1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
-involves legally breaking into computers and
devices to test an organization's defenses.
Also called "white hat" hacking.
Improve security, not exploit it.
Ethical hacking
White Hat Hackers
Work legally to find and fix security flaws.
Black Hat Hackers
Illegal hackers with malicious intent.
Grey Hat Hackers
May violate laws but without malicious intent.
Red Team Members
Simulate real-world attacks.
Blue Team Members
Defend systems against attacks.
Bug Bounty Hunters
Freelancers who report vulnerabilities.
Knowledge of Networking
TCP/IP, firewalls.
OS Proficiency
Linux, Windows.
Web & Database Knowledge
SQL, PHP.
Programming
Python, C/C++.
Tools
Nmap, Metasploit, Wireshark.
Certifications
CEH, OSCP, Security+