麻豆性爱电影

Skip Navigation
Skip to Menu Toggle Button

Thinking Like a Hacker

Jesse Varsalone
By Jesse Varsalone

Updated on October 23, 2023

Did you know that 鈥渉acking鈥 can be a good thing? Typically, when we hear that term, it鈥檚 associated with news stories about costly, disruptive security breaches committed by cyber criminals. Not all hackers, however, are black hat rogues out to discover your password or steal valuable data. Some are actually good actors鈥攅thical hackers working to protect our sensitive digital assets.

In his ancient work, The Art of War, Chinese general Sun Tzu famously wrote, 鈥淭o know your enemy, you must become your enemy.鈥 In other words, the successful defense of anything, be it national borders, valuable property, or IT systems, begins with putting oneself in the attacker鈥檚 place, so one can anticipate his actions.

Understanding the intentions of hackers and the methods they employ is crucial to securing cybersecurity infrastructure. To that end, it is important to know the hacker鈥檚 mindset and become familiar with their tactics. Indeed, one must learn to become a hacker.

For instance, anticipating that a criminal hacker might scan an organization鈥檚 system and target its weaknesses, the ethical hacker must do the same. Systems and software that are not updated regularly can be vulnerable to compromise, such as when hackers broke into the Baltimore City government鈥檚 network. In that incident, hackers used ransomware to encrypt the city鈥檚 critical data, and then demanded that the city pay a ransom in exchange for the decryption key. If ethical hackers had discovered that vulnerability first, steps could have been taken to shore up the weakness, and a substantial amount of money and countless hours rebuilding systems could have been saved.

A person who does legal and authorized hacking for a living is called a penetration tester, or 鈥減entester.鈥 Pentesters can help companies execute a strategy to secure their systems by identifying security flaws within the system. Some pentesters, known as 鈥渞ed teamers,鈥 play the role of malicious actors, working to attack a system and access sensitive information. Their counterparts, known as 鈥渂lue teamers,鈥 work to assess the risk and secure systems against threats.

One of the important components of the hacker mindset is the ability to think 鈥渙utside the box.鈥 A great example of this is when systems were being tested at a casino in the Baltimore-Washington area. The systems were found to be up to date and secure. (Network security is typically a high priority for a casino.)

However, someone found an entry point through the casino's fish aquarium, which was connected to a Wi-Fi network, and was able to hack into the system.1 This shows how a hacker needs to think creatively and explains why those in charge of securing the network always need to be on their toes.

A cybersecurity degree from 麻豆性爱电影 of Maryland Global Campus (UMGC), like the BS in cybersecurity technology, the MS in cyber operations, or the MS in digital forensics, can train you in both red- and blue-team methodologies so you can better prepare to defend networks.

An MS in cybersecurity technology can help you develop cybersecurity strategies to build and maintain secure technology environments. And, with an undergraduate degree in cybersecurity technology from UMGC, it only takes 24 credits to complete your cyber technology master鈥檚 degree.

At UMGC, you can choose from three different bachelor鈥檚 programs or seven master鈥檚 programs in cybersecurity. All are designed to help you gain the latest industry knowledge, cutting-edge technical skills, and real-world expertise that you need to specialize in the cybersecurity field of your choice. Many of the courses in these programs, as well as in our undergraduate and graduate certificate programs, are designed to provide you with the knowledge you need to take valuable industry certification exams.

This year, UMGC debuted our MARS cyber learning platform, which gives students the hands-on experience with the offensive and defensive tools they need to gain the prerequisite knowledge for a career in cybersecurity. In addition, the globally ranked UMGC Cyber Competition Team gives cyber students hands-on experience in penetration testing as well as digital forensics and computer network defense.

UMGC has been designated as a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency and the Department of Homeland Security and as a Center of Digital Forensics Academic Excellence by the DC3 Academic Cyber Curriculum Alliance.

If you are interested in a career as a pentester, or in another cybersecurity field, visit our Help Center to contact an advisor.


1 "" | The Washington Post | July 21, 2017

Reference on this webpage to any third-party entity or product does not constitute or imply endorsement by UMGC nor does it constitute or imply endorsement of UMGC by the third party.