1969 - The Advanced Research Projects Agency (ARPA) create the ARPANET, the forerunner of the Internet. The first four nodes (networks) of ARPANET consisted of the University of California Los Angeles, University of California Santa Barbara, University of Utah and the Stanford Research Institute.
1983 - The Internet is founded by splitting the Arpanet into separate military and civilian networks.
1983 - FidoNet is developed by Tom Jennings. FidoNet will become the most widespread information exchange network in the world for the next 10 years, until the Internet takes over.
1989 - the WWW is developed at CERN labs, in Switzerland.
The explosive growth of the Internet has brought many good things…As with most technological advances, there is also a dark side: criminal hackers.
HACKER noun. 1. A person who enjoys learning the details of computer systems and how to stretch their capabilities…. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming.
Hacking : The rapid crafting of a new program or making changes to the existing, usually complicated software
Script Kiddies or Cyber-Punks: Between 12-30; predominantly white and male; bored in school; get caught due to bragging online; intent is to vandalize or disrupt systems.
Professional Criminals or Crackers: Make a living by breaking into systems and selling the information.
Coders and Virus Writers: See themselves as an elite; programming background and write code but won’t use it themselves; have their own networks called “zoos”; leave it to others to release their code into “The Wild” or Internet. ( www.tlc.discovery.com )
1960s: The Dawn of Hacking MIT becomes home to the first computer hackers, who begin altering software and hardware to make it work better and/or faster.
1970s: Phone Phreaks and Cap'n Crunch: One phreak, John Draper (aka "Cap'n Crunch"), discovers a toy whistle inside Cap'n Crunch cereal gives 2600-hertz signal, and can access AT&T's long-distance switching system. Draper builds a "blue box" used with whistle allows phreaks to make free calls.
Steve Wozniak and Steve Jobs, future founders of Apple Computer, make and sell blue boxes.
1980s: Hacker Message Boards and Groups Hacking groups form; such as Legion of Doom (US), Chaos Computer Club (Germany).
1983: Kids' Games Movie "War Games" introduces public to hacking.
1990s: Why Buy a Car When You Can Hack One? Radio station call-in contest; hacker-fugitive Kevin Poulsen and friends crack phone; they allegedly get two Porsches, $20,000 cash, vacation trips; Poulsen now a freelance journalist covering computer crime.
First Def Con hacking conference in Las Vegas
1995: The Mitnick Takedown: Arrested again; charged with stealing 20,000 credit card numbers.
1995: Russian Hackers Siphon $10 million from Citibank; Vladimir Levin, leader.
1999 hackers attack Pentagon, MIT, FBI web sites.
damage through attacks on government and military computer systems has been calculated at between $1.5 and $1.8 Billion for 1999
1999: E-commerce company attacked; blackmail threats followed by 8 million credit card numbers stolen.
May: The ILOVEYOU worm, also known as VBS/Loveletter and Love Bug worm, is a computer worm written in VBScript. It infected millions of computers worldwide within a few hours of its release.
September: teenage hacker Jonathan James becomes first juvenile to serve jail time for hacking.
Microsoft becomes the prominent victim of a new type of hack that attacks the domain name server . In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted.
August: Code Red worm , infects tens of thousands of machines.
August: Researcher Chris Paget publishes a paper describing " shatter attacks ", detailing how Windows' unauthenticated messaging system can be used to take over a machine. The paper raises questions about how securable Windows could ever be.
October: The International Information Systems Security Certification Consortium - (ISC)2 - confers its 10,000th CISSP certification.
March: CULT OF THE DEAD COW and Hacktivismo are given permission by the United States Department of Commerce to export software utilizing strong encryption.
March: Myron Tereshchuk is arrested for attempting to extort $17 million from Micropatent .
July: North Korea claims to have trained 500 hackers who successfully crack South Korean, Japanese, and their allies' computer systems. 
September 13 : Cameron Lacroix is sentenced to 11 months for gaining access to T-Mobile USA's network and exploiting Paris Hilton's Sidekick . 
November 3 : Jeanson James Ancheta , whom prosecutors say was a member of the "Botmaster Underground", a group of script kiddies mostly noted for their excessive use of bot attacks and propagating vast amounts of spam , was taken into custody after being lured to FBI offices in Los Angeles. 
May: Jeanson James Ancheta receives a 57 month prison sentence,  and is ordered to pay damages amounting to $15,000.00 to the Naval Air Warfare Center in China Lake and the Defense Information Systems Agency, for damage done due to DDoS attacks and hacking. Ancheta also had to forfeit his gains to the government, which include $60,000 in cash, a BMW, and computer equipment  .
May: Largest Defacement in Web History is performed by the Turkish hacker iSKORPiTX who successfully hacked 21,549 websites in one shot. 
October: Jesus Oquendo releases Asteroid, a SIP Denial of Service testing tool. It broke all versions of Asterisk until 1.2.13. Asteroid is also known to affect certain SIP Softphones, SIP Phones and possibly other products using the SIP protocol. It was used in Henning Schulzrinne 's Columbia University seminars. See MITRE CVE-2006-5444 and CVE-2006-5445
May 17: Estonia recovers from massive denial-of-service attack 
June 13: FBI Operation Bot Roast finds over 1 million botnet victims
June 21: A spear phishing incident at the Office of the Secretary of Defense steals sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD.
August 11: United Nations website hacked by Turkish Hacker Kerem125
October 7: Trend Micro website successfully hacked by Turkish hacker Janizary(a.k.a Utku)
November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictments
Ethical hacking – defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems, operating environments.”
With the growth of the Internet, computer security has become a major concern for businesses and governments.
In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
International council of electronic commerce consultants
Most successful and rapidly growing IT security and certification providers
Standardized the concept of “Ethical Hacking”
EC-Council was the first to provide certification standards for these “Ethical Hackers”
EC-Council has trained more than 60,000 IT professionals, with over 20,000 earning a certification
EC-Council has certified IT professionals from the following organizations as CEH:
Novell, Canon, Hewlett Packard, US Air Force Reserve, US Embassy, Verizon, PFIZER, HDFC Bank, University of Memphis, Microsoft Corporation, Worldcom, Trusecure, US Department of Defense, Fedex, Dunlop, British Telecom, Cisco, Supreme Court of the Philippines, United Nations, Ministry of Defense, UK, Nortel Networks, MCI, Check Point Software, KPMG, Fleet International, Cingular Wireless, Columbia Daily Tribune, Johnson & Johnson, Marriott Hotel, Tucson Electric Power Company, Singapore Police Force
(Cont.) PriceWaterhouseCoopers, SAP, Coca-Cola Corporation, Quantum Research, US Military, IBM Global Services, UPS, American Express, FBI, Citibank Corporation, Boehringer Ingelheim, Wipro, New York City Dept Of IT & Telecom – DoITT, United States Marine Corps, Reserve Bank of India, US Air Force, EDS, Bell Canada, SONY, Kodak, Ontario Provincial Police, Harris Corporation, Xerox, Philips Electronics, U.S. Army, Schering, Accenture, Bank One, SAIC, Fujitsu, Deutsche Bank