In this chapter, you will learn about the five phases of ethical hacking and the different types of hacker attacks.
Identify the five phases of ethical hacking.
Identify the different types of hacker attacks.
Ethical Hacking
Companies employ ethical hackers to do what illegal hackers do: exploit vulnerabilities. Ethical hackers also go by the names of security testers or penetration testers . In this chapter, you will take a look at the skills required ...