1. Ethical Hacking Overview

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Hackers

Access computer or networks without the authorization of the owner.

2
New cards

Crackers

Break into systems to steal or destroy data.

3
New cards

Ethical Hacker

Performs similar activities as a hacker, but with permission from the owner or company. Also called “penetration tester”.

4
New cards

Script Kiddies

Individuals who copy code or use tools without understanding how they work. Refers to younger, inexperienced people.

5
New cards

White Box Model

Testing approach in which the tester is given information such as the network topology and the technology used. The tester is permitted to interact with IT personnel and company employees.

6
New cards

Black Box Model

Staff is not aware of this test. Tester is not given diagrams or details about the technologies used. This tests security personnel’s ability to detect an attack.

7
New cards

Gray Box Model

Hybrid of the black and white box model. The company gives partial information to the tester.

8
New cards

Security+

The minimum certification. The prerequisite is Network+ level of knowledge.

9
New cards

PenTest+

Advanced certification that tests skills on planing and scoping an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and report results.

10
New cards

OSCP

An advanced certification that requires students to demonstrate hands-on abilities. It covers network and application exploits.

11
New cards

CEH

Places you on a read team that conducts penetration testing.

12
New cards

OPST

Uses the Open Source Security Testing Methodology Manual as its standardized methodology.

13
New cards

CISSP

Not geared towards technical IT professionals. Tests security-related managerial skills.

14
New cards