Module 1
Module 1
Module 1
Cyber Security
TechHacker Online Course
Ansh Bhawnani
Module 1
Introduction
Ansh Bhawnani
Introduction to
Ethical Hacking
Module 1
1. Information
Security
Module 1
What is Information?
5
What is Information?
6
What is Information Security?
7
What is Information Security?
9
What is Information Security?
▰ Information is everywhere
▰ This is the information age
▰ Information in digital systems makes cyber security
10
What is Information Security Threats?
11
What is Information Security Threats?
Types of Threats
▰ Cyber warfare
▰ Information warfare
▰ Negative impacts of people on Internet (sexual abuse,
cyber stalking, etc.)
▰ IoT security
13
Information Security does not deal with?
14
2. Cyber Security
Module 1
What is Cyber Security?
17
3. Objectives of
Cyber Security
Module 1
Objectives of Cyber Security
19
Objectives of Cyber Security
20
3. The CIA Triad
Module 1
The CIA Triad
22
Confidentiality
Measures:
▰ Data encryption
▰ Authentication (maybe multi-factor)
▰ More sensitive, more physical
23
Integrity
Measures:
▰ Backups
▰ Cryptographic measures (checksums)
▰ Access control
24
Availability
Measures:
▰ Firewalls rules
▰ Patch management and disaster recovery
▰ Load balancers
25
4. What is Hacking?
Module 1
What is Hacking?
31
“ “Hacking has evolved from
teenage mischief into a billion-
dollar growth business.”
32
WHO IS A HACKER?
33
“ The quieter you become, the
more you are able to hear.
34
TYPES OF HACKERS
35
1
WHITE HAT HACKERS
Security Professionals, hack with
permissions
36
White Hat Hacker
37
White Hat Hacker
38
White Hat Hacker
39
White Hat Hacker
40
2
BLACK HAT HACKERS
Criminals, highly destructive, penetrate
to destroy and cause damage
41
Black Hat Hacker
43
3
GREY HAT HACKERS
Don’t have permissions, but no
malicious intent
44
Grey Hat Hacker
No image to show!
46
5. What is Ethical
Hacking?
Module 1
Ethical Hacking
▰ Search for any weak points that could be exploited by malicious hackers
49
WHO IS AN ETHICAL HACKER?
50
WHO IS A ETHICAL HACKER?
▰ Security Professional
▰ Tests the security and identifies loopholes
▰ Creates reports and analysis
▰ Authorized with proper permissions
▰ Earns money and respect
51
6. Information
Warfare
Module 1
Information Warfare
55
7. Need for Ethical
Hackers
Module 1
Need for Ethical Hackers
Module 1
CAREERS IN HACKING?
60
1,000,000
Ethical Hackers would be needed by 2020 in India
61
5,80,000
Average Salary
2,50,000
For a beginner/Fresher
20,00,000+
For a professional
62
150,000$
Average Salary
80,000$
For a beginner/Fresher
250,000$
For a professional
63
PROFESSIONAL CERTIFICATIONS
64
TO BECOME AN ETHICAL HACKER?
▰ Security
▻ Certified Ethical Hacker (CEH)
▻ Offensive Security Certified Professional (OSCP)
▻ CompTIA Security+, Pentest+
▻ GIAC Penetration Tester(GPEN)
▻ Certified Information Systems Security Professional
(CISSP)
65
TO BECOME AN ETHICAL HACKER?
▰ Networking
▻ Cisco Certified Network Associate (CCNA)
▻ CompTIA Network+
▻ Cisco Certified Network Professional (CCNP)
▻ Cisco Certified Internetwork Expert (CCIE)
▻ AWS Certified Solutions Architect
66
CAREERS IN ETHICAL HACKING
67
IS HACKING ILLEGAL?
68
IS HACKING ILLEGAL?
▰ Not always
▰ Ethical Hacking is completely LEGAL
▰ There is a huge need for ethical hackers
▰ Hack systems, earn money
69
“ To become a hacker, you need to
think like one.
70
Course Overview
Module 1
What will you learn?
▰ Module 9: Malwares
▰ Module 10: Sniffing
▰ Module 11: Social Engineering
▰ Module 12: Denial of Service
▰ Module 13: Session Hijacking
▰ Module 14: Hacking Web Servers
▰ Module 15: Hacking Web Applications
73
What will you learn?
▰ PATIENCE!!
76
General
Terminologies
Module 1
GENERAL TERMINOLOGIES
78
79
GENERAL TERMINOLOGIES
80
GENERAL TERMINOLOGIES
81
GENERAL TERMINOLOGIES
84
TO BECOME AN ETHICAL HACKER?
▰ Programming is important!
▰ Have a Hacker’s mindset
▰ Be verbose, but don’t talk much
▰ Logical thinking
▰ Don’t learn it all, but know it all
85
TO BECOME AN ETHICAL HACKER?
▰ Programming:
▻ Reverse Engineering- Assembly, C, C++
▻ Script Writing- Python, Ruby, Perl
▻ Web App Testing- JavaScript, PHP, SQL, JSP, Python
▻ Shell Scripting- Bash
87
TO BECOME AN ETHICAL HACKER?
▰ OWASP Top 10
▰ GitHub
▰ Bug Bounty Programs
▰ Hacking Forums
▰ Stack
▰ Soft Skills
▰ PRACTICE, PRACTICE AND PRACTICE 88
HACKING
Is an art, practised through a creative mind.
89
THANKS!
Any questions?
90