A hacker's actions can be broken down into six phases, including pre-attack and attack phases:
Performing Reconnaissance.
Scanning and enumeration.
Gaining access.
Escalation of privilege.
Maintaining access.
Covering tracks and placing backdoors.
The key concepts in ethical hacking are:
Testing for vulnerabilities
Penetration testing
Incident response
Ethical hacking terms are used by hackers to describe the process of testing a computer or network for vulnerabilities.
The terms include:
Scanning
Vulnerability
Penetration testing
Social engineering
Learner's Ratings
4.6
Overall Rating
82%
6%
4%
1%
7%
Reviews
M
Md Tanjimul Islam Sifat
5
I think learn vern is the best free learning online platform.😊🥰🥰
S
shivansh sharma
5
NICE
B
Boss
5
best
H
Huraira mughal
5
Very much informative thanks 👍
N
Nishant Vhora
5
dear sir apne kali linux me jo do terminal chalu kiaye the usme scann kar ne ke liye rakha tha vo apne dikha ya hi nahi
V
VIKAS
5
Sir , your lectures are so amazing , easy to learn and super easy to understand . Thank you so much sir
sir please check the chapter Anonymous Browsing and Stegeganography video number 1 and 2 r same
A
AAQIB SHAIKH
5
SIR plz tell me is the GOOGLE CLOUD CONSOLE completely free
R
Raaz
5
best course
A
Akshay M
4
everything is good but they should provide class notes in form of ppt or pdf
S
Shivam
5
couse is very best
Show More
Recommended Courses
Cyber Forensics Masterclass with Hands on learning
Share a personalized message with your friends.