• Post category:StudyBullet-3
  • Reading time:6 mins read


Introduction to Cyber Security Step By Step to start your Career

What you will learn

What is Cyber Security

The CIA triad

Security Terminologies

Types of Hackers

Cyber Security Attacks

Top 10 Cyber Threats

Cyber Security Careers


Get Instant Notification of New Courses on our Telegram channel.


10 Best Practices on Cyber Security

Description

What is ethical hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

Also known as “white hats,” ethical hackers are security experts that perform these assessments. The proactive work they do helps to improve an organization’s security posture. With prior approval from the organization or owner of the IT asset, the mission of ethical hacking is opposite from malicious hacking.

How are ethical hackers different than malicious hackers?

Ethical hackers use their knowledge to secure and improve the technology of organizations. They provide an essential service to these organizations by looking for vulnerabilities that can lead to a security breach.

An ethical hacker reports the identified vulnerabilities to the organization. Additionally, they provide remediation advice. In many cases, with the organization’s consent, the ethical hacker performs a re-test to ensure the vulnerabilities are fully resolved.

Malicious hackers intend to gain unauthorized access to a resource (the more sensitive the better) for financial gain or personal recognition. Some malicious hackers deface websites or crash backend servers for fun, reputation damage, or to cause financial loss. The methods used and vulnerabilities found remain unreported. They aren’t concerned with improving the organizations security posture.

English
language

Content

Introduction to Cyber Security
What is Cyber Security
The CIA triad
Security Terminologies
Types of Hackers
Hacking Methodology
Cyber Security Attacks
Cyber Security Malwares
Cyber Security Defenses
Cyber Warfare
The Attack Against Estonia
Stuxnet and the Attack Against Iran
The Sony Hack
Cyber Security Careers
Top 10 Cyber Threats
10 Best Practices on Cyber Security