SlideShare a Scribd company logo
1 of 4
Module 1:
Introduction to
Ethical Hacking
Types of Cyber Hackers
Hacker
Descriptions
• Hackers are described as people who break into systems
with malicious intent
• Ethical Hackers are individuals who perform security tests
in order to identify the vulnerability assessment activities
enabling organisations to further provision enhance
security of their infrastructures
• Ethical Hackers are also known as White Hat Hackers
Hacker
Descriptions
• White Hat Hackers:
Referred to as individuals performing ethical hacking to
identify the system vulnerabilities that can be capitalized by
hackers with malicious intent
• Black Hat Hackers:
Individuals who perform hacking of systems with malicious
intent
• Gray Hat Hackers:
Individuals who are law abiding but occasionally commit
black hat hacking activities
• Suicide Hackers:
Individuals who pursue attacks with full knowledge of the
criminal penalty that will be imposed.
UK - Cyber Defence Academy
• Specialist provider in bespoke classroom, online and self learning
cyber security and cyber defence training.
• Visit us on : www.tech-strategroup.com
• Empower your employees to become aware about cyber security
• Implement bespoke cyber security training programmes for your
employees in alignment to your cyber security strategy,
transformation programmes and projects.
• For more information e-mail us on : info@tech-strategygroup.com

More Related Content

What's hot (20)

Information security introduction
Information security introductionInformation security introduction
Information security introduction
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
Ceh3
Ceh3Ceh3
Ceh3
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
About hackers
About hackersAbout hackers
About hackers
 
Cyber intelligence-services
Cyber intelligence-servicesCyber intelligence-services
Cyber intelligence-services
 
Atm sequrity
Atm sequrityAtm sequrity
Atm sequrity
 
Webinar: True Stories From the Threat Hunting Files
Webinar: True Stories From the Threat Hunting FilesWebinar: True Stories From the Threat Hunting Files
Webinar: True Stories From the Threat Hunting Files
 
Hackers ESP
Hackers ESPHackers ESP
Hackers ESP
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
3min tech talk on cryptography
3min tech talk on cryptography3min tech talk on cryptography
3min tech talk on cryptography
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking a research paper
Ethical hacking a research paperEthical hacking a research paper
Ethical hacking a research paper
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 

Similar to Types of hackers

Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Theko Moima
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Saurabh Upadhyay
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptxInfosectrain3
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical HackerPiotrPatun
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical HackingKoenig Solutions Ltd.
 
A Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingA Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingSrashti Jain
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfisha bajpai
 
Ethical hacking Training in Noida.pdf
Ethical hacking Training in Noida.pdfEthical hacking Training in Noida.pdf
Ethical hacking Training in Noida.pdfisha bajpai
 
Unveiling the World of Ethical Hacking A Course in Kochi.pptx
Unveiling the World of Ethical Hacking A Course in Kochi.pptxUnveiling the World of Ethical Hacking A Course in Kochi.pptx
Unveiling the World of Ethical Hacking A Course in Kochi.pptxridhu5181
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfisha bajpai
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2mubeenm50
 
What Do Ethical Hackers Do.pdf
What Do Ethical Hackers Do.pdfWhat Do Ethical Hackers Do.pdf
What Do Ethical Hackers Do.pdfBytecode Security
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]SiddheshPowar
 
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H..."Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...SkilCamp
 

Similar to Types of hackers (20)

Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1
 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
sourabh_sipPPT.pptx
sourabh_sipPPT.pptxsourabh_sipPPT.pptx
sourabh_sipPPT.pptx
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical Hacker
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking
 
A Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical HackingA Deep Introduction to Ethical Hacking
A Deep Introduction to Ethical Hacking
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdf
 
Ethical hacking Training in Noida.pdf
Ethical hacking Training in Noida.pdfEthical hacking Training in Noida.pdf
Ethical hacking Training in Noida.pdf
 
Unveiling the World of Ethical Hacking A Course in Kochi.pptx
Unveiling the World of Ethical Hacking A Course in Kochi.pptxUnveiling the World of Ethical Hacking A Course in Kochi.pptx
Unveiling the World of Ethical Hacking A Course in Kochi.pptx
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdf
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
What Do Ethical Hackers Do.pdf
What Do Ethical Hackers Do.pdfWhat Do Ethical Hackers Do.pdf
What Do Ethical Hackers Do.pdf
 
ethical Hacking [007]
ethical Hacking  [007]ethical Hacking  [007]
ethical Hacking [007]
 
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H..."Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
 

More from begmohsin

Skills you need to become a ethical hacker
Skills you need to become a ethical hackerSkills you need to become a ethical hacker
Skills you need to become a ethical hackerbegmohsin
 
Attackers process
Attackers processAttackers process
Attackers processbegmohsin
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hackingbegmohsin
 
How hackers collate information about employees
How hackers collate information about employees How hackers collate information about employees
How hackers collate information about employees begmohsin
 
Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma begmohsin
 
Defend your organisation from Cyber Attacks
Defend your organisation from Cyber AttacksDefend your organisation from Cyber Attacks
Defend your organisation from Cyber Attacksbegmohsin
 

More from begmohsin (6)

Skills you need to become a ethical hacker
Skills you need to become a ethical hackerSkills you need to become a ethical hacker
Skills you need to become a ethical hacker
 
Attackers process
Attackers processAttackers process
Attackers process
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
How hackers collate information about employees
How hackers collate information about employees How hackers collate information about employees
How hackers collate information about employees
 
Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma
 
Defend your organisation from Cyber Attacks
Defend your organisation from Cyber AttacksDefend your organisation from Cyber Attacks
Defend your organisation from Cyber Attacks
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 

Types of hackers

  • 1. Module 1: Introduction to Ethical Hacking Types of Cyber Hackers
  • 2. Hacker Descriptions • Hackers are described as people who break into systems with malicious intent • Ethical Hackers are individuals who perform security tests in order to identify the vulnerability assessment activities enabling organisations to further provision enhance security of their infrastructures • Ethical Hackers are also known as White Hat Hackers
  • 3. Hacker Descriptions • White Hat Hackers: Referred to as individuals performing ethical hacking to identify the system vulnerabilities that can be capitalized by hackers with malicious intent • Black Hat Hackers: Individuals who perform hacking of systems with malicious intent • Gray Hat Hackers: Individuals who are law abiding but occasionally commit black hat hacking activities • Suicide Hackers: Individuals who pursue attacks with full knowledge of the criminal penalty that will be imposed.
  • 4. UK - Cyber Defence Academy • Specialist provider in bespoke classroom, online and self learning cyber security and cyber defence training. • Visit us on : www.tech-strategroup.com • Empower your employees to become aware about cyber security • Implement bespoke cyber security training programmes for your employees in alignment to your cyber security strategy, transformation programmes and projects. • For more information e-mail us on : info@tech-strategygroup.com