1 00:00:00,730 --> 00:00:08,230 In this video, we will talk about why the attackers in comparison of black attackers, white attackers 2 00:00:08,230 --> 00:00:10,630 are deemed to be good guys. 3 00:00:11,350 --> 00:00:16,300 They work with organizations to strengthen the security of our system. 4 00:00:17,410 --> 00:00:24,010 Whitehead has a permission to engage the target and to compromise them within the prescribed rules of 5 00:00:24,010 --> 00:00:30,030 engagement, white hat hackers are often referred to as ethical hackers. 6 00:00:31,090 --> 00:00:38,320 They are specialized in ethical hacking tools, techniques and methodologies to secure an organization's 7 00:00:38,320 --> 00:00:39,550 information system. 8 00:00:40,700 --> 00:00:48,080 Unlike blackout hackers, ethical hackers exploit security networks and look for clues when they are 9 00:00:48,080 --> 00:00:50,050 legally permitted to do so. 10 00:00:50,990 --> 00:00:59,090 White hat hackers always disclose every vulnerability they find in a company's security system so that 11 00:00:59,090 --> 00:01:03,950 it can be fixed before they are being exploited by malicious attackers. 12 00:01:05,020 --> 00:01:12,160 Guys, some Fortune 50 companies like Facebook, Microsoft, Google, Apple, they also use white hat 13 00:01:12,160 --> 00:01:21,400 hackers to sell their system from black attackers so they don't buy that in Internet slang. 14 00:01:21,670 --> 00:01:29,080 Refer to an ethical computer hacker or a computer security expert who specializes in penetration testing 15 00:01:29,080 --> 00:01:35,890 and other testing methodologies to ensure the security of an organization's information system. 16 00:01:36,490 --> 00:01:39,880 In next video, we will see about three attackers.