Search results for hacking

Here you have 12 templates based on your search of hacking. Enjoy them!

Ads
Ads
Ethical Hacking Workshop

Hacking has traditionally been associated with negative aspects, but the truth is that for several years now there has been an ethical hacking whose aim is to prevent hacker attacks and improve the security of computer equipment. If you are an expert in this field, we encourage you to share...

16:9
Ethical Hacking Minitheme

Download the Ethical Hacking Minitheme presentation for PowerPoint or Google Slides and start impressing your audience with a creative and original design. Slidesgo templates like this one here offer the possibility to convey a concept, idea or topic in a clear, concise and visual way, by using different graphic resources....

Ethical Hacking Dilemma Thesis Defense

Download the Ethical Hacking Dilemma Thesis Defense presentation for PowerPoint or Google Slides. Congratulations, you have finally finished your research and made it to the end of your thesis! But now comes the big moment: the thesis defense. You want to make sure you showcase your research in the best...

16:9
Cybersecurity Agency

We use computers every day—at home, at work, almost anywhere. You need to have your data safe and secure, so if your agency offers cybersecurity services, you can promote them with this template. It catches so much attention thanks to its neon colors and its futuristic appearance. Don't forget to...

16:9
Ethical Hacking Training for University

We all know what hackers are, right? But did you know there are “good” hackers? Hacking doesn’t always involve pirating, sometimes it’s used to prevent malware, cyber attacks and to protect the security of a net or program even more. Nowadays, this role is vital for companies or big entities....

16:9
Cybersecurity Infographics

Use these new infographics to explain all about cybersecurity, one of the main aspects that businesses should take care of in today’s world. Compare items, describe concepts, show steps in a process… Just pick one of the designs—ranging from flat and linear to isometric—and go for it!

16:9
Cybersecurity Industry

Let us enumerate a series of words that you might or might not know: phishing, trojan, rootkit, adware, spyware, DDoS, ping of death, exploit, ransomware... Alright, breathe, there's still hope. Companies in the cybersecurity industry are there to prevent those nasty words from becoming too common to handle. In fact,...

16:9
Ethical Hacking Thesis Defense

Ethical hacking is all about preventing cyber attacks and fixing possible vulnerabilities. It’s not the same as the idea everyone has of a hacker, this kind of hacker helps the user or organizations to protect their data from criminals. If you have written your thesis about this topic, you can...

16:9
STEM Elective Subject for Middle School - 7th Grade: Principles of IT, Cybersecurity and Engineering

Teach your middle school students the principles of computer science, cybersecurity and engineering with this amazing template we've created for you. Its futuristic design with 3D illustrations will capture your pupils' attention right away, keeping them focused on the information you want to convey to them. Everything is ready for...

16:9
Growth Hacking Workshop

Growth hacking is a technique that seeks to quickly and significantly increase the volume of users, income or impact of a company using few resources. Without a doubt, this is a very useful technique in marketing and it is precisely what you will teach the attendees of your workshop. Give...

16:9
Cybersecurity Consulting Report Infographics

"Why did you open that email whose subject said You're our 100th employee, here's an extra month of vacation? Now we've got a virus on our system!" Someone is in need of some cybersecurity lessons! Speaking of which, if you're looking for ways to present your report after a cybersecurity...

16:9
Ethical Hacking for IG Stories

Hacking, in the computer world, has a bad connotation, and with reason! Are you aware of another type of hackers, usually called "white-hat hackers", who are employed by companies to test their systems in order to detect vulnerabilities? What they do is known as ethical hacking, and that perception may...

Stories