1 / 7

Ethical Computer Hacker

Ethical Computer Hacker. By: Quan N. 7 th period 4/8/2014. Job Description . Apply hacking skills for protection Protect company networks from unethical and illegal hackers Penetrate the networks to locate weaknesses Repair the weaknesses Ensure networks security

luther
Download Presentation

Ethical Computer Hacker

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ethical Computer Hacker By: Quan N. 7th period 4/8/2014

  2. Job Description • Apply hacking skills for protection • Protect company networks from unethical and illegal hackers • Penetrate the networks to locate weaknesses • Repair the weaknesses • Ensure networks security • Supervise incoming and outgoing data

  3. Requirements • Bachelors degree in Information Technology • Or an advanced diploma in network security • Attend official CEH training • Extensive knowledge of various operating systems • AN expert in Microsoft and Linux servers • Knowledge in the latest penetration software

  4. Salary • Average annual salary: $69,677 • Low end annual salary: $56,930 • High end annual salary: $105,000

  5. Lifestyle • Live in a 3-bedrooms home with 2-bathrooms • Drive a new Mercedes car • Enjoy Disc Golf • Fond of video games • Prefer to be alone

  6. Awesome Facts • Also call “white hat” • Another name is “tiger team” • Known as penetration testing, intrusion testing and red teaming • Possess the same skills as non-ethical hackers • As malicious as hackers • Perform only with victim’s permission • Started in the 1970s • The government employs ethical hackers • Large companies also hired ethical hackers • Many were former “black hat” hackers themselves

  7. Citation Learn The Basics of Ethical Hacking and Penetration Testing Online Courses. 2014. Photograph. Coin PostWeb. 9 Apr 2014. <https://www.coinpost.com/items/microsoldier/learn-the-basics-of-ethical-hacking-and-penetration-testing-online-courses>. Microsoft listed as the contributor of Linux Kernel for the first time.. 2012. Photograph. 4 CastWeb. 10 Apr 2014. <http://www.the4cast.com/2012/04/microsoft-listed-as-the-contributor-of-linux-kernel-for-the-first-time/>. Information Technology Degree . N.d. Photograph. Karma Is Kicking MeWeb. Web. 10 Apr 2014. <http://karma-is-kicking-me.blogspot.com/2013/02/information-technology-degree.html>. Sheehan, Liz. J.S.G. Boggs, $100,000 bill. 2010. Photograph. Art 21Web. 10 Apr 2014. <http://blog.art21.org/2010/05/21/whats-it-worth-artist-and-community-currencies/boggs/>. Martinelli, Paul. Kirkland, QC. N.d. Photograph. Paul Martinelli Real EstateWeb. 10 Apr 2014. <http://www.paulmartinelli.com/web/listing/19-rue-pasquini/>. North Idaho Disc Golf. N.d. Photograph. The Guide to North IdahoWeb. 10 Apr 2014. <http://www.fyinorthidaho.com/play/disc-golf/>. What Is a White Hat Hacker? 5 of the World's Most Famous And Most Influential White Hat Hackers. N.d. Photograph. Magic Soft'sWeb. 10 Apr 2014. <http://magicsoftsblog.blogspot.com/2013/10/what-is-white-hat-hacker-5-of-worlds.html>. Ethical Hacking. 2012. Photograph. Slide ShareWeb. 11 Apr 2014. <http://www.slideshare.net/nitheeshadithyan/ethical-hacking-copy>. Munson, Lee. Determining Whether You Are A Likely Target When It Comes To Black Hat Hackers. N.d. Photograph. Security FAQsWeb. 11 Apr 2014. <http://www.security-faqs.com/determining-whether-you-are-a-likely-target-when-it-comes-to-black-hat-hackers.html>.

More Related