Activity: Talk or presentation types › Oral presentation
Description
I gave a talk to our security meeting group about an introduction to ethical hacking. I talked briefly about the methodologies that hackers follow to perform their attack. I started by talking about the first step which is "Data Gathering" and I gave examples of some sources that hackers rely on in collecting data about their targets. After that I talked about the second step which is "Scanning" and also give examples for some tools hackers use in this stage. I also did some thing for other steps