<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Definition_of_Ethical_Hacking_%28en%29</id>
	<title>Definition of Ethical Hacking (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Definition_of_Ethical_Hacking_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Definition_of_Ethical_Hacking_(en)&amp;action=history"/>
	<updated>2026-04-20T07:11:14Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Definition_of_Ethical_Hacking_(en)&amp;diff=70921&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;==Ethical Hacking: A Protective Shield for the Digital World==  &#039;&#039;&#039;What is Ethical Hacking?&#039;&#039;&#039;  Ethical hacking is the practice of using hacking techniques to identify and fix...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Definition_of_Ethical_Hacking_(en)&amp;diff=70921&amp;oldid=prev"/>
		<updated>2024-10-19T01:26:26Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==Ethical Hacking: A Protective Shield for the Digital World==  &amp;#039;&amp;#039;&amp;#039;What is Ethical Hacking?&amp;#039;&amp;#039;&amp;#039;  Ethical hacking is the practice of using hacking techniques to identify and fix...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==Ethical Hacking: A Protective Shield for the Digital World==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;What is Ethical Hacking?&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Ethical hacking is the practice of using hacking techniques to identify and fix security vulnerabilities in computer systems, networks, or applications. Imagine a doctor examining a patient&amp;#039;s body to find illnesses. Well, ethical hackers are like doctors for computer systems; they search for &amp;quot;illnesses&amp;quot; (vulnerabilities) in systems to then treat (fix) them.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Why should we learn ethical hacking?&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Prevent attacks:&amp;#039;&amp;#039;&amp;#039; By understanding how attacks work, we can create more secure systems.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Improve systems:&amp;#039;&amp;#039;&amp;#039; We can find and fix system weaknesses before malicious hackers exploit them.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Enhance cybersecurity:&amp;#039;&amp;#039;&amp;#039; Become part of the global effort to make the digital world safer.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;What is learned in an ethical hacking course?&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Fundamentals of computer security:&amp;#039;&amp;#039;&amp;#039; Understanding basic concepts such as networks, operating systems, and information security.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Types of attacks:&amp;#039;&amp;#039;&amp;#039; Learning about various types of cyberattacks, from simple to complex.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Hacking tools:&amp;#039;&amp;#039;&amp;#039; Getting to know various tools used for security testing.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Testing methods:&amp;#039;&amp;#039;&amp;#039; Learning how to conduct penetration testing to find vulnerabilities.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Ethics in hacking:&amp;#039;&amp;#039;&amp;#039; Understanding the importance of ethics in conducting security testing.&lt;br /&gt;
&lt;br /&gt;
==Examples of activities in an ethical hacking course:==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Learning theory:&amp;#039;&amp;#039;&amp;#039; Listening to lectures about security concepts.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Practice:&amp;#039;&amp;#039;&amp;#039; Practicing using hacking tools in a safe environment.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Completing assignments:&amp;#039;&amp;#039;&amp;#039; Writing reports on test results or analyzing cyberattack cases.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Projects:&amp;#039;&amp;#039;&amp;#039; Creating final projects such as developing security tools or conducting penetration testing on specific systems.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;In essence, ethical hacking is a crucial skill for protecting our data and systems from cyberattacks.&amp;#039;&amp;#039;&amp;#039; By learning ethical hacking, we can not only protect ourselves but also contribute to safeguarding the digital world. &lt;br /&gt;
&lt;br /&gt;
==Relevant Link:==&lt;br /&gt;
* [[Ethical Hacking]]&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>