![[Featured image] A white hat hacker works on a computer in an office.](https://images.ctfassets.net/wp1lcwdav1p1/6Yjc9SBkK2fhjHVkvIg3OI/f5ca61d4093096a2c826c4beddbf08ff/GettyImages-1450969748.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
What Is a White Hat? The Ethical Side of Hacking
When you think of hackers, you might envision the villains you've seen in movies who break into computers to steal data. But all hackers aren't bad. To find out more, learn what it takes to become a certified ethical hacker.
April 2, 2022
Article

![[Featured image] Two cybersecurity professionals review a cybersecurity resume.](https://images.ctfassets.net/wp1lcwdav1p1/6ZMfXIKjnyZjLM0I05E0Pa/6d8582dbdb3948c69dbb596ab5619f87/CZf9TmkA.jpeg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A cryptologist works on a laptop, developing a security system for their company.](https://images.ctfassets.net/wp1lcwdav1p1/6TD338ABAvivlwHRh0jaN0/2ddcbe9ac54a2e1c8e32d1597095fc38/GettyImages-1907622233.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)



![[Featured image] Two cryptographers work together on an encryption algorithm on a computer monitor.](https://images.ctfassets.net/wp1lcwdav1p1/5ntmDnOYjiOAKCFCU1BZVL/dfb6cc0f5348717b8f3651ce1b157524/GettyImages-1171809453.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A group of cybersecurity engineers who are CISM certified have a discussion in a computer lab.](https://images.ctfassets.net/wp1lcwdav1p1/45P5pdJHl08uBU6t9WIwRN/118137e72e1e96e336afb4959ecd4ac5/uhizrBqs.jpeg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] Two network engineers discuss the best approach for improving an organization’s network.](https://images.ctfassets.net/wp1lcwdav1p1/1donCBhesImChZbKleEi8W/06873f9fd2841b29a046b8a802d1a2fe/GettyImages-1332104905.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] An ethical hacker takes notes of data charts from their desktop.](https://images.ctfassets.net/wp1lcwdav1p1/3XPe3Htv4ZcAsrCIjqSFKB/e06a5785bebdc9f2af37bd05e9ee139f/EthicalHacker.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A computer forensics employee stands at a workstation with a server unit behind them.](https://images.ctfassets.net/wp1lcwdav1p1/35s1PRkRHKKYMeSmXeQCHx/3d95d3916bb942e71fd6f79e10da7880/ap3reT1Q.jpeg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Feature Image] An aspiring cybersecurity professional prepares for GIAC certification as they progress in their career.](https://images.ctfassets.net/wp1lcwdav1p1/1irvNtmWhEhsxLw3UF3KqL/e1a0fd4023e04f1ee7d4e08040e1367e/GettyImages-1442972530.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] Two cybersecurity consultants collaborate at a shared workstation.](https://images.ctfassets.net/wp1lcwdav1p1/43S8ORfWVGWuGjfxfkmEst/3de2b9cd21c0ce50fd4dc7ce0aeb4f08/GettyImages-1171809453.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A person in a black sweater points out an item on a computer screen to a coworker in glasses seated in front of their desktop computer.](https://images.ctfassets.net/wp1lcwdav1p1/7mDPtel266saEy0mjRVtYQ/fced31a3adffe6d6ac0b2833bcf90fa4/security-clearance.jpeg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image] A solutions architect wearing black overalls and a yellow shirt stands alone in an open office.](https://images.ctfassets.net/wp1lcwdav1p1/5mr7kXigbSSMhnAWo0e7hH/63af10211e71706bcc5c9292fcec23a4/data_architect.png?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
