Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Treehouse

(UPI) Chapter 9: Ethical and Unethical Hacking Course (How To)

via Treehouse

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it

About this Course

In this chapter, the discussion delves into the multifaceted world of hacking, examining both ethical and unethical practices while challenging simplistic media portrayals. It presents a historical overview of hackers, develops systematic taxonomies that differentiate hacker types based on expertise, values, and behavior, and critically analyzes what constitutes ethical hacking in diverse contexts.

Syllabus

Ethical and Unethical Hacking

In this stage, the chapter explores the evolution of the term "hacker," contrasting early hackers who embraced a broad, principled hacker ethic with modern interpretations that often equate hacking with criminal activity.

Chevron 6 steps
  • instruction

    9.2 What Actually Is a 'Hacker'?

  • instruction

    9.2.1 Hackers in the Early Days

  • instruction

    9.2.2 Hackers in the 2000s

  • instruction

    9.2.3 Modern Hackers

  • instruction

    9.2.4 Today's Hackers

  • Quiz 9.2

    5 questions

9.3 Towards a More Systematic Hackers' Classification

In this stage, the chapter proposes a structured taxonomy for classifying hackers based on their expertise, ethical values, modus operandi, and access to resources.

Chevron 4 steps
  • instruction

    9.3.1 A First Taxonomy

  • instruction

    9.3.2 A Second Taxonomy

  • instruction

    9.3.3 Ethical Hacking

  • Quiz 9.3

    5 questions

9.4 Is 'Ethical Hacking' Ethical?

In this stage, the chapter critically examines the ethical dimensions of hacking, questioning whether adherence to business-oriented codes of conduct is sufficient to deem hacking ethical and exploring the complexities of competing ethical values.

Chevron 4 steps
  • instruction

    9.4.1 Inethical, Unethical, and Ethical Hacking

  • instruction

    9.4.2 Competing Ethical Values

  • instruction

    9.4.3 A Pragmatic Best Practice Approach

  • Quiz 9.4

    5 questions

Reviews

Start your review of (UPI) Chapter 9: Ethical and Unethical Hacking Course (How To)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.