Ethical HackingPresentation SynopsisIs your computer system under attack? Would you know if hackers hijacked your system and took control of your resources? This presentation will show how the attacker takes control of the system, covers their tracks from the users of the system by creating a 'backdoor' and hiding it using a 'rootkit'. You can see exactly what these and other terms such as 'trojan', 'exploit', and 'hack' actually mean when applied to a real system. Will cover some basic precautions that will help you protect your computer from being attacked TestimonialsComputer Security and Ethical Hacking, Bedford College May 3, 2011 Requesting a presentationIf you represent any branch or section of the BCS, IET or other professional institute bodies, or represent an organisation, company or business in the UK and are interested in me giving this presentation, please contact me through LinkedIn or this website. |