Download presentation
Presentation is loading. Please wait.
Published byRudolph Percival Holt Modified over 9 years ago
1
By: Quan N. 7 th period 4/8/2014
2
Apply hacking skills for protection Protect company networks from unethical and illegal hackers Penetrate the networks to locate weaknesses Repair the weaknesses Ensure networks security Supervise incoming and outgoing data
3
Bachelors degree in Information Technology Or an advanced diploma in network security Attend official CEH training Extensive knowledge of various operating systems AN expert in Microsoft and Linux servers Knowledge in the latest penetration software
4
Average annual salary: $69,677 Low end annual salary: $56,930 High end annual salary: $105,000
5
Live in a 3-bedrooms home with 2-bathrooms Drive a new Mercedes car Enjoy Disc Golf Fond of video games Prefer to be alone
6
Also call “white hat” Another name is “tiger team” Known as penetration testing, intrusion testing and red teaming Possess the same skills as non-ethical hackers As malicious as hackers Perform only with victim’s permission Started in the 1970s The government employs ethical hackers Large companies also hired ethical hackers Many were former “black hat” hackers themselves
7
Learn The Basics of Ethical Hacking and Penetration Testing Online Courses. 2014. Photograph. Coin PostWeb. 9 Apr 2014.. Microsoft listed as the contributor of Linux Kernel for the first time.. 2012. Photograph. 4 CastWeb. 10 Apr 2014.. Information Technology Degree. N.d. Photograph. Karma Is Kicking MeWeb. Web. 10 Apr 2014.. Sheehan, Liz. J.S.G. Boggs, $100,000 bill. 2010. Photograph. Art 21Web. 10 Apr 2014.. Martinelli, Paul. Kirkland, QC. N.d. Photograph. Paul Martinelli Real EstateWeb. 10 Apr 2014.. North Idaho Disc Golf. N.d. Photograph. The Guide to North IdahoWeb. 10 Apr 2014.. What Is a White Hat Hacker? 5 of the World's Most Famous And Most Influential White Hat Hackers. N.d. Photograph. Magic Soft'sWeb. 10 Apr 2014.. Ethical Hacking. 2012. Photograph. Slide ShareWeb. 11 Apr 2014.. Munson, Lee. Determining Whether You Are A Likely Target When It Comes To Black Hat Hackers. N.d. Photograph. Security FAQsWeb. 11 Apr 2014..
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.