ceh training in mumbai

Enumeration

What is Enumeration?

Enumeration is the process of extracting user names, machine names, network resources, shares, and services from a system or network. In the enumeration phase, the attacker creates active connections with system and performs directed queries to gain more information about the target. The attackers use the information collected by means of enumeration to identify the vulnerabilities or weak points in the system security, which helps them exploit the target system. It allows the attacker to …

What is Enumeration? Read More »

Defense-in-depth

What is Defense in Depth? & How Defense in depth Works

Defense in depth may be a security strategy during which security professionals use many protection layers throughout associate information system. This strategy uses the military principle that it’s more difficult for associate enemy to defeat a fancy. Multi-layered defense system than to penetrate one barrier. Defense-in-depth helps to stop direct attacks against associate information system. It’s knowledge as a result of a possibility in one layer only leads the offender to successive layer. If a …

What is Defense in Depth? & How Defense in depth Works Read More »

5-Phases-of-Hacking

5 Phases of Hacking

This article explains 5 steps of Hacking phases taking an example of a Hacker trying to hack… for example Reconnaissance, Scanning, Gaining Access, Maintaining Access, Fearing Tracks…  There are five Hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks Hacking Phase 1: Reconnaissance Reconnaissance refers to the preparatory phase in which an attacker gathers as much information as possible about the target prior to launching the attack. In this phase, the attacker draws on …

5 Phases of Hacking Read More »

Ethical-hacking

What is Ethical Hacking? & Types of Hacking

Ethical hacking is the practice of employing computer and network skills in order to assist organizations in testing their network security Ethical hacking for possible loopholes and vulnerabilities. White Hats are the individuals or experts who perform ethical hacking. Nowadays, most organizations are hiring White Hats to assist them in enhancing their cyber security. They perform hacking in ethical ways, with the permission of the network/system owner and without the intention to cause harm. Ethical …

What is Ethical Hacking? & Types of Hacking Read More »

concept-of-security-cyber-space-cyber-crime

Concept of Security, Cyber Space & Cyber Crime

Concept of Security Cyber Space & Cyber Crime in this Cyber crime refers to the series of social group attacking each cyber space and cyber crime security. Cyber crime refers to criminal activity done exploitation computers and also the net. It conjointly involves criminal access (unauthorized access, transmissions of pc knowledge, to, from or at intervals a computing system . Understanding Security as a process Security is a process, not an end state. Security is the …

Concept of Security, Cyber Space & Cyber Crime Read More »