DestinAI
CareersSkillsLog InGet Started
CareersSkillsAboutLog InGet Started →

© 2026 DESTINAI · BETA 1.0 · ISCED ISCO O*NET ESCO
CareersSkillsPrivacyTermsEU AI Act notice
DestinAI
CareersSkillsLog InGet Started
CareersSkillsAboutLog InGet Started →
← Back to directory
§ OCCUPATION · GLOBAL STANDARDS

ethical hacker

Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols.

View on Official Portal ↗
Description

Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.

Theoretical Knowledge
ESSENTIALTheoretical knowledge required
ICT system integrationattack vectorsoperating systemsethicsinformation security strategyICT security standardsethical hacking principlescomputer programmingbuilding systems monitoring technologycomputer forensicssoftware anomaliesweb application security threatslegal requirements of ICT productsICT network security riskscyber securitysecurity engineeringpenetration testing toolcyber attack counter-measurestools for ICT test automationICT infrastructure
OPTIONALAdjacent knowledge that strengthens fit
John The Ripper (penetration testing tool)Aircrack (penetration testing tool)levels of software testingCain and Abel (penetration testing tool)Open source modelBlackArchhybrid modelMetasploitNexposeWhiteHat SentinelParrot Security OSSamurai Web Testing Frameworkproxy serversBackbox (penetration testing tool)Internet of ThingsICT security legislationMaltegoorganisational resilienceinformation confidentialityICT encryptionOutsourcing modelNessusservice-oriented modellingWiresharkKali Linuxinternet governanceOWASP ZAP
Practical Skills
ESSENTIALApplied skills & competences
communicate with stakeholdersperform ICT security testingconduct ICT code reviewaddress problems criticallyexecute software testsexecute social engineering testsdevelop code exploitsmonitor system performanceexecute ICT auditsanalyse the context of an organisationengage with stakeholdersmanage system securityimplement ICT risk managementidentify ICT system weaknessesuse scripting programmingidentify ICT security risks
OPTIONALOptional competences
maintain ICT serverimplement ICT security policiesremove computer virus or malware from a computermanage IT security compliancesimplement a firewallsolve ICT system problemsset up cybersecurity training programmesICT safetymanage cloud data and storageperform project managementdefine security policies

GLOBAL RESOURCE

View official definition ↗

SKILLS OVERVIEW

74 total
36 essential · 38 optional

Data Source: Unified Global Standards (ISCED, ISCO, O*NET, ESCO)

© 2026 DESTINAI · BETA 1.0 · ISCED ISCO O*NET ESCO
CareersSkillsPrivacyTermsEU AI Act notice