Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Chapters24
Introduces the need for skilled ethical hackers and presents the CH V13 course and its practical hands-on focus.
A practical, hands-on tour of ethical hacking fundamentals (CH v13) with real tools like Metasploit, Nessus, and OpenVAS, plus live lab demos showing how attackers think and defenders respond.
Summary
Simplilearn’s Ethical Hacking Full Course 2026, hosted by Sudep, walks beginners from core concepts to advanced lab skills. The video emphasizes that ethical hackers operate with permission to uncover weaknesses, patch them, and safeguard organizations. It blends theory (CIA triad, OSI model, NIST framework) with brisk, real-world demos: OS fingerprinting with Nmap, port and vulnerability scanning via Nessus/OpenVAS, and practical usage of Metasploit for gaining and maintaining access. Sudep also covers reconnaissance (active vs. passive), SOS of common attack surfaces (SNMP, LDAP, SMB), and the importance of secure coding, patch management, and compliance standards (PCI DSS, ISO 27001). Along the way, he highlights the value of hands-on labs in iLabs (CH v13) and explains exam paths (knowledge-based vs. practical) offered by EC Council. The session closes with a deep dive into password cracking, credential theft, social engineering pitfalls, and how defenders can mitigate zero-days and insider threats. Overall, the course positions CH v13 as a practical entry point into cyber security, with a clear emphasis on 70% hands-on labs and 30% theory, plus a broad toolkit for real-world defense.
Key Takeaways
- CH v13 (Certified Ethical Hacker version 13) is the current EC Council track released in 2024 with 20 modules and AI-based lab tools.
- Labs mix 70% practical work (hands-on) and 30% theory to build real-world hacking and defense skills.
- Key modules cover OSI/TCP/IP layers, CIA triad, reconnaissance, network scanning, web/app security (SQLi, XSS, CSRF), wireless attacks, social engineering, cloud/DoS defense, and incident response.
- Common lab tools demonstrated include Nmap/Zenmap for port scanning, Nessus/OpenVAS for vulnerability assessment, Metasploit for exploitation and post-exploitation, and OpenVAS as an alternative scanner.
- Core concepts such as passive vs. active reconnaissance, IP/MAC spoofing, and the importance of patch management (CVE/NIST/NVD) are emphasized for real-world defense.
- The course connects theory to practice by showing how vulnerabilities are discovered, analyzed (CVE/CVSS, CPE), and prioritized for remediation and compliance audits.
- Ethical hacking is framed as a governance discipline: use of penetration testing to strengthen security, not to cause damage, with emphasis on reporting, remediation, and risk acceptance/avoidance strategies.
Who Is This For?
Essential viewing for aspiring penetration testers, security analysts, and anyone considering EC Council CH certification. It provides a concrete roadmap from foundational concepts to hands-on lab workflows and real-world defense strategies.
Notable Quotes
"Certified ethical hackers hack systems legally to identify weakness and patch them before even the bad actors can exploit them."
—Opening definition of ethical hacking and the role of the CEH in defending networks.
"The CH V13 pattern keeps getting updated with recent technologies and even AI-based tools to help security professionals."
—Discussion of CH version updates and AI integration.
"Phase one and phase two focus on foundational topics; phase three and four cover advanced topics but foundations help everything."
—Curriculum structure explanation.
"The main focus is 70% practicals and 30% theory, with hands-on labs that simulate real-world scenarios."
—Lab-time split and learning approach.
"In vulnerability management, CVE IDs, CVSS scores, and NIST/NVD benchmarks guide risk prioritization and remediation."
—Vulnerability assessment framework discussion.
Questions This Video Answers
- How does EC Council CH version 13 differ from earlier CH versions?
- What are the best practices for conducting a practical ethical hacking lab safely?
- What tools are essential for a beginner in a CH v13 course (Nmap, Nessus, OpenVAS, Metasploit)?
- What is the difference between vulnerability scanning and penetration testing in practice?
- How do CVE IDs and CVSS scores influence remediation priorities in a security program?
Ethical HackingCH v13EC CouncilPenetration TestingNessusOpenVASMetasploitNmapReconnaissanceVulnerability Assessment (Vulnerability Management)
Full Transcript
Demand for skilled cyber security professionals is higher than ever before. And this is where certified ethical hackers which is C steps in. Trained expert who fight cyber crime from inside. They hack systems legally to identify weakness and patch them before even the bad actors can exploit them. Welcome to the certified ethical hacker course. I am thrilled to guide you through this exciting hands-on journey into the world of ethical hacking. Whether you're starting from scratch or looking to refine your cyber security skills, this course will equip you with all the tools and techniques to become a skilled ethical hacker and help safeguard organizations from cyber security threats.
First, we'll kick off with the introduction to ethical hacking and explore the role of certified ethical hackers in protecting systems and networks from malicious attacks. Next, we'll cover the ethical hacking life cycle and the methodology used by ethical hackers to conduct penetration testing and vulnerabilities assessments. We'll then dive into network scanning and enumeration, teaching you how to gather valuable data about targets without leaving a trace. We'll get hands on with system hacking techniques, learning how to test for weaknesses and exploit vulnerabilities in different operating systems. We'll also explore the fascinating world of malware and how ethical hackers analyze and mitigate its impact.
Then we'll get into web application hacking focusing on common vulnerabilities like SQL injections, cross-sight scripting, and also cross-sight request forgery. You'll also learn how to conduct wireless network attacks and the best methods to secure Wi-Fi networks from common intrusions. We'll explore the world of social engineering and how to protect against psychological manipulation techniques used by cyber criminals. Lastly, we'll dive into advanced topics like invading detection, securing cloud infrastructure, and combating denial of service attacks. If you're looking to advance your career in cyber security, check out the certified ethical hacker CV13 course by Simply Learn. You'll learn how to think like a hacker and use AIdriven tools to protect systems from cyber threats.
Gain hands-on experience with over 550 real world attack techniques and work with 4,000 plus security tools in cloud-based apps. This course includes official EC Council study materials and an exam box. Upon completion, you'll receive the certified ethical hacker certificate from EC Council recognized globally in the cyber security industry. Enroll now. Before we get started, here's a quick question for you to answer. Which of the following is not a part of ethical hacking process? Is it reconnaissance, exploitation, remediation or is it social engineering? Let us know your answers in the comment section below. Hello everyone, good evening and welcome for today's session.
I'm Sudep. I'm the learner success manager for today's session. So this is from the EC council. So EC council is one of the renowned certification vendor into the cyber security. There are multiple certifications from EC council and one of them is CH. The full form is certified ethical hacker version 13. So these versions keep getting updated like something I have been around with CH from V8 and today it's V13. So like it will be keep changing every year. It depends upon the curriculum how it is going to be updated. So with the recent technologies getting updated with the recent attacks getting updated the CH certification pattern also keeps getting updated.
So V13 was something which was released in 2024 officially it started and we have been continuing till date uh V13 only. So as you see it says like certified ethical hacker. So this is the program which is which is going to contain like 20 modules. So it's it's especially those who are looking into enter into cyber security who are completely new who are like newb into it not having any kind of knowledge what is cyber security and to learn how the things happen how the the hacking will happen. So all this something which is being covered in this certification the modules are also designed in such a way starting from like module one till end of the day we have module 20.
So like starting from the introduction to ethical hacking to like each module has its own importance and every module is linked and every module is important for our in the process of learning uh security related topic. So from the module number one to module number 20 you can see in between there are some techniques there are some topics which will be specially focused on technology specific like uh system hacking network attacks cloud attacks mobile attacks so wireless attacks IoT attacks so there are something the course is designed in such a way to cover the security aspects in every technology so is as I said yep this is a kind of course one of the most important thing is this program is divided like this program is designed in such a way 70% of practicals and 30% of theory we have so with this the major motive of this certification is to make learners know how the hacking can happen how the systems can be hacked what are the different technologies and their loopholes so like it's a it's a kind of a platform where more into hands-on because there are some certifications like I know in security which are purely some theory based on a topic based but this is completely the hands-on is must like we need that's how the course is designed and that's how the access also is provided to you all the lab access or this the content access we'll go through like um in our upcoming sessions how the things are going to happen and coming to is examination pattern.
So, CH examination pattern is there are two types of exams. Knowledge based exam and practical exam. So, the certification you all are enrolled for with ECON with simply learn is knowledge based exam. So see it's all about the training is same but the way how you are going to test your skills is something it depends upon you either knowledge based or either CH practical based. So but this course which you all are enrolled for uh you will be testing your skills with knowledge based exam. So where you can expect a multiplechoice questions of 125 questions that should be cleared in like 4 hours.
The passing criteria depends upon the examination uh difficulty and examination pattern. It it changes like it's a kind of 70% on average we should be getting clearance to pass this exam. And there is also a practical exam which is like you need to clear 20 practicals in 6 hours. So now this is something like it's a it's all about how you are going to test your uh skills. So, CH practical as well as knowledge based. So, this is something you all are enrolled for. So, once you complete the course like you will be able to uh get this again vouchers where you can apply for the examination and clear the examinations.
So the questions will be like scenario- based questions like even though they are multiplechoice questions like which is a knowledge based exam they are going to even test our practical skills skills that is how the exam is designed. So it even contains some scenario- based questions. It's not like direct questions which is asking you to pick one of the option but it contains some screenshots of outputs or some tool specific questions. So we will see how that questions will be and what kind of questions we get. But yep you all are uh designed for knowledge based exam.
So if you want to additionally prove your skills for practical exam this is this is something extra charges you need to pay for easy council and get the examination done. But um anything is fine like it's all about end of the day are you getting certification or not either CH knowledge based or practical exam. So the cert the main point is you should be able to get get the clearance and you can also see on the screen. So this was completely divided into three important phases like the complete course is designed in three four phases.
Phase one, phase 2, phase three and phase four. Like phase one and phase two are something which we are going to spend a lot of time because these are the modules which completely uh important for our foundational topics of the security and also ethical hacking. The phase one and phase 2. Yep. Phase three and phase four are also an important topics but they are something as this foundations are clear these topics will be easily understandable and how the things are going to work. So as I said it is going to cover from the very basic to advanced.
That's the reason this certification we consider it as an entry point for uh cyber security learners who are trying to choose their career. So where we are going to learn from very basic to intermediate of the topic of what we are going to so I'll share this link with you all. You all can explore. So the main focus is we are also designed this curriculum again and the training part also we will be send spending 70% time on practicals and 30% time on theory. The theory is also something at an initial level to clear some foundations to clear some fundamentals like we'll have some theory in the phase one.
Okay. And uh yeah this is something the kind of job roles today this certification is accepted for like you all can see the different kind of job roles where this so today like in every cyber security job role CH is something considered as a mandatory because as I said that is going to prove that yes this person is having some kind of knowledge in security part. So yep this is about a short intro. So as I said like this is something coming from the EC council. You can see they are not only having CH but also so you can see they have multiple certifications here.
One of them is certified ethical hacker. So they have something penetration testing foreign 6 sock uh incident handler threat intelligence cloud security. These are again multiple but the only one which is yeah so actually CH v13 is something today it has included some AI based tools. So as I said the versions keep changing uh that is purely because of whenever a new technology or a new process or new techniques coming up. Yep. They also keep changing the content. So maybe next year we expect CHV14 maybe in the month of Jan or February it depends like if something new technology new attack new tools that need to be added.
So V13 with we have they have added some AI based tools which are helping today security professionals how can we use the AI based tools and improve our work. So we will see those kind of AI based uh tools but the key things that should be important is that is important is you all should also spend time on hands-on okay you will be getting some knowledge on theory part but end of the day if you want to learn the hacking and if you want to learn the how the process of cyber security is today followed the hands-on is should be must where we will be dealing with some real world scenario scenarios where you'll be getting some it's a it's a lab like I'm I'll give you the lab introduction and everything.
So just go through this links so that you will be getting some additional information related to like what is CH and what exactly you're going to learn. uh the links. Okay, these two now. Okay, this is something a kind of a course like which comes under the technology of uh cyber security. Okay, what is cyber security? Cyber security important today. How cyber security will be in future growth. This like these are the few questions because end of the day like I can also say now one we can also have one more question like why did you choose or the question is like yeah why did you choose the cyber security yep you call can answer anything like first let's start with what is cyber security Okay.
Cyber security. Now if you the word cyber now if you ask me is this something a new technology I can say not really. We do have something called few years back we used to call it as a information security. So the focus was here only to protect data like because every organization used to have very much data related to the organization, business, clients and their project like the focus was only to protect data but today why it is called cyber. The reason is today like how the digitalization has changed our life. We all know like everything like e-commerce, digital learning, like online learning or online healthcare, online banking.
Okay. Like the online everything has been like finance, banking, health sector, education sector. Okay. So all this has been something today, entertainment sector. Okay. something moving move towards the digital platforms. It's not just about the information but today it's something beyond the information. Today we are seeing IoT based cars or IoT devices where completely internet can control the things we are seeing robotics. Today everyone is talking about AI AI but at the same time we are talking about how this can negatively impact okay till now everyone was focusing on like okay let's let's create some technologies let's create some new technology but from now we should also think about the negative shades of technology okay we are like very much today we are seeing how This digitalization has been changed.
Cyber security is not something only for organizations. It's even for our personal life also. We do see people losing some data. We do see people losing money in the online. We do see some kind of today we are seeing uh especially something called digital arrest like where people are being emotionally played and getting some important financial from them. Okay. So the thing is the things has been changed the way how we used to use internet at few years back and the way how we are using internet today has completely changed our lives. Today there are an industrial revolization there are some industries where they are going to run complete plant without zero manpower with the help of some machinery which are connected to IoT.
So the reason I'm saying here is yes today the the word cyber it's something where like whatever the technology you name me there are cyber attacks which there are organizations who belong to health industry have been involved in the hacking there are organizations who belongs to financial industry belong involved in the hacking there are organizations who belongs to entertainment industry were involved in the hacking it's not just a understanding that cyber security is only for IT it's a wrong. Wherever there is a computer doing the job, we need a security professionals. We as a simply learn, we have a security team who is going to take care of our employee security, organization security, server security because we have an employees logging in, students logging in, having an important data, having a transactions going on like everywhere like wherever there is a system doing the job, we need a security professionals.
Yes. In simple Yes. Today it's a kind of a technology where the focus is to prevent organizations from not being hacked or prevent organization data prevent organization assets that's are not being unauthorized access everything should go through with a proper authorization with a proper access controls yes is cyber security is important today yes it's very much important today it's not only just individuals like organization point of you as an individual also it is very much uh important. So the thing the thing is like it's all about there are few attacks we are going to learn in upcoming classes where we don't need any computer where we don't need any tools but still we can perform cyber attack with help of using our human emotions.
Yes, it is uh important today. Like if I just walk you through few things. Now for example uh the recent like if I attack which there are few attacks but one of the attack which made much impact is like uh one of the organizations which comes under the retail and e-commerce like market expenses unfortunately it's involved in a cyber attack where the revenue loss was very high. So they lost an operation. You can this was they complete a large clothing organization. So it belongs to like M and the mark and now if I talk about something like health this is something okay if you see this this is something related to as Delhi like for example sorry I hope you all you all know that this all Indian medical science all Indian institute of medical science like Delhi hit by a cyber attack like unfortunately like it's a kind of a renowned organ hospitality in the country unfortunately they were hacked and complete uh data has been stolen just a minute okay so I hope you all know this as India so unposed this is something health sector.
So previous one was online retail and this one was a health sector. Let me show you one more now. Now this one was like oil and gas industry. So oil and gas industry uh we call it as a colonial pipeline attack. Now in the US this was a a unit which is going to distribute underground gas across the multiple states in the US but unfortunately this entire plant was hacked and uh like it's a it's a it's a kind of a concept where we have seen the first time the oil and gas industry getting impacted by the hackers and imagine they have complete control of this plant.
They can completely increase the pressure of the gas, decrease the pressure of the gas. The they have control of complete distribution in entire country. But like almost 5 days there was an interruption in the gas supply but they have they acted very well and take down the systems within 2 days they have under their control but still it was hacked. And there is one more organization called JBS food factory which is one of the most renowned in the US. Unfortunately even they are involved in the attack. This is a food industry. Okay. Recent for you all are aware like so I hope you all are aware of this boat entertainment systems.
So like who are in India like from India they especially know the boat entertainment systems they have this uh headset some hand wares unfortunately they were hacked and 75 lakhs bought customers for sale at €2 contact ID email ID credit card details information yeah so The the thing is now after looking into these many different organizations these many different cyber attacks like what do you think is a security something important or not an important so yep so this is something we'll the four layers physical layer data link layer network layer and the transport layer so we will see next the fifth layer we have something called session layer.
So have you seen these words? Something called uh session expire or session timeout. Have you seen these kind of words session expire or session timeout? Yeah, especially in some of the confidential servers or like important servers especially the payment gateways. Okay. So that is something where uh we will see sometimes the session expire or we will be given uh restricted act like limited access to the sessions. Okay. So session expire and session timeout. You have seen this is going to purely happen because of some specified time has been set to each and every session that we are trying to access.
Especially we see on payment gateways like you'll be given 180 seconds or sometimes if you not properly log in uh the session timeout things see today like okay we have the details like data MAC address IP address TCP UDP this session layer from now the remaining three layers session layer presentation layer application layer now these are the three layers which are going to especially focus on how they are going to be making users to connect or users to understand and receive the end user how they are going to receive the session layer. The major motive of session layer is to to establish, maintain and terminate.
These are the three actions which are going to happen with help of the session layer. it's going to establish, it's going to maintain and it's going to terminate the session. So today if a two systems are able to communicate each other or if two systems are able to like in communication to each other and it's a expire or terminate the session. This completely happens with help of the session layer. These are the three major uh responsibilities that happens in the uh session layer which we have. So today like you it acts like a bridge between the two devices bridge between two devices.
It acts like a bridge between two. So it's extension okay establish maintain and terminate and acts like a bridge between two devices. So coming to the in this we don't have any specification for the data type. I mean only till the starting four layers like bits, frames, packets and segments and messages. These are the only starting four layers we have the different formats of data. So coming to the session layer here onwards like we call it as a message only. So it's responsible for making two devices connected and communicate and sync each other with the details which we have provided like TCP, UDP, IP address, MAC address and it next layer we have presentation layer.
Now presentation layer is something which is responsible for three important things. data translation or data compression data encryption. So three things data translation, compression and encryption. So these are the three important things which happens in the presentation layer. So what is this data translation is? See we have zeros and ones the data is in the present in the form of bits. So this will be converted into the human readable human readable format. So this happens with help of data translation. The 0 1 0 1 01 it converts into human readable format. So today in the first layer whatever the data we are converting it converts into bits but when it is reaching to the user like either audio, video, image, PDF, document, PPT or any program files everything the data translation is something going to take care of the zeros and ones are binary is converted into the human readable format that is something where the presentation layer will take the name itself says presentation.
So this is going to present the data which is available in the various formats. So data translation is something which happens in the presentation layer. Data compression. Now today uh you all are using the WhatsApp. Okay. Like see by default WhatsApp is going to compress the images. Now for example when you are sharing some images which you have uh taken on the internet okay so they reduce the quality for example if you are sending 10 MB of photo it will be converted into 4 MB like they will reduce the size even when you're trying to upload something to the Google drive or Google photos also you will get an option like either HD or the reduce the size see most of the applications will follow this data compression because they don't want to store data as it is.
So the data compression is nothing but here this is a place where it is going to do reduce the size reduce the size of the files or reduce the size of data like it may be whatever in so data compression data translation and data encryption this is something data security so it's like the data encryption is a concept we'll talk about this more the Only users like send receiver and sender can read the data in between no one can understand because there are some attacks where we can steal the information like what two people are communicating to each other and discussing to each other.
So data translation, data compression and data encryption all these three are going to uh happen in this thing. So remember this these three things happens in the presentation layer. The name itself says presentation. So encryption, compression and translation. And like you can see so three things. Okay. The last one we have application layer number seven. Application layer. Now in application layer now this is something where today like the end user is able to access something. For example, see Netflix is having lot of video content with them but end of the day we need application to access those videos.
Zoom might have a service to provide online call, video call, screen sharing but end of the day we need Zoom application. We have a internet to access the different browsers but we need today an application called Chrome like so end of the day this application layer is something which is like which is something where it is going to fulfill the receiver needs. So this is something whatever the services we provided as an organization now a human can access. Okay. Now for example simps that is an application. So like the zoom app which you are using the Netflix is an application the Gmail is an application.
Okay. And WhatsApp is an application. So these all are whatever the resources which are running by the organization we use the with the help of applications only you'll be able to access. See today we have different type different types of services like email related apps okay file transfer related files like share it or streaming apps okay like streaming apps especially the OTT platforms see all of them today whatever the data you provide in order to access them we need this applications so it acts like an interface between a user and the organization data whatever they have.
So overall these are the seven layers which we have today in the OSAL layers to understand in each layer what is going to happen and how the data is being present. So if I just if I I'll give just 2 minutes of time everyone of you go through this screen which is available here just have a read of like it's a oneline explanation for each and every layer what we have discussed so Yep. This is a pictorial representation of what we have learned. Like you can see in physical layer we have cables. In data link layer we have MAC address.
In network layer we have routers. In transport layer we have people running here and there. In session layer we have bridge. Okay. In presentation layer uh we are having the cupboard which is an indication of data encryption. Uh this is a like it's a it's an indication of cardboard like data compression. Okay. And on the top we have an application layer and it indicates the Google as an application. So this is a pictorial representation of what we have learned till now. Okay. So this is something in a quick uh understanding of what we have in the seven layers what is going to happen.
So we have seven layers in the left hand side. See there is nothing changed all all what we have discussed TCP UDP three-way handshake everything we have but if you see in the right hand side they have converted these seven layers into four layers. So physical and data link layer we are calling it as a network access. Network layer we are calling it as a internet layer. Transport layer we are calling it as a host to host layer. application presentation and session we are calling it as an application layer. Okay. So whatever we have discussed in terms of seven layers they all have been converted into the four layers but it all remains same three-way handshake the encryption session management everything is available here okay so OSI model and department of defense model so this is something called DOD so you can see here there is no we call it as a department of business.
So that is something we have that should be remembered as a part of uh this model DOD model or TCP IP model. So now if we talk about the IP address, so it is called as the internet protocol address and it is provided by ISP and it is IP address is available in the network layer and we have today two versions of IP address that is IP V4 and IP IP V6. So we will learn about these two things. What is IP V4 and how it is represented? What are the things we have? So IP V4.
Okay. So this is the example is it's completely it's a numeric. Okay. Like if we talk about it's a numeric. So IPv4 it's a 32bit address. So what is this 32-bit address is it is nothing but in the background we will convert this number into zero sign ones and it is going to occupy completely 32 digits. So 32-bit address we call it as IPv4 and it is completely numeric. It's something not infinity. It's finite. Like it's between 0 to 255. See the last number of IP address can be only 255. Like it cannot be greater than 255.
In each position of this four, we will have only up to 255 is the final number. Okay. Then we have uh something called like it is capable of connecting four billion devices. Okay. 4 billion devices. And it is it is having four octets. They are they are differentiated by dot. Okay. Four octets. They're differentiated by dot. And IPv4 is having five classes. like it is divided into five classes. Class A, B, C, D and E. Okay. And IPv4 has no inbuilt security. Okay. No inbuilt security. IP V4 is having when it comes to the IPv6.
Now let me know one thing in past few years the internet connected devices the usage of internet has increased or decreased. So can we say like uh even number of devices has been increased when you compare in last 3 years like for example like 10 years back in the home we have only like one or two devices which are connected to internet but today like it's more than I can say easily 10 like smart TVs smart ACs smart mobile smart watch laptops personal mobile phones like all these are capable of connecting to internet communication. So what is the main motive is today we have this IPv6 address in order to meet the demand as IPv4 is capable of connecting something around 4 billion devices.
It's not it's a finite number like this today IPv6 we have especially to meet the demand like it is 128 bit address what is this 128 bit address it is nothing but in the background it is represented in the form of 128 zeros and ones so everything will be converted into zeros and ones and this is alpha numeric like it is containing a tof and 0 to 9 then it is capable of connecting uh 340 plus some uni dicilian elician devices. It's a very big number and it contains total eight octets and it is differentiated by this and there are no classes in IPv6 and it has inbuilt security like with help of this feature some attacks can be stopped.
Inbuilt security we call it as an IP sec. So no classes inbuilt security 8 octates 340 plus delician devices alpha numeric 128 bit address and this is something when it comes to the classes now IPv4 is something we have five classes in IPv6 we don't have the classes so what exactly these classes are and what is this classes meant for see when this IP address has been evolved like when they started using the IP address. It has been divided into something five classes. You can see on the screen like they want to differentiate in such a way like the large networks will have some kind of IP address.
Okay. like small networks will have one kind of IP address or the like as research purpose they will have one kind of IP address. So it is like it is designed in such a way based on the requirement the IP address uh should be taken like you can see on screen some large corporate networks will have one kind of okay so how can we identify the classes so like how can we identify these classes and what are the classes we have see in order to identify the as only the starting number is going to be taken into consideration.
Like for example, class A anything which starts within 1 to 126 only the starting number remember example here only the starting digit is responsible for identification or classification of IP address. So as you see here like in between 1 to 1 106 is something stands between 1 to 126. Okay. So that is something we say as a class here. We are not worried about remaining numbers especially in order to identify the class. Then we have something class B 128 to 191 and like example if you take an example like 146. So if you see only the starting number so in 146 is in between 128 to 191.
So this is something maximum. A class C we have 192 to 223 and example we have this one 212 is only in between this range. Then we have class D 224 to 239 and example if I take 232. So 232 is a number which is in between this range then class E finally 24 to 255. example 2 51. Okay. So this is the number in between. So if you remember only the starting number is going to be consideration in order to identify which class it is. See these all are divided by something called Ayana who is responsible for providing all this uh internet number ascending authority.
we call it as so like they are responsible for all these uh categorization of the classes. So as I said only the starting number is considered to identify which class they belongs to. Okay. Now a quick question for everyone. This IP address belongs to which class? So this is actually an invalid IP address. It does not fall under any class invalid IP address. So this is how the questions will be guys in the examination. So everything looks like you know but the moment you see the options it will become bad. I clearly said IP address cannot be greater than 255.
But what is the IP address count here? 272. So this is how the questions will be going forward also. They test all the practical scenarios and the clear observations on the commands and the output. So this is how the questions may look like easy but small tricky things will be applied. So this is invalid IP address because this IP. So I see there were lot of questions between 127 and everything. 127 is something does not fall under any category. 127 we call it as a loop back IP address. Okay let's say now it's it's called as a loop back IP or it's called as a local host.
It's called as a default IP address, loop back IP address, local host IP address or default. See what is this 127. Now see 127 IP address is something which is given for every system. Now for example when you buy a laptop there are some applications which need to be which will be only working when they have an IP address. Now when you when you are buying a new laptop maybe that that will not have an internet connection or maybe you are in a place where where your laptop is not able to connect to any internet.
There are some apps which needs an IP address to run. So what happens every system is by default assigned with this loop back IP address series called this 127.0.0.1. This complete 127 series we call it as loop back or local host or a default IP which is given for each and every system. Now suppose see Google Chrome will only work with IP but when I am not connected to Wi-Fi when I am not connected to Ethernet I may not get IP address. So at that point of time this is going to uh help us in order to identify in order to get some dummy IP address 127 like loop back IP local host we call it as a default IP.
Okay. So in IPv6 nothing like that. This is something we have in IPv4 loop back IP. Okay. So this is something regarding the uh IP address. Okay, IPv4 and IPv6 something you must remember all this they are going to really helpful in our like practicals when we are selecting the target scanning the targets attacking the machines we keep running around them. Okay. So I hope it is clear between what is IP v4 and what is IPv6. The key differences between the both. Now let's discuss about network ports. So let me show you something before I discuss network ports.
Like how many of you used these ports which you are seeing on the screen. So are you seeing nowadays these ports? These many ports we are seeing for a system. These all are like hardware based ports like to connect to mouse to connect to keyboard to connect to external screen to connect to USB, audio, video jack. Are we using same ports nowadays? The reason is something like I can say today yes today also we are using more than these many services. Today we are having audio sharing, video sharing, screen sharing as an additional services, some wireless file sharings we have.
So I mean to say at one point of time we have this hardware ports to do the job. Hardware ports which helps for external connections cables we also call it as an hardware ports or physical ports like where you connect with help of the cables. But coming to the something we have here logical ports which are we are having 65,535 ports logical ports we have that is nothing but,024 well-known ports we have,24 uh well-known ports we have see today like when I say well-known ports like yeah, 24 range is in between 0 to 1023. Okay.
0 to 1023 well known ports. Okay. So today we are connecting like we are doing online file sharing. Okay. We are doing email activity. Okay. We are doing right now screen sharing like audio sharing, video sharing. Okay. So there are like for example port 80 uh port 443 like today you all are aware something called HTTP HTTPS correct? Yeah. So HTTP and HTTPS we have. So for for your human understanding we use HTTP as a protocol name but in the background every protocol is going to have a port number. HTTP is something which runs under port 80.
HTTP is something which runs under 443. We have something called FTP which is nothing but file transfer protocol. Today this file sharing activity like for example if you has used share it a drop mid drop all this use something called FTP port 21. So this we can't see with our eyes but every system is going to have this 65,535 ports. Out of that well-known ports are,024 which are useful for at least well-known or most used services. something called SMTP which is nothing but simple mail transfer protocol like 25 is useful for your Gmail services or Outlook services Yahoo all this comes under the SMTP simple mail transfer protocol yeah so like this we have like multiple ports we'll keep learning so especially if you go to the internet and if you type most hackable ports very important is ports acts like an entry point to hack the systems.
The greater the number of ports open the greater the possibility of being hacked. These all port numbers you must remember the one which are showing on the screen like uh port 21, port 22, port 23, port 25, port 53, like port 69 or what these ports stands for? Because these like the moment these ports are open, we will learn something port scanning and identifying the open ports. These ports will represent like what kind of services are running on the system. So the greater the number of ports open the greater the possibility of being hacked. 21 22 23 25 53 69 at least something you need to remember which is being on the screen.
We'll keep learning these ports as they come in. So, but out of whatever we have out for example like if you go to the Google and type ports used by zoom if you type this you'll come to know which port numbers the zoom is going to use. Zoom is using TCP 8443 and 8018 8,8001 8,8002 and it uses UDP ports 3 478 3479 and 8,8001 to 8,000. So like zoom like this every system now for example ports used by PUBG it's a game like it is going to show you what are the ports that are being used by this game.
So every application will use ports depending upon the services it provide whether it is providing screen sharing, audio sharing, video sharing or email or data transfer or it is giving just a resource to share. So these ports are acting today to represent the services which you use which we used to do with help of cables and hardware. So as I said every port has its own uh importance. So if you see here, if you see here, same thing at least these ports uh you should remember the ports uh which are available on screen like for example RDP port we have the389 port uh SSH remote activity 22 uh we have something called Tnet which is for 21.
So at least these sports sorry 23 these sports you need to remember before we get into the upcoming classes. Okay. So yep this is something related to the network ports. Now this is something we need in the networking. We expect this much uh in order to learn security or in order to learn ethical hacking at least whenever something comes as per the topic we'll discuss in network security or networking related attacks. But yep we started with the networking concepts like all the seven layers each layer what it is famous for. I I clearly said every layer has an attacks with the kind of activities it does.
We have attacks which can be performed on network layer, the physical layer, data link layer, every layer can be hacked like we have something model as I said and also IP address we discussed about it and port numbers like IPv4, IPv6 and ports. Next we will start with M1 introduction to ethical hacking. So we will discuss something over here like introduction to ethical hacking concept. So something related to so as I said the module number one and module number zero like which we discuss on networking they hold some networking like theory concepts like especially the fundamentals of cyber security are covered in this uh module number one uh introduction to ethical hacking.
Okay. So the main outcome of this module will be some of the key uh principles of security, the difference between ethical hacking and hacking, the components of security like then what security principles we can say the organization is strong and something related to the uh vulnerability zero day complaints part. Yep. something we will discuss here. The first thing we are going to start our discussion is something called CIA triad. So any certification the major part or something which we need to discuss is CIA triad. Okay. So like this is something which is going to help us in in multiple ways like this is going to help in evaluating the uh security.
So of just any attack also. So yeah CI triad the like whatever the certification we start the first thing something we discuss is the uh CIA triad. So as you see on the screen it's in the the triangle shape. So C stands for confidentiality, integrity and availability. Especially today if an organization wants to start a security or if an organization was involved in any cyber attack, first thing is the CIA is going to help us to evaluate confidentiality, integrity and availability. So first if we have this clear understanding we can it is going to help us in two things.
One it will help you to understand what are the what are the standards right now organization is maintaining and also if there is any compromise happen uh also how how can we evaluate what is the impact. Okay. So in general now in general question what do you think confidentiality means? So confidentiality means only like authorized people or authorized users should have access to the data like uh for example like who are belonging to the organization like only clients should have access to the data only known users should have access to the data. The confidentiality means only authorized users should have access to the it's not like everyone can access only.
Now for example you all enrolled with simply learn only the enrolled people will have access to the iabs and aspin accounts. So it's depending upon the job role or depending upon the user the access should be given. It's not like everyone can access without proper permissions and without proper authorization. That's very bad. So whatever the data we have now see for example I am working as a trainer. Now I will have only the trainer access like maybe related to the content maybe related to the the labs and but I am not going to have access to the financial information of your students or personal information of the students or the information related to organization budget.
No according to the role you will you will be given access. So if I'm working with an Amazon as a security engineer, I will be having access to only the information that I should get access as per security engineer. I will have nowhere access to see what c what what uh the customers are buying, what are the items they're getting ordered, what are the items they're getting refund. That is not my job role. uh over here uh as a part of confidentiality. The authorized people should have access to the data. It's not like everyone can get access.
That's something wrong. So information should be only given access after proper approvals. So coming to the integrity, integrity means only authorized people can modify the data, make changes to the data. Okay? So like if you see modify, edit, tamper, now these kind of things will come under the integrity. Now see for example I we you I have no access to give you like no provision to give you all access theaps. It is something only our administrator users have access to modify or make changes towards your data. So in every organization we will have a specified team a group of admins or a group of employees who are authorized to make some changes and modify.
So it's not like now see when you are doing some research regarding a person okay you are doing researching research regarding a person now you got an information from the Facebook and you also got an information from passport okay you have two types of information one the information is from Facebook and one more the information is from passport which one do you think is more valid Or which one do you which one you will give importance the passport data you will give importance or the Facebook data you'll give importance. So passport data you'll give more because the reason is passport data you can change after proper validation.
Now Facebook is something you can directly login and you can even modify but when it comes to the passport the data can only be changed after proper validation. Now see it's something you need to take a proper proof and proper validation then only the data can be changed but when it comes to the Facebook you can directly login and you can change no one is going to validate. So integrity means only authorized people should change the data. Now if no anyone can change anyone's profile then there will be no meaning for that. So like even in simply learn only the admins are responsible for making some changes towards the account like either transferring to the course or transfer towards some other person.
I mean integrity means in every organization we will should have a set of group of people who are allowed to make modifications. Either they want to modify their uh profile, either they want to modify their the any data which they have provided the authorized users should be doing after proper validation and verification. The best example is if you want to make changes towards your Aadhaar card also or passport also you need to visit nearby centers you need to provide valid proof and then the changes will be applied. So the integrity means if an organization failed to maintain integrity then there is no meaning for their data no value for their data.
Now coming to the last one availability whatever the services we provide as an organization they should be available 24 by7 365 days or whenever the user requires. So it's not like we are providing services which are not valid like not up to the mark then obviously people start switching to the different way. So like whatever the services we provide it should be available 24x7 or 365 days whenever user need our help. Like if you are not providing proper services obviously people start switching to alternate apps like if zoom is not providing proper services people should start switching to the new apps.
So the CIA confidentiality, integrity and availability plays a crucial role in our security part. How? Now today if there is any cyber attack first we will start with CIA. So now for example I was referring through a breach. What was that boat India cyber attack? Now what happened due to this cyber attack like 75 lakhs customers data was sold on the dark web. Due to this all the confidential information which was around the 2GB which was sold in the dark web we will see what is dark web but the thing is I just want to understand out of these three the confidentiality integrity and availability here the impacted part is confidentiality.
The reason is see from now by reading the case studies okay when you are reading the case studies we need to understand what is the impact whether the impact happened on the data like all the confidential data has been stolen or whether they have modified anything towards due to this cyber attack or due to the cyber attack the complete information is the site is down or infrastructure is down. So for example when we are start reading this attack of the board this is purely the confidentiality has been breached the customer information which should be kept very much confidential like name address contact number banking details email id address unfortunately they have not kept it confidential and it was hacked and now everyone has access to this data which was sold in the internet.
So when we are reading the case studies now we should understand what is the impact due to this attack whether the impact is the data has been stolen or data has been modified or systems went offline. Now for example there is a attack on Singapore health databach. There was a very bad attack which happened on the Singapore health database. This Singapore uh health base like Singapore government maintains something called like one nation uh like one patient ID like they will maintain all the health records under one patient ID on each and every in database like across the country wherever they go through through any hospital if they provide this patient ID they will get all the details like what is the height weight age gender What is the current disease they have?
What is the heart rate or what is the current medication they are taking? Everything they are going to come here. Especially when it when we talk about the patient ID like if they provide how we are having other card similarly they're having a patient ID. Unfortunately this organization has been involved in cyber attack. Okay. This organization has been involved in cyber attack. They modified the records. They have changed the height. They have changed the weight. They have changed the records and all these things. Now according to you what is the impact? Confidentiality is impacted or integrity has impacted or availability has been impacted.
They got access to the database and they have changed every patient record. They changed the height, they changed the weight, they changed the medication they are taking. Now according to you which one is impacted in this out of these three confidentiality, integrity or availability? Which one is impacted? Which what is a major impact? Confidentiality or integrity? There is an attack on Singapore health database and they completely modified the data. They changed the complete patient records. What is the impact here? Confidentiality or integrity or availability? Integrity is a major. I clearly said the words like modify, tamper, edit because they have not copied the data.
They have not deleted the data but they have modified the data. They tampered the database. So while going through such kind of news okay every time you should be make sure the major thing is I want to say we are learning this CIA which is going to help us in major parts especially in understanding the different types of attacks. How can we evaluate the attack? Like if an organization is compromised, what is the impact? Whether confidentiality has been impacted, integrity has been impacted or availability has been impacted. This CIA is going to help us. So we will see there are certain like in a broader way we may have 10 20 30 50 plus attacks but we need to know what is the impact whether this attack is going to impact on confidentiality or integrity or availability.
So such like that this uh is designed CIA confidentiality integrity and the availability. Okay. So we will see of how this uh is going to be impacted in further classes of uh CIA. There is something called uh one more nonreputation. Now now this is something like we cannot deny the activity which has been uh performed. So today we have like valid proof. So for example, every device is capable of generating some logs. So we have a we cannot deny the activity. Now suppose today if someone has made a online transaction with proper authentication and proper uh protocol like we cannot claim for any refund from the bank because we have made a proper transaction with help of the password the login and some MFA maybe with the help of OTP we have made a transaction.
Now if we claim that this was not something which not done by me there are very rare cases like which we cannot claim back or get a refund. Now for example if someone says like we have not joined this session but we have enough proof that like when did the user join the session and when did the user logged out of the session because today we have enough digital evidences that prove the activity and that something user cannot deny the activity. So that is something we call the non-reputation nature. So the user cannot deny any activity like whether like the person who received also cannot deny the person who has sent also cannot deny because we have enough proof that is going to claim that this activity is completed or this activity is done.
So this apart from CIA availability non-reputation is also something which need to be remembered. Okay. So then coming to the next. So if we talk about attack. Okay. What is an attack? See attack is a combination of few things. Attack is all about motive. Like there should be a motive, there should be a method and there should be a weakness. Now all these three together all these three together combine we call it as an attack a motive and a methodology and a weakness. So like weakness is also called as vulnerability. So all these three combined we have a motive plus method and plus weakness is called as an attack.
So like if we talk about motive motive so it is a kind of a place where know for example what is a motive of learning this course is you want to get a certified and you want to get a knowledge in cyber security or ethical hacking or some of them are looking at this career development opportunity. So similarly every before we do an attack as an hacker as an ethical hacker there is a motive. Now a simple question like from your why do the hackers hack the systems? Yep. Like why do they hack the systems or the organization?
Like what is the reason today why they are hacking the companies? What is the reason? What is the motive behind the cyber criminals performing attack on the companies? What do you think? What is the main motive that that makes hackers to hack the systems and organizations? What would be the motivation? See financial benefits we can say like the main motive is one of the motive is financial benefits and one more motive is to steal information that means then yeah like some motivation is to disrupt the business like to damage the business and reputation or sometimes yes it is because of some religious political agenda or to take revenge for fun or for show off.
Yeah. Some of them do it for some testing their skills. So like these many motivations we have some of them do it for money. Some of them do it for data. Some of them want to disrupt the business like they want to damage the business. Uh maybe they are a competitor or they don't want this organization to have a better business, want to damage their reputation, want to want to make people to lose the trust on this company. So it's end of the day completely damage the business or some religious or political motivations on principles of some political grounds or religious grounds or they want to take revenge like counteratt attacks or count something they want to take revenge on the previous organization the previous employee or a customer who is not satisfied with their benefits or a customer who's not satisfied with their service.
So they do involve in attacking some fun show off like they may learn they know about security and they start uh using it for fun and show off and finally testing the skills. So these many different types of motivations we have it's not just for money and it's not just for data but there are other things which are going to be making very so this is something you must remember. Now the reason why these are important because sometimes some of them will keep saying that only the organizations who have a better finance or the only the organization who had a good amount of money get hacked.
That is completely a false statement. It's not about money. It's not about all the time only financial benefits. We have other motivations also. Suppose if someone says hey paw we are a small people. We do a very small business. Our revenue is small. Our growth is small. Do you think hackers still be behind us? Yes, they will be still behind us because they are not just going to only for money. There are other factors which are going to impact. Okay. Like financial benefits or stealing information and dis business or religious and political take revenge, fun show off and testing the skills.
So it's not like only for money. there are other factors which are there. So these many motivations we have we cannot say an organization who is small an organization who is doing very little business an organization who is not completely into the uh like market it's there these are something we cannot consider end of the day if they target anyone can become a victim. So the first thing is in order to perform an attack we need a motive the attackers need a motivation. So these are the different types of motivations we have. Coming to the method.
So method here we for method we we call it as a now for example like everything there will be some process some methodology you follow. Suppose you want to start some business or you want to start learning some new course or if you want to start learning some new skill some methodology you will follow. Now for example you want to learn CH you are following a methodology of enrollment with online platform simply learn and attending the training and practicing doing practicals and gaining the knowledge. Some of them will follow a different approach of only self-study or maybe they will they are going to some offline methodology wherever they have a scope to visit offline institute some some kind of methodology you are going to follow and in order to crack the exam like you will be practicing different sets of uh questionaries or practicals you are doing from different platforms like everyone follow different methodology according to their approach.
So here also in order to perform attack like there are there is there is some methodology that need to be followed. So we call it as a TTP. So tactic tactics techniques and procedure. So TTPs we call it as tactic techniques and procedure like what kind of tactic they are going to try, what kind of technique they are going to try, what procedures they are going to follow. For example, they want to hack the user with the email or they want to use what kind of tool, what is a procedure they want to follow, what is the process they want to follow.
All these three are going to define like what kind of tactic you are going to use, what kind of technique you are going to use and what is the procedure we are going to follow. The tools like whether you are going to use Kali Linux or Parat OS or something out of these three tools like what is the methodology you are going to follow? we call it as a tactic, techniques and procedure like what kind of attack, what is the procedure you are going to follow and what is a methodology to hit that. So method means TTP tactic, technique and procedures.
So finally we have weakness. So weakness is something we call it as a bug or it is also called as a loophole. It is also called as a vulnerability. Okay. So weakness another names are see 100% in order to do any attack there should be some kind of weakness. So like the weakness can be in the software the weakness can be in the hardware. The weakness can be in the process. The weakness can be in the humans also. that is nothing but employees or the users. So software related bugs, hardware related bugs, process related bugs and humans related bugs.
Now for example like two years back we had a bug in our process like we we used to see the CH enrollments are like 50 to 60 enrollments per batch but whereas we used to see the students who are joining around 100 because there was a loophole in our process like anyone with our zoom link are allowed to join the meetings and attend the class even who are not enrolled if they start sharing the link but How it is not like that it is designated per user per per account. So the moment they start logging in from different account it gets log out.
So it's like we we have made the process streamline. So every organization like maybe their login mechanism the process of how they connect to the client. So there will be a loopholes every process. So whatever the attacks yesterday we saw case studies especially the attack happened on the boat the attack happened on the as India the attack which happened on the uh this pipeline attack everywhere there will be a vulnerability without weakness without vulnerability or this they cannot hack the computers or the systems see this one it can be as I said it can be in a humans also we'll talk about that there are some attacks there is a module which talks about human based weakness and human based uh vulnerabilities also.
So it can be anywhere the attack can happen. So it's not just only because of software or hardware there can we can expect everywhere this kind of uh vulnerabilities. Okay. Yeah. So the and one more thing is for this software weakness like vulnerability vulnerability is all about a loophole or a bug or a weakness. See for vulnerability we have a fix. Okay we have a fix that means like we have a solution. We have a solution. In other words we in technical words we have a patch. Okay. Now for example uh you all will receive something called updates like you will receive updates you'll receive updates in your play store app store your Windows machine like what are these updates meant for like what do you get from these updates like why do why do they send updates for you like what is the reason like you keep getting updates in play store the app store your mobile or your laptop or your new features.
Good. So, usually they are meant for new features. Okay. Now, sometimes Yep. Uh new features. Uh some of bug fixes. So, it can be either for new features or bug fixes. See today like okay, we can say it's a it's a 50/50 ratio. Sometimes now for example WhatsApp it updates every every week or every alternate week but very very few times we see new features every time it looks the interface same the application same but something happens in the background it's something related to the bug fixes because there two scenarios either it can be for a new features either it can be for a bug fixes but today lack of knowledge they many of them ignore the update which are produced in their uh systems.
Many of them ignore that. See like because maybe they are not aware of the things that they think all the time updates means only new features. No, the updates are also meant for bug fixes because see vulnerability had a solution like if you are not updating the system properly you will be hacked. So like weakness is something you already have a solution but you are not performing that well. So you have a fix you have an update. So but you don't do it. It's because of lack of knowledge lack of intent lack of awareness lack of ignorance also like they do ignore also.
So today like what this Microsoft has come up like some of the uh things we have we call it as a patch Tuesday. It is also called as update Tuesday. So what Microsoft has decided Microsoft has started something called patch Tuesday or update Tuesday. Every month second Tuesday they are going to release set of updates. So it's like it's uh it depends on that nothing like that mandatory or anything but all of them should be updated. So it all depends like they start announcing in the news and everything as a criticality but yeah so like here if you see the patch Tuesday or update Tuesday the it's a term which actually started by Microsoft but recently it was followed by it was followed by even adob and Oracle.
What they have did Microsoft has decided like every month second Tuesday they are going to release set of updates. Those are only meant for fix bug fixes like they those are only meant for fixing the loopholes not for new features not for something anything new options but the they have decided only to release second every month second Tuesday. So mean that something if it comes up critical in between they are going to release but they have taken this as a day where they can keep it like every month second Tuesday they release set of patches which happen for example I think in this month it is completed on you can see Microsoft September 2025 patch Tuesday fixes 81 flaws and two zero days.
So like this every month they have started doing this because this can make sense like every administrator across globe can be uh following the same thing. So like main thing to remember is updates are not just meant for new features but also the bug fixes. So the most important thing is vulnerability have a fix have a solution we have a patch. If you are not doing it on the right time then your systems will be hacked or systems will be involved in the compromise. So now this is something we have for vulnerability like we have a vulnerability analysis module number three number three or four we will be elaborately discussing more about this.
It's an interesting topic because there are many job roles which is going to be discussed which is going to be performed only on the vulnerability management side as well. Okay. So then next number two. So here along with vulnerability we have something called zero day. Now zero day this is opposite for this. We we don't have a fix. We don't have a solution. We don't have a patch. Even the developers of the organization also not aware of this zero day. Now best example I can give you is COVID 19 like we have a very big health infrastructure.
Unfortunately when the COVID 19 is into the market like we have no solution for that. We are not medically prepared. How can we identify this virus? All we did is we waited for we have seen how many people have been impacted because of this and also we have seen uh the situation like where the people has been deceased until unless we get a vaccine. We have all been we faced many challenges like it was a very difficult same way zero day is also if zero day is discovered in Microsoft if zero day is discovered in the zoom if zero day is discovered in the Google chrome it is a situation where we don't have a fix we don't have a solution we don't have a patch even the developers of the product also not aware of this bug like this was identified by like recognized or identif ified by the security researchers.
So when there is a zero day, it's a very critical time because we have no solution. The only solution is to shut down the machine. But if we shut down the machine, the business disruption will happen. We cannot continue the business. So recently like there was a zero day in Microsoft last month. Uh we call it as a tool shell zero day. This was on Microsoft SharePoint servers like almost many like you can see like in July August it was very much booming till September. Uh tool shell is a high-profile zero day exploit chain targeting on Microsoft SharePoint servers.
It is designed to give attackers persistent and authenticated remote to a compromised server and back door. So that this means like when this was announced initially there was no Even Microsoft is not aware of this bug in their product. So like like almost Microsoft took two to three days to give a solution. In between this two to three days how many might have been infected? How many might have been hacked? So zero day means we have no solution. So the only solution is we need to wait until the the owner of the product provides some solution or provides some patch.
So like one one more example I can give you there is a vulnerability in Apple iPhone. So this was something like on the Apple mobile behalf. So what happened is when people started sending this Telugu letter in the WhatsApp or when they started uh typing on the keyboard the mobile phone used to crash. Not only mobile phone like yeah iOS like mobile phone the Apple watches Apple TV all this has been impacted with this and this was not even aware by the Apple developers. It's identified by the security researchers that there is something a letter which is called GNA.
The moment it is typed on the mobile phone or if they received at this SMS in WhatsApp or messages the mobile phone will crash the moment they type it in any search bar anywhere the mobile phone is crashed. It was identified by the Now what happened? Even Apple is not aware of this. Okay. So even just like I'm I'll take some time and look at your questions like first I'm going through the topic. So like even Apple is not aware of this. So now what happened like even now Apple has taken two to three days like no two days to fix this but in between these two days what is the solution?
How can we safeguard myself? If I have sent it to 20 people who use iPhone this letter their mobiles has been crashed like unexpected shutdowns, restart. So that keeps happening. So zero days are something where we don't have solutions. But when it comes to the vulnerability, we have a solution. There is already a patch. Patch in the sense update like it's a fix. Okay, it's a fix. Now for example we observed there is some uh issue on our electricity in general. So immediately the electricity department has provided a fix for that by giving us new line or giving us new equipment or giving us new connections like it's a it's a kind of a solution.
It's a kind of a patch. Patch is nothing but it's a kind of a solution like that is going to help us in being safe. So the thing is this is a kind of a situation where the hackers or not a hackers like they see they keep sending this letter and they start crashing. Apple almost took 2 days time to understand this and fix this. But the problem here is in between these two days how many might have been infected. So zero day is something very dangerous today. Till today also we have no proper solution.
If there is a zero day all we need to do is closely monitor the systems. How we safeguarded in the COVID 19 like monitoring our behaviors and health checkups. Same way when there is a zero day in the market all we do is we try to watch the systems close. Yes. Correct. When they miss to see the flaws correctly this zero days will occur. So the security researchers their job is to like actively exploit the systems actively look into the bugs loopholes uh what is the ways they can compromise the system they their complete focus is to hack somehow they will find it out some loophole in our system by the time even developer is also not aware of that things to remember vulnerability we have a solution there is an already an update you can you you need to just go and update your system but zero day we have no solution ution we we call it as a zero day vulnerability, zero day malware.
It's all pretty like brand new. Even the organizations or developers are not aware of this. Yep. The company should itself hold the responsibility if there is some zero day occurs. So today in order to perform an attack these three are very important. There should be a proper motive, proper method and weakness. All these three will help to perform a successful attack. So these are something uh you need to remember. Now next is okay uh some might have question what is this human related vulnerability? Let me give you one example. So everyone of you just read this this paragraphs which is on the screen and let me know whose mistake it is.
Is it a mistake of organization? Is it a mistake of employee? It's a mistake of employee. So it's a clear sign of human error. So it's because organization has implemented a strong password. Organization has implemented a strong MFA. Now a person user should have a knowledge of what should we should be respond for. So attackers found weakness in the employee. So that's why I said today even we have weakness in the human. So we will discuss about what these attacks are. What is the name of these attacks? So you can go through link. There is a module number 10.
I remember that is something which is going to focus on only the attacks which happens related to the human errors. Okay. So okay now next if we discuss now apart from zero day as I said there is no solution for zero day till today also no proper solution in similarly we have something called insider threat like what is this insider threat is see the today whatever level you join okay we have some kind of data some kind of access will be given to the employee. See when I joined as a trainer I have complete trainer access I have access to all the cyber security content and I have access to all related training students enrollment and everything when like every employee will have some kind of information.
Now what happens in insider threat is unfortunately the employee of the organization will start selling our data to the competitors or to the electronic media. They start leaking important information to the public or which is going to impact the organization business. For example, in a manufacturing industry, they deal with lot of new things like design, especially in the mobile industry, new design, new features, new output, new architecture. But unfortunately, they release into the market before it actually launches. So what happens due to that the complete business we may lose we may lose sometimes the lawsuit might be fired on us of using copyrights like much more challenges like employee works with organization but unfortunately due to maybe employee feel like they want to take some revenge or employees attracted to some money or employees attracted to some kind of external affairs.
Unfortunately they start giving out important information. Who is part of the organization? The employees part of our company but unfortunately they start spreading the false information. Now this is a kind of again till today also like we don't have a proper solution worth this after covid-19 it has increased more because employees started working from home. So when employees started working from home they all have our device in their home. they have access to the data from anywhere in the globe. So like insider threat is a something like yes we have some solutions the people say you are not allowed to use USB you are not allowed to connect to social media platforms you are not allowed to use personal email in the work work laptop these all are some solutions we have but end of the day if employees remember everything in the mind employee remembers everything in the they we can't do anything in that situation so in seller threat the employee who part of organizations start behaving weird.
So Yogesh that's a good point but I can say every organization will create an awareness session when they are onboarding only but even still like the employee should be having awareness that we should not accept the MFA request even though if it is flooding so we should verify whether we are getting a call from right networking team. No one is going to ask uh like the mobile the password and no one is going to accept ask accept the OTP or share the OTP even though if it's a flood kind of thing they have something to do with the process so that is something they have succeeded so the major role respond like lies with a employee only even okay so knowing best practices yes even organizations who conducted proper security awareness training also it is we are we do see these kind of attacks because yep now we are learning security we are very much focused but we can't expect every same thing from the developing development team or the finance team HR team marketing team they keep doing mistakes even after like knowingly or unknowingly there are multiple factors which make them so here the main factor was fear like they have threatened like your account is going to be going on hold.
She believing that and the compromise has been taken place. Okay. So insider threat is one. So next comes. So these are few things. Next we will talk about the hacking concepts. So we'll discuss about this hacking. So like if we start with what is hacking? What is hacking? It's all about gaining unauthorized access to systems or to data. Okay. Like where they will try to gain access to the unauthorized systems uh unauthorized where they are not allowed to take but unfortunately they gain access. So gain unauthorized access to the uh data or system or accounts.
So when authorized okay it's all about doing illegal activities. Okay it's completely uh the hacking is a terminology where it's completely having a bad intention or uh doing illegal activities. which affects in a negative way to the organization. So when it comes to the ethical hacking, ethical hacking, yes, here it's a good intention like they are performing attacking with valid permissions of organization. Okay. Like we here in in terms of ethical hacking the name itself says ethical. They maintain certain ethics even even they know how to hack the systems and crack the systems but they do only for good purpose and good cause.
Moreover, so the good cause is something they want to identify loopholes. They want to identify vulnerabilities. They want to identify the system related like uh the flaws which are available in the organization so that they can fix. Now for example today like we will be hiring ethical hacker just to perform hacking on our organization and let us know what are the loopholes we have what are the ways they can enter into our organization what are the ways they can damage our organization so that something I can fix so that something I can think about a better solution.
So the ethical hackers today like yes organizations are hiring there are job roles where the people who know how to hack we are the organizations are hiring it is not for doing counterattack but it is for the safeguard of the own Suppose I have constructed a house. Before I go to my new house, I have hired a thief and asked the thief to perform the robbery. Like basically I want to see how they are going to perform robbery in what way they are going to enter into the house even though it is safeguarded with all the locks and all the proper protection.
So if they were able to break the things and enter into the house they will let me know like you are using the weak locking mechanism you don't have proper monitoring team like like CC cameras or you don't have proper alarms like which is going to give alarms when something breaks out. So like all the loopholes they are going to be saying me I'll try to fix it so that if there is a actual hacker or actual thief comes in also that will help me to identify things. So it's like a hiring a person who know how to hack but trying trying to get report and fix the things before something really bad happens.
So that is the job role of pen. We call it as a pentest or we even call it as a penetration test. Penetration testing is different from penetration testing. The testing is something like software testing. That's performance testing. Quality assurance. This is something related to completely penetration testing is something related to the hacking or cyber related test. So like like we have job roles like junior penetration tester or we have a job roles called uh VAP vulnerability assessment and pent testing. There is one more name called as red teamer. So red team like these are group of employees who has knowledge of how to hack.
So this EC council ch also very much focused on giving you the skill of uh ethical hacker and this will finally help you to land into a job of the penetration tester and pentesting. So it will help you to learn like skill in what way we can hack the systems what are the tools we have in what way we can produce some reports and everything some value added. So we call it as a pen testing or penetration testing. So junior pentesting, VAP, red teamer these are few alternate names we have. Okay. So like ethic that's all ethical hackers also.
So where we have we know hacking but using the skill for a good cause. Okay. So now for example now like Yogesh or Diva like they gave me a project sir we are launching a new app or we are launching a new organization new product. So we want to know I if there are any loopholes in our app or the site or the applica product so that we can safeguard the things before it go live. So I will try all the way to hack the system to perform password cracking or performing some network related attacks something application related attacks and I'll finally say see these are the things which I found please fix them.
So it's a kind of a situation where we are hiring the hackers to perform hacking on our own We even call it as a to calculate or to evaluate the hack value. We call it to what extent we can be hacked. So that if you are not doing if you are not performing pen testing, if you are not performing this uh penetration testing, it's like you you'll be not aware of how the companies how your organization what loopholes you have and how you how they can be hacked. So that is something we have over here in terms of now.
So there are u types of pentesting. So these all are fundamentals guys which are very important because there some might as I said many of them might be new which all look new terminologies. Uh that's the reason I said the module number one is designed in such a way to clear all fundamentals to the learners. they know everything related to the security log. So types of penetration testing we have blackbox pentest, white box pentest. We have gray box pentest. You see in blackbox pentest you will be provided with no information. All you will be provided with is just the organization name.
In white box pentesting you will be provided with full information. You will be provided with all the access required like you will be provided with all the access required. In graybox pentesting you will be provided with only partial information. When I say partial information like you will be just provided with organization name what kind of business they do like we are a simply learn and we…
Transcript truncated. Watch the full video for the complete content.
More from Simplilearn
Get daily recaps from
Simplilearn
AI-powered summaries delivered to your inbox. Save hours every week while staying fully informed.
![Business Analysis Full Course 2026 [FREE] | Business Analytics Tutorial For Beginnners | Simplilearn thumbnail](https://rewiz.app/images?url=https://i.ytimg.com/vi_webp/_X6etf9ucd8/maxresdefault.webp)








