{"id":6162,"date":"2021-08-26T08:08:01","date_gmt":"2021-08-26T06:08:01","guid":{"rendered":"https:\/\/immune.institute\/?p=6162"},"modified":"2021-08-26T08:08:01","modified_gmt":"2021-08-26T06:08:01","slug":"hacking-etico-que-es-y-que-debo-aprender-para-ello","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/hacking-etico-que-es-y-que-debo-aprender-para-ello\/","title":{"rendered":"Ethical hacking: What is it and what do I need to learn about it?"},"content":{"rendered":"<p><b>Every day, infinite amounts of data are shared on the web.<\/b><span style=\"font-weight: 400;\"> A free flow of information that, for many, is very profitable for them. In fact, as we have already told you in our <\/span><a href=\"https:\/\/immune.institute\/en\/que-se-necesita-para-trabajar-en-ciberseguridad\/\"><span style=\"font-weight: 400;\">post on cybersecurity<\/span><\/a><span style=\"font-weight: 400;\">a hacker or<strong> hacker<\/strong> is well aware of the value of such information.\u00a0<\/span><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Hackers are computer experts who seek to discover security holes and take over computer networks or systems. They have different roles (ethical, professional, malicious, pecuniary, etc.).<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\">In this way, <\/span><b>we find different types of hackers<\/b><span style=\"font-weight: 400;\">The hackers range from the professional hacker who works in the computer security of companies or public bodies (such as the police) to other types of hackers, whose aims are criminal.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is ethical hacking?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Undoubtedly, one of the professional opportunities in <\/span><a href=\"https:\/\/immune.institute\/en\/para-que-sirve-la-ingenieria-informatica\/\"><span style=\"font-weight: 400;\">computer engineering<\/span><\/a><span style=\"font-weight: 400;\"> is ethical hacking. That is, employing the same strategies, techniques and methods as criminal hackers, but with the aim of helping companies and public entities with their cybersecurity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this way, <\/span><b>An ethical hacker is hired by a company or organisation to detect various cyber security flaws. <\/b><span style=\"font-weight: 400;\">in systems, networks or infrastructures, in order to document, assess and strengthen these gaps.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No doubt about it, <\/span><b>ethical hacking is a highly sought-after job for all types of organisations.<\/b><span style=\"font-weight: 400;\">No matter what sector they work in, all organisations are exposed to cyber-attacks. It is therefore necessary to have experts in ethical hacking on staff.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because, in addition to ethical hackers, there are all kinds of hackers on the net, the vast majority of whom have selfish and malicious motives.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">3 types of hacker<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Did you know that there are 3 <\/span><a href=\"https:\/\/www.eldiario.es\/tecnologia\/hackers-llevan-sombrero-blanco-negro_1_4058060.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">types of hackers<\/span><\/a><span style=\"font-weight: 400;\">? It all depends on the type of hat they wear... Discover the hacker typology below:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. 'Black hat hacker' (Black hat hacker)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This type of hacker is the one everyone has in mind. <\/span><b>A hacker who introduces malware or malicious software into your computer.<\/b><span style=\"font-weight: 400;\">. Viruses, Trojans, worms, spyware... each of them has its own objective: from stealing your personal data (passwords, keys, emails...), to stealing money from your bank account, to hacking your social network profile. Black hat hackers pose a real cyber danger.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Black hats hack for selfish reasons, sometimes even for fun. To do so, they use illegal hacking methods and are therefore prosecuted by the law. That's right: <\/span><b>these hackers are the cause of the cyber-attacks that we, as users, suffer on a daily basis.<\/b><\/p>\n<h3><span style=\"font-weight: 400;\">2. Grey hat hacker<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Secondly, the grey hats straddle the line between \"good and evil\". <\/span><b>They are a hybrid between the 'black hat hacker' and the 'white hat hacker'.<\/b><span style=\"font-weight: 400;\"> This is a type of hacker who does not mind hacking or performing illegal actions, but does so with an intention. Sometimes this is good - with an ethical background - and with the aim of providing information of interest to the public.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, <\/span><b>a grey-hat hacker informs the hacker community about security breaches<\/b><span style=\"font-weight: 400;\">The company itself is also involved in this process. However, this only happens in some cases.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because in others, grey-hat hackers are busy discovering code bugs that they then sell to governments, intelligence services and law enforcement agencies. In other words, they <\/span><b>their altruistic action comes at a price<\/b><span style=\"font-weight: 400;\">. Unlike the 'black hat hacker', grey hats do not attack out of personal vendettas.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. White hat hacker<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Finally, <\/span><b>white hats are those who investigate the network, with the aim of improving its security. <\/b><span style=\"font-weight: 400;\">In fact, they are responsible for informing the 'victim' in question; in order for them to improve their cybersecurity and protect themselves against other types of hackers.<\/span><\/p>\n<p><b>White hackers are the good side of hacking. <\/b><span style=\"font-weight: 400;\">Indeed, we identify ethical hackers in this group. They look for, identify and fix potential cybersecurity flaws, sometimes in a disinterested way, and notify the company in order to patch the hole.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How do you learn ethical hacking?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">With the rise of ethical hacking, IT professionals have specialised in this branch of cybersecurity. At IMMUNE we have the following <\/span><strong><a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\" target=\"_blank\" rel=\"noopener noreferrer\">master's degree in cybersecurity in Madrid<\/a><\/strong><span style=\"font-weight: 400;\">aimed at STEM professionals, so that you can be trained in ethical hacking, or if you prefer to take it online, the <strong><a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\" target=\"_blank\" rel=\"noopener noreferrer\">online master's degree in cybersecurity<\/a><\/strong>.<\/span><\/p>\n<p><b>And you, do you want to become an ethical hacker?<\/b><span style=\"font-weight: 400;\"> Learn all the ins and outs of the network through our training, working in favour of your company's cybersecurity.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Cada d\u00eda, cantidades infinitas de datos son compartidas en la red. Una libre circulaci\u00f3n de informaci\u00f3n que, para muchos, les es muy provechosa. De hecho, como ya te contamos en nuestro post sobre ciberseguridad, un hacker o pirata inform\u00e1tico es muy consciente del valor de dicha informaci\u00f3n.\u00a0 Los hackers son expertos en inform\u00e1tica que buscan [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8103,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-6162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/6162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=6162"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/6162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/8103"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=6162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=6162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=6162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}