100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada
Buscado previamente por ti
edX BCT-Ethical Hacking is a comprehensive online course designed to equip learners with the knowledge and skills necessary to identify and mitigate security vulnerabilities in networks and systems. This course provides a solid foundation in ethical hacki$7.31
Añadir al carrito
edX BCT-Ethical Hacking is a comprehensive online course designed to equip learners with the knowledge and skills necessary to identify and mitigate security vulnerabilities in networks and systems. This course provides a solid foundation in ethical hacki
10 vistas 0 veces vendidas
Grado
EdX BCT-ethical-hacking Try It: Ethical Hacking
Institución
EdX BCT-ethical-hacking Try It: Ethical Hacking
Start your cybersecurity journey by building a strong foundation in ethical hacking theory. Learn about the principles, techniques, and tools used to identify and mitigate security vulnerabilities. These foundational notes will equip you with the knowledge needed to embark on practical hands-on tra...
Ethical Hacking
By Thalia
Ethical hacking is a type of hacking done for good reasons. It's also known as offensive security because
it tests security by using attacking tactics instead of defensive ones.
There are different types of ethical hacking:
Types of Ethical Hacking Description
Network Penetration Network penetration testing is like getting someone to hire you (an ethical hacker)
Testing to try and break into your computer system. Your job is to look for holes in their
computer's defenses and tell them how to patch them up. This way, real hackers
can't steal their important stuff. It's usually known in advance and often assisted by
the defensive side.
Web Application Web Application Penetration Testing Is a more focused type of network penetration
Penetration Testing testing, like instead of checking the foundation of a house it checks and focuses just
on one room AKA It looks for weaknesses in the software that runs an online store,
like finding bugs in the code or ways to trick the software into doing something it
shouldn't.
Cloud Penetration Imagine your house is stored in a big, secure storage facility (the cloud, Microsoft
Testing Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP)). Cloud
penetration testing is like hiring someone to try to break into that storage facility
and your house inside it. They're checking for weaknesses in the facility's security,
as well as the security of your house while it's there.
Red Teaming Red Teaming aims to simulate a real-world attack to test the overall security
posture. It’s more creative and adaptive in assessing the organization's ability to
detect, respond, and recover from an attack. This is like penetration testing but
without giving prior notice to the defensive team.
Blue Teaming Blue teaming is the defensive counterpart to red teaming. Acts as the first line of
defense, protecting the organization's network infrastructure and data from the red
team / hackers by implementing and maintaining security controls.
Purple Teaming Purple teaming is like combining the skills of a hacker (red team) and a security
guard (blue team). The goal is to improve the organization's overall security posture
by learning from simulated attacks and strengthening defenses.
Vulnerability Auditing vulnerability auditing is the process of scanning a system or network for weaknesses
that could be exploited by hackers. It's like looking for holes in your computer's
armor. By identifying these vulnerabilities, you can fix them before they're used to
attack your system.
Exploit Development exploit development is actually the process of creating a tool or technique to take
advantage of a known vulnerability.
Ex. Imagine you're a locksmith hired to test the security of houses you might find a
house with a door that can be opened with a paperclip. That's a vulnerability. Your
job as a locksmith is to figure out exactly how to open that door with a paperclip.
Once you know how, you can inform the homeowner about the problem so they
can replace the lock.
, • Client: This is YOU: your computer or device (like your phone or tablet). It sends
requests for retrieving data, submitting a form or updating info along with anything it
wants to be done to the server with clicks or using links.
• Server: This is a powerful computer that stores information and runs applications. It
responds to requests from clients.
(Traditionally, these servers were located
within a company's physical building. However,
with the rise of cloud computing, many
businesses now store their servers on remote
computers managed by cloud service
providers.)
When you do something on a website (like clicking a
link or submitting a form), your computer sends a
message to the website's computer asking for
something to happen.
The website's computer gets your message and figures
out what to do. It checks its information, does any
necessary calculations, and gets ready to send you a
reply.
Server sends a response: Once the server has processed
the request, it generates a response containing the
requested data or the outcome of the operation. The
response is typically formatted using standard protocols
such as HTTP (Hypertext Transfer Protocol).
Your computer gets the answer and shows it to you.
When your computer receives the information from the
website, it displays it on your screen. This could be a
new page, an updated page, or an error message.
And you do it all over again
with every click
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller thalia123. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for $7.31. You're not tied to anything after your purchase.