The Hacker - Tales of a Modern Superhero

By Bruce Harmon, Ph.D., CTU Doctoral Chair of Computer Science

CTU Computer Science Degree - The HackerHackers are generally thought of as devious criminals who crack into top-secret government files, or spread nasty computer viruses. The devious reputation of hackers is somewhat deserved – breaking into computer networks is illegal, after all. But there’s another type of hacker with a good reputation for doing this exact thing, albeit for less self-serving purposes.

Ethical Hacker?

Ethical hackers, also known as penetration testers, help protect computer systems from unauthorized hackers. Ethical hackers are hired by government agencies or private companies to test computer networks for security threats and vulnerabilities. Once the ethical hacker identifies a system’s weak points using the same tactics as illegal hackers do, the system owner can fix them.

Ethical hackers typically have experience in IT security, so they know what makes computer systems strong as well as weak. To become an ethical hacker, they also learn how to do things that would be illegal, if they were unauthorized to perform such tasks, including:

  • Identifying and scanning networks
  • Decoding wireless encryption
  • Attacking Web servers, websites and computer applications using methods like SQL injection, buffer overflow and more
  • Creating and using malware such as worms and viruses

The testing doesn’t stop at computers either. Ethical hackers even test people through “social engineering.” Social engineering involves manipulating people into giving confidential information that would allow an unauthorized hacker to gain an advantage. For example, an ethical hacker might send out a covert email to employees, asking them for their login information.

Want to Become a Certified Ethical Hacker?

Yes, you can actually obtain certification as an ethical hacker. The Certified Ethical Hacker (CEH) certification is offered by the International Council of Electronic Commerce Consultants, or EC-Council. To obtain CEH certification, you’ll need at least two years of IT security experience. You can study for the test through EC-Council-approved courses and study materials.

If you’ve ever had your personal information hacked, you know how much of a relief it was to see your information back safe where it belonged, in your hands and not a hackers. You, too, can gain the skills to protect others from the pervasive threat.

CTU Faculty - Bruce HarmonBruce Harmon, Ph.D., is the University Doctoral Chair of Computer Science at Colorado Technical University. He earned a Ph.D. in Electrical Engineering with a minor in Computer Science from the University of Colorado and his M.S. in Aeronautical Engineering from Purdue University. He earned a B.S. in Aeronautical Engineering at the United States Air Force Academy. After 9 years in the Air Force, he worked in defense and later at top-tier commercial companies for 17 years both in research and executive leadership positions. Learn why he’s IN.

Stay in the know.

Subscribe to CTU’s blog and receive fresh updates directly to your inbox. Join us.

Image credit:

Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.

Privacy Statement Legal Terms and Conditions Student Disclosures Sitemap Student Safety Contact Us

 (855) 230-0555

Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×