Category: Ethical Hacking

8.4 – National Security

Man has been at war with each other for centuries now. Initially, it began with killing people and then went to attacking countries with guns, bombs and other dangerous weapons. As technology develops, so do the ways of war, and…
8.3 – Testing Classification

Based on testing methodologies, we can divide penetration testing into three different groups: Black Box Testing White Box Testing Gray Box Testing Let us discuss each type of penetration testing method one by one: Black Box Testing This is the…
8.2 – Hacking Process

The process of ethical hacking can be divided into five distinct phases. An ethical hacker follows procedures similar to those of a malicious attacker. The phase to gain, and maintain access to a computer system, is alike no matter what…
8.1 – Hacking Business

Hackers can be divided into three groups: White Hat: Ethical Hacker (Good Guy) Black Hat: Malicious Hacker (Bad Guy) Gray Hat – Depends on the situation, Good or Bad hacker. White Hat Hackers: These are the ethical hackers, known as…
8.0 – Basics of Hacking

[Though this section looks similar to some portions in the Foundation of Cybersecurity section, the focus of the contents is entirely different] Hacking is the practice of changing a computer software or hardware to achieve a goal outside of the…