Translate

INTRODUCTION

In this Introduction we explain about
  1. Who is a Hacker?
  2. What are the types of Hackers?
  3. Who is an Ethical Hacker?
  4. How to be an Ethical Hacker?
  5. What do we learn in Ethical Hacking?
  6. What is the difference between Hacking and Ethical Hacking?


Who is a Hacker?

              Hacker is described as a Clever Programmer. Hacking is the act of finding a clever solution to a programming problem. A person who learns or understands programming languages or programs quickly. A person who is an expert in a specific programming language.
              Hackers are intelligent individuals with excellent computer skills, with the ability to create and explore into the computers software and hardware. For some hackers, hacking is a hobby to see how many computers or networks they can compromise. Their intention can either be to gain knowledge or to poke around to do illegal things. Some do hacking with malicious intent behind their escapades, like steeling business data, credit card information, social security numbers, email passwords, etc.


What are the types of Hackers?

There are 8 different  types of hackers, they are:
  • Black Hats
Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers.
  • White Hats
Individuals professing hackers skills and using them for defensive purposes and are also known as Security Analysts.
  • Gray Hats
Individuals who work both offensively and defensively at various times depending upon the situation.
  • Suicide Hackers
Individuals who aim to bring down critical infrastructure for a cause and are not worried about facing jail terms or any kind of punishment.
  • Script Kiddies
An unskilled hacker who compromises system by running scripts, tools, and software developed by real hackers.
  • Spy Hackers
Individuals employed by the organization to penetrate and gain trade secrets of the competitor.
  • Cyber Terrorists
Individuals with wide range of skills, motivated by religious or political beliefs to create fear by large scale disruption of computer networks.
  • State Sponsored Hackers
Individuals employed by the government to penetrate and gain top-secret information and to damage information systems of other governments.


Who is an Ethical Hacker?

            An ethical hacker is the one who have certification like CEH (Certified Ethical Hacker).
Individuals who secures the system or a network, who have legal responsibilities in hacking.


How to be an Ethical Hacker?

To become an ethical hacker one should have to be certified. To be certified he should have certification exam (CEH Exam) conducted by E-Commerce Consultants. (EC-Council).

CEHv8 Exam Information
Exam title:Certified Ethical Hacker v8 (ANSI)
Exam Code: 312-50-ANSI (IBT)
                     312-50v8 (VUE)
                     350CEHv8 (APTC)
Number of Questions: 125
Duration: 4 Hours
Availability: Prometric Prime/ Prometric APTC/ VUE
Passing Score: 70% (88 of 125)
This is a difficult exam and requires extensive knowledge of CEH core modules.


What do we learn in Ethical Hacking?

CEHv8 Course outline
  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Trojans and Backdoors
  7. Viruses and Worms
  8. Sniffing
  9. Social Engineering
  10. Denail of Service
  11. Session Hijacking
  12. Hacking Webservers
  13. Hacking Web Applications
  14. SQL Injection
  15. Hacking Wireless Networks
  16. Hacking Mobile Platforms
  17. Evading IDS, Firewalls and Honeypots
  18. Buffer Overflows
  19. Cryptography
  20. Penetration Testing
CEH is not Network Security, Security Analysis or Security Testing.
This is Completely a Network Offensive Training Program.
In the Network Security you will learn Defense, Cisco Security, IDS, Logs, Network , Antivirus, Hardware, Troubleshooting, Availability, Server/Client Security, Creating policies, Network Management etc.
In the Ethical Hacking you will learn Denail of service, Trojans, Worms, Viruses, Social Engineering, Password Cracking, Session Hijacking, System Failure, Spam, Phishing, Identity theft, Wardriving, Warchalking, Bluejacking, Lock Picking, Buffer Overflow, System hacking, Sniffing, SQL Injection etc.....

Note: THE CEH TRAINING PROGRAM TEACHES YOU 100% NETWORK OFFENSIVE TRAINING AND NOT DEFENSIVE.


What is the difference between Hacking and Ethical Hacking?
Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources.
It involves modifying system or application features to achieve goal outside of the creator's original purpose.

Ethical Hacking involves the use of hacking tools, tricks, and techniques to identify vulnerabilities so as to ensure system security.
It focuses on simulating techniques used by attackers to verify the existence  of exploitable vulnerabilities in the system security.

1 comment:

  1. Very informative post. Ethicak hackers are in demands these days and their demands will not decrease in coming year also. This is the best career choice for aspirants. You may learn how to hack and prevent from security threats with ethical hacking training.

    ReplyDelete