Present the role of the ethical hacker as well as how to perform penetration and security tests on a network, including how the white, black, and grey models are applied to these tests. Also, taking the discussion a step further, include why the ethical

Present the role of the ethical hacker as well as how to perform penetration and security tests on a network, including how the white, black, and grey models are applied to these tests. Also, taking the discussion a step further, include why the ethical