Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker" was originated. Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer. Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking. A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to understand how systems operate, how they are designed, and then attempt to play with these systems.
To beat a hacker,you need to think like one! Ethical hacking is necessary as it allows to counter attack from malicious hackers by anticipating method used ny them to break into system. As opposed to malicious “black hat” hacking, ethical “white hat” hacking (also called penetration testing) involves using computer hacking skills to identify network security vulnerabilities and patch security holes before anyone can abuse them.
Reason Why Organization Recruit Ethical Hackers 1.To prevent hacker to gaining access to organization's information system 2.To uncover vulnerabilities in the system and explore their potential as risk
1.CEHv9 Module 01 Introduction to Ethical Hacking 2.CEHv9 Module 02 Footprinting and Reconnaissance 3.CEHv9 Module 03 Scanning Networks 4.CEHv9 Module 04 Enumeration 5.CEHv9 Module 05 System Hacking 6.CEHv9 Module 06 Malware Threats 7.CEHv9 Module 07 Sniffing 8.CEHv9 Module 08 Social Engineering 9.CEHv9 Module 09 Denial-of-Service 10.CEHv9 Module 10 Session Hijacking 11.CEHv9 Module 11 Hacking Webservers 12.CEHv9 Module 12 Hacking Web Applications 13.CEHv9 Module 13 SQL Injection 14.CEHv9 Module 14 Hacking Wireless Networks 15.CEHv9 Module 15 Hacking Mobile Platforms 16.CEHv9 Module 16 Evading IDS, Firewalls, & Honeypots 17.CEHv9 Module 17 Cloud Computing 18.CEHv9 Module 18 Cryptography