Ethical hacking

Get Started. It's Free
or sign up with your email address
Ethical hacking by Mind Map: Ethical hacking

1. ethical hacker

1.1. -An ethical hacker (also known as a white hat hacker) is the ultimate security professional. -Know how to find and exploit vulnerabilities and weaknesses in various systems

2. ethical hacker job

2.1. -They break into systems legally and ethically. -Scanning ports and seeking vulnerabilities -examine patch installations and make sure that they cannot be exploited. -engage in social engineering concepts like dumpster diving

3. ethical hacking terminologies:

3.1. a. Threat b. Exploit c. Vulnerability d. Target of Evaluation (toe) e. Attack f. Remote

4. system hacking cycle

4.1. 1.0 Reconnaissance

4.2. 2.0 Scanning

4.3. 3.0 Gaining Access

4.4. 4.0 Gaining Access

4.5. 5.0 Covering Tracks

5. -Hacking performed by a company or individual to help identify potential threats on a computer or network. -An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers.

6. Types Of Hacker

6.1. 1.Script Kiddies

6.2. 2.White-Hat Hacker

6.3. 3.Gray-Hat Hacker

6.4. 4.Black-Hat Hacker

6.5. 5.Suicide Hacker