What is Ethical Hacking?

AdultComputer Science60 min

Learning Objective

I can define ethical hacking and its importance in cybersecurity. I can identify the different types of threats that companies have to guard against.

Lesson Flow

Watch Video

12 min

Hackers & Cyber Attacks: Crash Course Computer Science #32

CrashCourse

Guided Notes

12 min

Key concepts students will learn:

  • Social engineering involves tricking users into divulging confidential information or configuring systems to allow attackers entry, with phishing and pretexting being common types of attacks.

  • A buffer overflow attack occurs when input exceeds the buffer's capacity, potentially crashing the system or allowing attackers to inject malicious code, while code injection involves inserting malicious commands, often in SQL, to manipulate databases.

  • Hackers exploit vulnerabilities, sometimes using zero-day exploits before patches are available, and can create botnets from compromised computers for activities like DDoS attacks, highlighting the importance of cybersecurity practices and software updates.

Practice

18 min

12 questions • Multiple choice & Short answer

Exit Ticket

5 min

Define ethical hacking and explain its importance in maintaining cybersecurity for companies. List three distinct types of threats that companies must defend against, as discussed in the video.

Teacher Guide

Get the complete package:

  • Answer keys for all questions
  • Differentiation strategies
  • Extension activities
  • Printable student handouts