Table of Contents About this Tutorial ................................................................................................................................. i Audience ................................................................................................................................................ i Prerequisites .......................................................................................................................................... i Copyright & Disclaimer ........................................................................................................................... i Table of Contents .................................................................................................................................. ii 1. ETHICAL HACKING − OVERVIEW ...................................................................................... 1 Types of Hacking.................................................................................................................................... 1 Advantages of Hacking .......................................................................................................................... 1 Disadvantages of Hacking ...................................................................................................................... 2 Purpose of Hacking ................................................................................................................................ 2 2. ETHICAL HACKING − HACKER TYPES ............................................................................. 3 White Hat Hackers ................................................................................................................................. 3 Black Hat Hackers .................................................................................................................................. 3 Grey Hat Hackers ................................................................................................................................... 3 Miscellaneous Hackers .......................................................................................................................... 3 3. ETHICAL HACKING − FAMOUS HACKERS ....................................................................... 5 4. ETHICAL HACKING − TERMINOLOGIES .......................................................................... 9 5. ETHICAL HACKING − TOOLS ............................................................................................ 12 6. ETHICAL HACKING − SKILLS ............................................................................................ 16 Basic Skills ........................................................................................................................................... 16 Courses & Certifications ...................................................................................................................... 16 7. ETHICAL HACKING − PROCESS
Flame, D. (2018). Ethical hacking. Afribary. Retrieved from https://tracking.afribary.com/books/ethical-hacking-9317
Flame, Daniel "Ethical hacking" Afribary. Afribary, 29 Jan. 2018, https://tracking.afribary.com/books/ethical-hacking-9317. Accessed 07 Nov. 2024.
Flame, Daniel . "Ethical hacking". Afribary, Afribary, 29 Jan. 2018. Web. 07 Nov. 2024. < https://tracking.afribary.com/books/ethical-hacking-9317 >.
Flame, Daniel . "Ethical hacking" Afribary (2018). Accessed November 07, 2024. https://tracking.afribary.com/books/ethical-hacking-9317