An introduction to Ethical Hacking

Activity: Talk or presentation typesOral presentation

Description

I gave a talk to our security meeting group about an introduction to ethical hacking. I talked briefly about the methodologies that hackers follow to perform their attack. I started by talking about the first step which is "Data Gathering" and I gave examples of some sources that hackers rely on in collecting data about their targets. After that I talked about the second step which is "Scanning" and also give examples for some tools hackers use in this stage. I also did some thing for other steps
Period8 Jul 2020
Held atComputer And Information Sciences