Ethical hacking

马上开始. 它是免费的哦
注册 使用您的电邮地址
Ethical hacking 作者: Mind Map: Ethical hacking

1. ethical hacking terminologies:

1.1. a. Threat b. Exploit c. Vulnerability d. Target of Evaluation (toe) e. Attack f. Remote

2. system hacking cycle

2.1. 1.0 Reconnaissance

2.2. 2.0 Scanning

2.3. 3.0 Gaining Access

2.4. 4.0 Gaining Access

2.5. 5.0 Covering Tracks

3. -Hacking performed by a company or individual to help identify potential threats on a computer or network. -An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers.

4. ethical hacker

4.1. -An ethical hacker (also known as a white hat hacker) is the ultimate security professional. -Know how to find and exploit vulnerabilities and weaknesses in various systems

5. ethical hacker job

5.1. -They break into systems legally and ethically. -Scanning ports and seeking vulnerabilities -examine patch installations and make sure that they cannot be exploited. -engage in social engineering concepts like dumpster diving

6. Types Of Hacker

6.1. 1.Script Kiddies

6.2. 2.White-Hat Hacker

6.3. 3.Gray-Hat Hacker

6.4. 4.Black-Hat Hacker

6.5. 5.Suicide Hacker