Ethical Hacking training

With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, on-line banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There are many ways to protect those information systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the "Ethical Hacking" as a course in Tertiary education has become an interesting argument.

With the present poor security on the Internet, Ethical Hacking may be the most effective way to fill security holes and prevent intrusions.
Therefore, it is inappropriate to teach Ethical Hacking as a course in Tertiary education.

To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes called a white hat.

        Features of Ethical Hacking:-

1.Footprinting.

2.Scanning.

3.Enumeration.

4.System Hacking.

5.Blocking trojans and Backdoors.

6.Blocking viruses and Worms.

7.Sniffers

8.Social Engineering.

9.Phishing.

10.Denial-of-Service.

11.Session Hijacking.

12.Hacking Web Servers.

13.Web Application Vulnerabilities.

14.Web-Based Password Cracking Techniques

15.SQL Injection.

16.Hacking Wireless Networks.

17.Physical Security.

18.Linux Hacking.

19.Evading IDS, Firewalls and Detecting Honey Pots.

20.Buffer Overflows.

21.Cryptography.

         Career in Ethical Hacking:

There is a great demand in the field of Ethical Hacking.According to NASSCOM there would be a shortfall of 35,000 to 45,000 cyber security professionals in India.Hacking has been taken up a profession by many people so the demand for the ethical hacking has went up. Currently most of the MNC and other companies hire ethical hackers to protect their data or search for vulanarebilities and to report the same in order to protect confidential information.

The salary depends upon the interest & efficiency of the Hacker.So one can earn a good salary if He has enough experience in his field.

0 comments:

Post a Comment