UrbanPro
true

Learn Computer Networking from the Best Tutors

  • Affordable fees
  • 1-1 or Group class
  • Flexible Timings
  • Verified Tutors

Search in

Ethical hacking : Important points for beginners

WiTTyMinds
16/05/2018 0 0

 

Dear passionate learners,

 

I am posting below lesson to create enthusiasm among you all for learning ethical hacking .

 

A beginner in Ethical Hacking is always in dilemma.

Below are some misconceptions, which are barrier in learning ethical hacking:-

1) Hacking is done for bad purpose.
2) Its done to steal data or money.
3) Hackers are always insecure about their stability and existence.
4) A Computer degree is required to become Ethical hacker.
5) hacking can be done only using a specific tools.


Now, lets see what are some basic knowledge and skills for Ethical Hacking:-

1) Basic Coding & knowledge of programming language.

Above is useful in knowing what a code does,and to know how the logic works.
i.e If a hacker whose intentions are bad and deployed his/her code on a system,in that
scenario we need to know what is the intention of the code.

2) Basic knowledge of Operating System especially Linux.

I would say, this is a must skill for ethical hackers.
Without knowing OS concepts ,its difficult for one to know about running processes,
system reachability,file systems and other protocols etc

 

3) Basic knowledge of networking.

Above is needed in order to know the route followed by packets.
i.e man in the middle attack in the network,phishing etc can be prevented ,if anybody knows the core concept of networking.
A lot of banks wants to know who are the intruders in the network where the server is located.


4) Cross platform execution of tools.

One must know how to execute a tool or code on all the platforms,because the server where we need to find the weakness can be of any platform i.e Windows or Linux.

5) Hacking is also known as finding weaknesses in system.

An ethical hacker finds weakness in system ,in order to prevent from external attack.

6) Basic knowledge of all Communication protocols.

One must know the basic protocols like TCP/UDP and routing protocols like OSPF etc to find weaknesses in system.


7) One must be a passionate and curious about knowing things.

A person who is always curious and passionate can learn easily, how thing works.



Below is analogy to computer system and home.
If anyone knows what are the entry points and exit points in a house,he/she can save the house from external intruders.
Doors and windows in a house are like ports in a computer systems.

 

Below video(which is created by me)  link which i have uploaded in my youtube channel,illustrating the analogy:-

 

https://www.youtube.com/watch?v=8vmJgpgW4E8

 

 

All the best in your learnings .

Regards,

wiTTyMinds Technology

0 Dislike
Follow 1

Please Enter a comment

Submit

Other Lessons for You

Prerequisites To Get Started Into Ethical Hacking
Getting into ethical hacking as a beginner, one has confusion about where to start. There are many resources but the only question remains in mind for a beginner is "What is the zero level to start?"....
G

Grandhi Srikanth

2 0
0

Types of Ethical Hackers
This is the internet age! The more that we use the internet and technology, the more we are vulnerable to Hacking and Data theft, Ethical Hacking going to play the best role in this era There are mainly...

Know about Computer Networking:
Know about Computer Networking: Parts of Computer: Monitor CPU (Central Processing Unit) Keyboard Mouse Speakers Printer NIC(Network Interface Card) Parts of Network: Router Gateway/ISP Switches Computers/PCs/Nodes Firewall Cabling IP...

Antivirus is not enough. Cyber criminals hate us. We protect from attacks that antivirus can't block. 
Engineering and internet encouraged the conception and development of network indecencies like virus, antivirus, hacking and ethical hacking. Hacking is a practice of adjustment of a computer hardware...

LAN Attack: ARP Spoofing + MAC flooding + Man in the middle
If the attacker gain access to LAN where the target Server is connected. Then following mechanisms can be combined to attack target web server. MAC spoofing + MAC flooding + ARP Spoofing. MAC spoofing...
X

Looking for Computer Networking Classes?

The best tutors for Computer Networking Classes are on UrbanPro

  • Select the best Tutor
  • Book & Attend a Free Demo
  • Pay and start Learning

Learn Computer Networking with the Best Tutors

The best Tutors for Computer Networking Classes are on UrbanPro

This website uses cookies

We use cookies to improve user experience. Choose what cookies you allow us to use. You can read more about our Cookie Policy in our Privacy Policy

Accept All
Decline All

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 55 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 7.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more