Institute of Information Technology of ANAS, Baku, Azerbaijan
The article covers the security of computer networks,
cyber attack methods, cyber attack vectors, hackers, hacker types and
goals, ethical hackers, ethical hacking skills, Kali Linux operating
system, pentesting tools - websploit, nmap, webspoit, penetration test
methodology, practically penetration test on the network.
security assessment, ethical hacker, CEH, Kali Linux,