By: Quan N. 7 th period 4/8/2014
Apply hacking skills for protection Protect company networks from unethical and illegal hackers Penetrate the networks to locate weaknesses Repair the weaknesses Ensure networks security Supervise incoming and outgoing data
Bachelors degree in Information Technology Or an advanced diploma in network security Attend official CEH training Extensive knowledge of various operating systems AN expert in Microsoft and Linux servers Knowledge in the latest penetration software
Average annual salary: $69,677 Low end annual salary: $56,930 High end annual salary: $105,000
Live in a 3-bedrooms home with 2-bathrooms Drive a new Mercedes car Enjoy Disc Golf Fond of video games Prefer to be alone
Also call “white hat” Another name is “tiger team” Known as penetration testing, intrusion testing and red teaming Possess the same skills as non-ethical hackers As malicious as hackers Perform only with victim’s permission Started in the 1970s The government employs ethical hackers Large companies also hired ethical hackers Many were former “black hat” hackers themselves
Learn The Basics of Ethical Hacking and Penetration Testing Online Courses Photograph. Coin PostWeb. 9 Apr Microsoft listed as the contributor of Linux Kernel for the first time Photograph. 4 CastWeb. 10 Apr Information Technology Degree. N.d. Photograph. Karma Is Kicking MeWeb. Web. 10 Apr Sheehan, Liz. J.S.G. Boggs, $100,000 bill Photograph. Art 21Web. 10 Apr Martinelli, Paul. Kirkland, QC. N.d. Photograph. Paul Martinelli Real EstateWeb. 10 Apr North Idaho Disc Golf. N.d. Photograph. The Guide to North IdahoWeb. 10 Apr What Is a White Hat Hacker? 5 of the World's Most Famous And Most Influential White Hat Hackers. N.d. Photograph. Magic Soft'sWeb. 10 Apr Ethical Hacking Photograph. Slide ShareWeb. 11 Apr Munson, Lee. Determining Whether You Are A Likely Target When It Comes To Black Hat Hackers. N.d. Photograph. Security FAQsWeb. 11 Apr