Ethical Hacking

By vijaykumar Devireddy

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Self-Improvement

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 18
Reviews: 0
Episodes: 92

Description

Ethical is something what you do and what you thought which makes you good among everyone! what if there is no one watches you in the internet world what you do is ethical be a hacker!!

Episode Date
What do you know about Physical Security ?
Jan 28, 2022
Other Wireless Technologies that you wanted to know about.....
Jan 20, 2022
Wire less Attacks that you need to be aware of.
Jan 13, 2022
Wireless Access point where exactly need to be placed in our organization or our home ?
Jan 12, 2022
Wireless encryption Explore the vulnerabilities it had before you use it.
Jan 11, 2022
How to secure Wi-Fi devices ? How to secure ?
Jan 01, 2022
How to secure network media ?
Dec 29, 2021
How to secure network devices ? What are network devices ?
Dec 27, 2021
How can we secure our Networks ?
Dec 26, 2021
What is ARP ? Where it will be ? How ARP Poisoning done ?
Dec 25, 2021
What is DNS ? How DNS(Domain Name Server) attacks can be performed ?
Dec 18, 2021
How Transitive concept is used in Internet Attacks ?
Dec 12, 2021
What is Replay Attack ? How it is performed...
Dec 11, 2021
What is Hijacking ? How it is performed in Internet world & How many types are there ...
Dec 09, 2021
How Spoofing can be done or what is it ?
Dec 08, 2021
How to stop DDoS ?
Nov 28, 2021
What is a Distributed denial of service(DDoS) attack ?
Nov 23, 2021
What is Denial of Service attack ?
Nov 22, 2021
What are Unnecessary ports ? How to close it....
Nov 21, 2021
What exactly ports & protocols does in our laptops...
Nov 19, 2021
A small Intro of Network attacks...
Aug 29, 2021
Defending Servers....
Aug 28, 2021
Issues with Cloud and how to secure them.....
Aug 27, 2021
As a Service that we get over Network from Cloud....
Aug 26, 2021
Cloud Types...
Aug 25, 2021
New Trend In IT Industry - Cloud Computing
Aug 24, 2021
UTM Device Every Solution for your security problem...
Aug 04, 2021
NIDS VS NIPS Which is better device ?
Aug 03, 2021
Data loss prevention (DLP) this is how we inspect the data that is going out of our network...
Aug 02, 2021
What are Honeypots and Honeynets ?
Jul 27, 2021
Proxy Servers types that we use in these internet world...
Jul 26, 2021
Firewalls first step for your perimeter security...
Jul 23, 2021
Perimeter Security A process of securing your devices for outer world
Jul 21, 2021
Telephony Devices that we used to communicate b/w two different computers in way back days...
Jul 13, 2021
Network Address Translation (NAT) this is how private IP address are changed to public IP address....
Jul 09, 2021
Subnetting a way of using IP address more efficiently...
Jul 08, 2021
Virtual Local Area Networks (VLANS)
Jul 07, 2021
Network Access Control (NAC) Rules that we set for a Network....
Jul 06, 2021
Types of Network Zones that we use ...
Jun 21, 2021
Routers which connect two different Internet Protocol address(I.P.)...
Jun 11, 2021
Switches which work at Data link Layer of OSI Model...
Jun 09, 2021
OSI model this is how two devices can talk...
Jun 06, 2021
A Short intro for Network the ins and outs of it....
Jun 05, 2021
What is Structured Query Language(SQL) Injection ?
Jun 04, 2021
Another two most common vulnerabilities that can be found in web applications XSS & XSRF....
Jun 03, 2021
Buffer Overflows the most common Vulnerability that can be found in any application in different forms...
Jun 02, 2021
Common types of vulnerabilities and exploits that we can found in software products...
Jun 01, 2021
Testing Methods of software products..
May 31, 2021
Principles of SDLC that we need to know in-order for secure coding Practices....
May 29, 2021
Commonly used Software Development models in-order to develop software products...
May 28, 2021
Securing Applications with the only features that they provide...
May 27, 2021
Web Browser concerns that we need to know...
May 26, 2021
Things to known about Web browser Security...
May 25, 2021
Intro to the Application Security....
May 21, 2021
How to secure VMs...
May 20, 2021
Hypervisors father of virtual resource creation....
May 19, 2021
Threats that are associated with Virtualization....
May 18, 2021
Virtualization A door for excessive power...
May 16, 2021
File Systems and Hard drives...
May 15, 2021
Group Policy An Administrative control....
May 14, 2021
This is how an organization Uses Patch Management System to update their devices....
May 09, 2021
What is Updates and Patches What is the difference ?
May 08, 2021
On what basis we need to select the Operating system(O.S) that we want to use in our devices.....
May 07, 2021
How Unnecessary Application are eating Up your disk space and making your laptop vulnerable in the Internet world
May 05, 2021
10 Best Ways To secure your mobile devices....
May 04, 2021
BYOD OR CYOD which does your organization use....
May 03, 2021
How You are going to secure your Mobile Devices from App that was not developed by you ?
May 01, 2021
What happens if you lost your mobile device which stores your valuable information.....
Apr 30, 2021
How Attacker's get into your devices over bluetooth.....
Apr 29, 2021
SIM Cloning and ID Theft How it happens....
Apr 28, 2021
How To Secure Mobile devices from mobile malware out there....
Apr 27, 2021
How To Secure Wireless devices that we are using...
Apr 23, 2021
How Encryption helps us to secure our hard disks in which we will store our precious information...
Apr 21, 2021
Securing Storage Devices
Apr 20, 2021
Securing Basic Input Output System(BIOS)
Apr 19, 2021
For Keeping your information under your control use Data Loss Prevention(DLP) tool.
Apr 18, 2021
POP UP's how Dangerous they are .......
Apr 15, 2021
Intrusion Detection System (IDS) a true security software guard for our laptops
Apr 14, 2021
Firewalls which help to secure in the internet world
Apr 09, 2021
Preventing malware in order to stop infecting our electronic machines which has the internet facility
Apr 07, 2021
How to get rid of malware from our electronic device which has the internet facility
Apr 06, 2021
How to identify the symptoms of malware on our electronic system
Apr 05, 2021
What are Backdoor & Logic bombs
Apr 04, 2021
What is Active Interception and Privilege Escalation
Apr 03, 2021
What are Botnets and Zombies
Apr 02, 2021
Common Delivery methods for malware to get into your system
Apr 01, 2021
Intro to Malware Infections
Mar 30, 2021
History of cryptography
Dec 25, 2020
Protect your information in the internet world with the help of cryptography...
Dec 24, 2020
Malwares how they act as a middle man ??
Dec 23, 2020
Hackers what they do !!!
Dec 22, 2020
Welcome to the ethical world!
Dec 21, 2020