As the world moving towards the Robotics and Automation, here comes a SoFi - which is called a Robofish developed by Computer Science students of MIT college which can swim in the open water along with the marine creatures. They are now secret agencies for capturing the marine life in recent times. Click here for knowing more details about how a SoFi work in the water. This is the first robotic fish in all 3 dimensions for extended period of time. It is more excited to get about the possibility of getting a system like this to get closer to marine life than humans can get on their own. SoFi can handle upto a deep of 50 feet for 40 mins. It is strong enough to push back the currents and can take high resolution photos. Using a waterproofed super Nintendo controller, it can dive in straight line, turn, dive up or down. The materials for building up SoFi is understood in the video shown above in the link. The robot is capable of close observations and interactions with marin...
When it comes to cyber security they are many types of hacking (for more detail click hear), the person who use his hacking skills to perform a good reason called "Ethical hackers ", they called also CEH (certified ethical hackers).
How does they works?
The normal hacking is done by targeting weakness of computer, so computers well hacked easily and the hackers never told the weakness of our computer. But Certified Ethical Hackers have permission to access your network or computer and they well hack the out side of the computer like black hate hackers to find the weak part of your computer, then they well sujest to strong that part of program. Most the companies like Banking and credit card business are spend million dollars of money to Cyber Security, because if they attacked by black hat hackers they well loose huge amount of money and steal information of customers.
"You can call Ethical hackers as a doctor of computer"
Types of Ethical Hackers
CEH can divided into three types
1. Information Security Analyst
2. Security Engineer
3. Penetration Tester
In short terms
1. Information Security Analyst : This engineers can install the firewall software to the network or computer to protect. Information Security Analyst well taking the part of protection
2. Security Engineer : Security engineer specialized in engineering they well take care of security aspects in design of network or system
3. Penetration Tester : Penetration testing also called pen testing.
The work of pen tester is checking the computer system, network or Web application to find vulnerabilities that an attacker could exploit.
Resources for Becoming a Certified Ethical Hacker
Their are so many institute to get certified in Ethical Hacking
Popular websites for education in ETHICAL HACKINGS are listed below
EC-Council
InfoSec
This is all about Ethical hacking and types of Ethical hackers. I hope enjoying this post of enjoyed then share this post with your friends
How does they works?
The normal hacking is done by targeting weakness of computer, so computers well hacked easily and the hackers never told the weakness of our computer. But Certified Ethical Hackers have permission to access your network or computer and they well hack the out side of the computer like black hate hackers to find the weak part of your computer, then they well sujest to strong that part of program. Most the companies like Banking and credit card business are spend million dollars of money to Cyber Security, because if they attacked by black hat hackers they well loose huge amount of money and steal information of customers.
"You can call Ethical hackers as a doctor of computer"
Types of Ethical Hackers
CEH can divided into three types
1. Information Security Analyst
2. Security Engineer
3. Penetration Tester
In short terms
1. Information Security Analyst : This engineers can install the firewall software to the network or computer to protect. Information Security Analyst well taking the part of protection
2. Security Engineer : Security engineer specialized in engineering they well take care of security aspects in design of network or system
3. Penetration Tester : Penetration testing also called pen testing.
The work of pen tester is checking the computer system, network or Web application to find vulnerabilities that an attacker could exploit.
Resources for Becoming a Certified Ethical Hacker
Their are so many institute to get certified in Ethical Hacking
Popular websites for education in ETHICAL HACKINGS are listed below
EC-Council
InfoSec
This is all about Ethical hacking and types of Ethical hackers. I hope enjoying this post of enjoyed then share this post with your friends
Thank you for this useful information
ReplyDeleteEthical hacking Training in Chennai | Ethical hacking certification in Chennai
Excellentm idea and the subject at the top of magnificence and I am happy to this post. Interesting post! Keep sharing such kind of worthy information.
ReplyDeleteHacking Course in Chennai
Hacking Course in Bangalore
Hacking Training in Tambaram
Hacking in Nungambakkam