What is Ethical Hacking - Ethical Hacking Overview - Cyber Security Tutorial

What is Ethical Hacking

  • Ethical hacking involves an authorized attempt to gain unauthorized access to a Computer System, Application, or Data.
  • Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.
  • This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

Ethical Hacking Protocols

Stay legal

  • Obtain proper approval before accessing and performing a Security Assessment

Define the scope

  • Determine the scope of the assessment so that the ethical hacker’s work remains legal and within the organization’s approved boundaries.

Report vulnerabilities

  • Notify the organization of all vulnerabilities discovered during the assessment.
  • Provide remediation advice for resolving these vulnerabilities.

Respect data sensitivity

  • Depending on the data sensitivity, ethical hackers may have to agree to a non-disclosure agreement,
  • In addition to other terms and conditions required by the assessed organization.

Skills Required to Become a Ethical Hacker


Networking concepts

  • How two devices communicates
  • How protocols works
  • Encrypted Networks Workflow
  • Wireless communictions

Basic programming Knowledges

  • How a piece of code works
  • How viruses is written in coding prespective
  • How to decode a piece of code
  • How an application works code wise

Linux Administration

  • Linux Management
  • Linux User and Network Management
  • Different Linux Distributions
  • Linux Command Line Utility
  • Bash Commands
  • Knowledge in Shell Scripting

Understanding of operating systems

  • What is a OS
  • Different OS Workflow
  • OS Architecture
  • OS Core Concepts
  • OS Functions
  • Hands on Experience in Different OS

Latest Cyber Security Threats

  • Client Side Threats
  • Latest Vulnerablitiy Patches
  • How Certain Attack Works
  • Server Side Threats
  • Wireless Attacks

Strong knowledge of coding

  • To UnderStand Programs
  • For Writing Secure Codes
  • To ExamineVulnerablitiy
  • For Reverse Engineering
  • Malware Analysis

Related Searches to What is Ethical Hacking - Ethical Hacking Overview - Cyber Security Tutorial