![[Featured image] An ethical hacker takes notes of data charts from their desktop.](https://images.ctfassets.net/wp1lcwdav1p1/3XPe3Htv4ZcAsrCIjqSFKB/bf4f55841bbc2de96f10ad0d15b4068f/EthicalHacker.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
What Is Ethical Hacking?
Unlike malicious hackers, ethical hackers have the permission and approval of the organization they’re hacking into. Learn how you can build a career from testing the security of the network to fight cybercrime and enhance information security.
March 11, 2022
Article

![[Featured image] A computer forensics employee stands at a workstation with a server unit behind them.](https://images.ctfassets.net/wp1lcwdav1p1/35s1PRkRHKKYMeSmXeQCHx/3d95d3916bb942e71fd6f79e10da7880/ap3reT1Q.jpeg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Feature Image] An aspiring cybersecurity professional prepares for GIAC certification as they progress in their career.](https://images.ctfassets.net/wp1lcwdav1p1/1irvNtmWhEhsxLw3UF3KqL/e1a0fd4023e04f1ee7d4e08040e1367e/GettyImages-1442972530.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)



![[Featured image] Two cybersecurity consultants collaborate at a shared workstation.](https://images.ctfassets.net/wp1lcwdav1p1/43S8ORfWVGWuGjfxfkmEst/e9d2ea17bcc0ca4c628160e83f30e2bc/GettyImages-1171809453.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A person in a black sweater points out an item on a computer screen to a coworker in glasses seated in front of their desktop computer.](https://images.ctfassets.net/wp1lcwdav1p1/7mDPtel266saEy0mjRVtYQ/fced31a3adffe6d6ac0b2833bcf90fa4/security-clearance.jpeg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A solutions architect wearing black overalls and a yellow shirt stands alone in an open office.](https://images.ctfassets.net/wp1lcwdav1p1/5mr7kXigbSSMhnAWo0e7hH/63af10211e71706bcc5c9292fcec23a4/data_architect.png?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] An ethical hacker works from home on their laptop.](https://images.ctfassets.net/wp1lcwdav1p1/2pk90bwP6Qw47qTMeK5pkx/157b02dc588bbab7bbb5186d18aefce0/Ethical_hacking_certification.png?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A team of three cybersecurity specialists sits at a conference table with their laptops, planning an exercise and discussing red team versus blue team tactics.](https://images.ctfassets.net/wp1lcwdav1p1/2B5c45ffdqNnKMYxXVf5is/62df5df66612a09d6697eb240e228b01/Red_team_vs_blue_team.png?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Feature Image] Two computing professionals discuss CCSP certification as they prepare to pursue the credential.](https://images.ctfassets.net/wp1lcwdav1p1/5TNk6W4EOmSujrJWot1QX5/80b2d1f9c43b0e13009b669544184b02/GettyImages-2170543814.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Feature Image] An aspiring computer forensic investigator completes an online assignment as part of their learning path.](https://images.ctfassets.net/wp1lcwdav1p1/5L8kaPbFVeF01pbUPRpd9c/032538c42358857b9dce7db20546bf93/GettyImages-1448474701__1_.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A cybersecurity engineer is sitting at their desk with a laptop open.](https://images.ctfassets.net/wp1lcwdav1p1/1KB3VUJUO0RqFwRoufn0dw/ddbf856d0bef06cabf3069bbdb128761/Is_cybersecurity_hard-converted-from-png.webp?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Feature Image] A learner researches how to become a security architect and the average security architect's salary on a laptop while planning their education and career goals.](https://images.ctfassets.net/wp1lcwdav1p1/1Oyv04NynYAjHRiqoe9Pk5/2e070d7dd3cff6e8da8ce0dfd514c003/GettyImages-1186701227.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
