and also affiliated with many government bodies and organizations.