Can Ethical Hacking Create Hackers?

Hacking is a double-edged sword. As you already know, hacking means to breach into a system without proper authorisation with an intent to manipulate or misuse it. It is nothing but a menace and a dangerous threat to the entire digital world. However, hacking has also been used to counter its own threats. Ethical hacking has proved to be an effective medicine, or rather vaccine, against cyber attacks. As more and more ethical hackers are rising up to fight cyber crime all over the world, brightening the digital future of our age, there also rises a slight problem in this process. This article’s objective is to highlight the same issue: Can ethical hacking create hackers?

Can Ethical Hacking Create Hackers?

Ethical hacking training programs are designed to teach students the methodologies of hacking. Anyone can learn ethical hacking if they have the required technical aptitude and educational background necessary to understand what happens at the backstage of software, hardware, networks and other digital infrastructure. Ethical hacking is an offensive approach against cyber crime meaning that ethical hackers are taught how to think like a criminal hacker. This also means that teaching ethical hacking includes providing students with all the tools, techniques, tips, and tricks to breach into systems. We can think of it as a classroom where students are given an insight into the mind of the very evil.

This brings us to the issue’s essence. How does one guarantee that the students who are taking the coaching to become white hat hackers will not turn out to become black hat ones? How can teachers guarantee that their students won’t end up as the very evil they are trying to fight against in those classrooms? The only difference between a white hat and a black hat is their intention. And there is no way to ensure that these students won’t choose the wrong side after learning about the fancy, shining and exciting world of hacking. It is true that ethical hacking coaching is like giving an AK-47 to the trainees. However, it is also true that most students and professionals who want to learn white hat hacking and who choose to come into this profession, do it out of a genuine passion for the vocation. This means that in cybersecurity classrooms, be they physical or virtual, more protectors are created than destroyers, and that is a thing to celebrate. The world is already infested with so many malicious hackers, that we need as many protectors and cybersecurity professionals as we can. After all, we all know that those with malicious intent are more motivated than those with benevolent intent.

On the contrary to this issue’s core, there have also been examples where certain black hat hackers have converted to white hat ones. Kevin Mitnick, one of the famous black hat hackers who was even arrested for his crimes back in 1995 has now become an ethical hacker using his skills for noble purposes as a security consultant. Another example is that of Kevin Poulsen, a convicted hacker who along with various other crimes, hacked into a radio station to win himself a car and prize money, has now turned into a white hat, using his skills for catching bad guys and working for Wired.

To sum up, it can be said that there is both good and bad co-existing in the digital world. Even though we can’t guarantee that students who are enrolled in ethical hacking programs like CEH will use their skills exclusively for the good, but we can certainly hope that the training methods applied are focussed on emphasizing the importance of the profession in a way that learners can imbibe the need and essence of cybersecurity in their very core.


Review Can Ethical Hacking Create Hackers?. Cancel reply

Mir Baquer Ali

Published by
Mir Baquer Ali

Recent Posts

4 Image File Extensions and When to Use Them

Image File Extensions - You'll need to know the various image extensions and when to… Read More

July 27, 2021

What are the most important differences between the functional and the non-functional testing systems?

The functional and the non-functional testing systems are equally important for launching any kind of… Read More

July 27, 2021

What is an API Gateway and Why is it Important?

An API (Applications Programming Interface) gateway is a software management tool that is responsible for… Read More

July 27, 2021

8 Important Facts About Solar Panel Technology

Are you considering solar energy? Solar panel technology paved the way for sustainable energy transmission. Right… Read More

July 26, 2021

What Role Does SAP GRC Play in Risk Management?

Risk management is a serious issue in this new world of cybercrime. Today, nearly 61%… Read More

July 25, 2021

How to Build a Sales Funnel

Sales Funnel  - One of the most important concepts to understand when starting a business… Read More

July 13, 2021