O'Reilly logo

Hands-On Ethical Hacking and Network Defense by James E. Corley, Kent Backman, Michael T. Simpson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 1ETHICAL HACKING OVERVIEW

After reading this chapter and completing the activities, you will be able to:

Image Describe the role of an ethical hacker

Image Describe what you can do legally as an ethical hacker

Image Describe what you can’t do as an ethical hacker

The term “ethical hacker” might seem like an oxymoron—sort of like an ethical pickpocket or ethical embezzler. In this chapter, you learn that ethical hackers are employed or contracted by a company ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required