Ethical Hacker Essay

5185 Words Mar 29th, 2013 21 Pages

Ethical Hacking and Countermeasures EC-Council


Ethical Hacker



Hackers are here. Where are you?
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a
…show more content…
Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student — the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies. Page


Course Outline v
Module: Introduction to Ethical Hacking
Module Objectives Module Flow Problem Definition -Why Security? Essential Terminologies Elements of Security The Security, Functionality and Ease of Use Triangle Case Study What does a Malicious Hacker do? Phase1-Reconnaissaance Reconnaissance Types Phase2-Scanning Phase3-Gaining Access Phase4-Maintaining Access Phase5-Covering Tracks Types of Hacker Attacks Operating System attacks Application-level attacks Shrink Wrap code attacks Misconfiguration attacks Remember this Rule! Hacktivism Hacker Classes Hacker Classes and Ethical Hacking What do Ethical Hackers do? Can Hacking be Ethical? How to become an Ethical Hacker? Skill Profile of an Ethical Hacker What is Vulnerability Research? Why Hackers Need Vulnerability Research? Vulnerability Research Tools Vulnerability Research Websites Secunia (


Related Documents