Introduction To Ethical Hacking

Get Started. It's Free
or sign up with your email address
Introduction To Ethical Hacking by Mind Map: Introduction To Ethical Hacking

1. Ethical Hacker Job

1.1. They break into systems legally and ethically

1.2. engage in social engineering concepts like dumpster diving

2. Ethical Hacking Terminologies

2.1. Threat

2.1.1. Exploit

2.1.1.1. Vulnerability

2.1.1.1.1. Target Of Evaluation

2.1.1.1.2. The existence of a software flaw, logic design, or implementation error that can lead to an unexpected

2.1.1.2. An exploit is a general term for any method used by hackers to gain unauthorized access to computers, the act itself of a hacking attack, or a hole in a system's security that opens a system to an attack.

2.1.2. Threats can lead to attacks on computer systems, networks and more.

3. System Hacking Cycle

3.1. Reconaissance

3.2. Clearing Tracks

3.3. Maintaining Access

3.4. Gaining Access

3.5. Scanning

4. Testing types

4.1. White box

4.2. Black box

4.3. Grey box

5. Understand Ethical Hacking

5.1. Hacking performed by a company or individual to help identify potential threats on a computer or network.

5.2. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers

6. Ethical Hacker

6.1. An ethical hacker (also known as a white hat hacker) is the ultimate security professional

6.2. Ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities

7. Type of Hacker

7.1. Script Kiddies

7.2. White-Hat Hackers

7.3. Gray-Hat Hackers

7.4. Black-Hat Hackers

7.5. Suicide Hackers