© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2021
A. SheikhCertified Ethical Hacker (CEH) Preparation Guidehttps://doi.org/10.1007/978-1-4842-7258-9_1

1. Introduction to Ethical Hacking

Ahmed Sheikh1  
(1)
Miami, FL, USA
 

In this chapter, you will learn about the five phases of ethical hacking and the different types of hacker attacks.

By the end of this chapter, you will be able to
  • Identify the five phases of ethical hacking.

  • Identify the different types of hacker attacks.

Ethical Hacking

Companies employ ethical hackers to do what illegal hackers do: exploit vulnerabilities. Ethical hackers also go by the names of security testers or penetration testers . In this chapter, you will take a look at the skills required ...

Get Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.