
You will learn the various technologies and meth- odologies involved in becoming an ethical hacker. You will learn what it means to become an ethical hacker and the respon-
sibilities you will be assuming both technically and ethically when you take on this role.
The reality of your taking on the ethical hacker skill set is that companies and enterprise environments have had to quickly and effectively address the threats and vulnerabilities that they face. Through a robust and effective combination of technological, administra- tive, and physical measures, all these organizations have learned to address their given situ- ation and head off major problems. Technologies such as virtual private networks (VPNs), cryptographic protocols, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), access control lists (ACLs), biometrics, smart cards, and other devices have helped security. Administrative countermeasures such as policies, procedures, and other rules have also been strengthened and implemented over the past decade. Physical measures include cable locks, device locks, alarm systems, and similar devices. Your new role as an ethical hacker will deal with all of these items, plus many more.
As an ethical hacker you must not only know the environment you will be working in, but also how to find weaknesses and address them as needed. However, before we get to all of that this chapter discusses the history of hacking and what it means to be an ethical hacker. We’ll also look the process of penetration testing and explore the importance of contracts.
Join Certified Ethical Hacker Course