Well ethical hackers are the persons who are actually carrying out ethical hacking. So, talking about ethical hacking, there are some terminology, let us see. And if you are able to penetrate which are the points through which it is easier to penetrate, these are the objectives ok, all right. Well, you can understand penetration testing, the literal meaning of this phrase is, you are trying to penetrate into a system you are trying to penetrate into a network, you are testing and find out whether or not you are able to penetrate. This ethical hacking is sometimes also referred to by some other names, penetration testing is a well-known terminology which is used - a phrase, intrusion testing, red teaming, these are also terminologies which are used to mean the same thing. Well, you have a good intent, you try to identify the weaknesses and later on maybe the organization will be trying to plug out or stop those weaknesses, so that such attacks cannot occur or happen in the future ok. Your objective is to try and find out the vulnerabilities and weak points in your network. This term is important, by replicating the intent and actions of malicious hackers, whatever malicious hackers do in reality, you try to mimic that, you try to replicate that ok. But how this is done, this is done by mimicking the behaviour of a real hacker as if you are a hacker, you are trying to break into your own network, there you will get lot of information about what are the weak points in your own network. So, this ethical hacking is the act of locating weaknesses and vulnerabilities in computers and information system in general, it covers everything, it covers networks, it cover databases, everything. Now, you try a, I mean here you are trying to find out, whether your infrastructural network does have some weak points or vulnerabilities through which an actual hacker can break into your system, into your network. It means suppose you have a network, you have an organizational network, you have an IT, IT infrastructure, you have computers which contains some software, some data, lot of things are there. Well, ethical hacking as per the definition if you just look at it, it essentially refers to locating the weaknesses and vulnerabilities. I mean as if the person is always trying to do some harm to somebody else to some other networks, try to steal something, trying to steal something from some IT infrastructure and so on and so forth.īut ethical hacking is something different. Well, when we hear about somebody as a hacker, we are a little afraid and cautious ok. What exactly is ethical hacking? Well, we all have heard the term hacking and hacker essentially the term has been associated with something which is bad and malicious. So, let us first start with the definition of ethical hacking. And some of the roles of an ethical hacker, what an ethical hacker is expected to do and what he or she is not expected to do that we shall try to distinguish and discuss. Now, in this lecture as I told you, firstly we shall try to tell you what is ethical hacking? There is a related terminological penetration testing, we will also be discussing about that.