DIAGRAM 2 INITIAL IDEA



(Authors work)

This diagram here shows what ethical hackers do, starting from the  vulnerability and penetration testing to gain access and to scan to gather intelligence followed by hide tracks and analyze and report.

Comments

Popular posts from this blog

SOFTWARE/HARDWARE SKILLS

CASE STUDY (LITERATURE REVIEW)