Ethical Hacking and Cybeer Security
Ethical Hacking and Cybeer Security
BY
MAY, 2017
1
TABLE OF CONTENT
Title Page
Title page i
Table of content ii
CHAPTER ONE:
INTRODUCTION
1.1 Background of Ethical Hacking and Cyber security 1
1.2 Aims and Objectives of Ethical Hacking 2
1.3 Advantages of the Ethical Hacking 2-3
1.4 Limitation of the Ethical Hacking 3-4
1.5 Definition of Terms 4
CHAPTER TWO:
LITERATURE REVIEW
2.1 Historical Background of Ethical Hacking and cyber security 5-7
CHAPTER THREE:
DISCUSSION
3.1 8-9
CHAPTER FOUR:
CONCLUSION
4.1 Conclusion 15
REFERENCES 16