70 likes | 208 Views
Ethical Computer Hacker. By: Quan N. 7 th period 4/8/2014. Job Description . Apply hacking skills for protection Protect company networks from unethical and illegal hackers Penetrate the networks to locate weaknesses Repair the weaknesses Ensure networks security
E N D
Ethical Computer Hacker By: Quan N. 7th period 4/8/2014
Job Description • Apply hacking skills for protection • Protect company networks from unethical and illegal hackers • Penetrate the networks to locate weaknesses • Repair the weaknesses • Ensure networks security • Supervise incoming and outgoing data
Requirements • Bachelors degree in Information Technology • Or an advanced diploma in network security • Attend official CEH training • Extensive knowledge of various operating systems • AN expert in Microsoft and Linux servers • Knowledge in the latest penetration software
Salary • Average annual salary: $69,677 • Low end annual salary: $56,930 • High end annual salary: $105,000
Lifestyle • Live in a 3-bedrooms home with 2-bathrooms • Drive a new Mercedes car • Enjoy Disc Golf • Fond of video games • Prefer to be alone
Awesome Facts • Also call “white hat” • Another name is “tiger team” • Known as penetration testing, intrusion testing and red teaming • Possess the same skills as non-ethical hackers • As malicious as hackers • Perform only with victim’s permission • Started in the 1970s • The government employs ethical hackers • Large companies also hired ethical hackers • Many were former “black hat” hackers themselves
Citation Learn The Basics of Ethical Hacking and Penetration Testing Online Courses. 2014. Photograph. Coin PostWeb. 9 Apr 2014. <https://www.coinpost.com/items/microsoldier/learn-the-basics-of-ethical-hacking-and-penetration-testing-online-courses>. Microsoft listed as the contributor of Linux Kernel for the first time.. 2012. Photograph. 4 CastWeb. 10 Apr 2014. <http://www.the4cast.com/2012/04/microsoft-listed-as-the-contributor-of-linux-kernel-for-the-first-time/>. Information Technology Degree . N.d. Photograph. Karma Is Kicking MeWeb. Web. 10 Apr 2014. <http://karma-is-kicking-me.blogspot.com/2013/02/information-technology-degree.html>. Sheehan, Liz. J.S.G. Boggs, $100,000 bill. 2010. Photograph. Art 21Web. 10 Apr 2014. <http://blog.art21.org/2010/05/21/whats-it-worth-artist-and-community-currencies/boggs/>. Martinelli, Paul. Kirkland, QC. N.d. Photograph. Paul Martinelli Real EstateWeb. 10 Apr 2014. <http://www.paulmartinelli.com/web/listing/19-rue-pasquini/>. North Idaho Disc Golf. N.d. Photograph. The Guide to North IdahoWeb. 10 Apr 2014. <http://www.fyinorthidaho.com/play/disc-golf/>. What Is a White Hat Hacker? 5 of the World's Most Famous And Most Influential White Hat Hackers. N.d. Photograph. Magic Soft'sWeb. 10 Apr 2014. <http://magicsoftsblog.blogspot.com/2013/10/what-is-white-hat-hacker-5-of-worlds.html>. Ethical Hacking. 2012. Photograph. Slide ShareWeb. 11 Apr 2014. <http://www.slideshare.net/nitheeshadithyan/ethical-hacking-copy>. Munson, Lee. Determining Whether You Are A Likely Target When It Comes To Black Hat Hackers. N.d. Photograph. Security FAQsWeb. 11 Apr 2014. <http://www.security-faqs.com/determining-whether-you-are-a-likely-target-when-it-comes-to-black-hat-hackers.html>.