How to become an Ethical Hacker

This is a series of lessons that's basic about the networking concepts, networking tools, security and countermeasures.

This is suitable for your kids /teens , and novices who wants to be an ethical hacker.
This can be called your foundation step.

Table of contents

  • LESSON 1 BEING A HACKER
  • Introduction and Objectives
  • LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS
  • Requirements and Setup
  • System Operation: WINDOWS
  • How to open an MS-DOS window
  • System Operations: Linux
  • How to open a console window
  • Commands and tools (Linux)
  • LESSON 3 PORTS AND PROTOCOLS
  • Basic concepts of networks
  • Devices
  • Topologies
  • TCP/IP model
  • Introduction
  • Layers
  • Application
  • Transport
  • Internet
  • Network Access
  • Protocols
  • LESSON 4 SERVICES AND CONNECTIONS
  • Services
  • HTTP and The Web
  • E-Mail – POP and SMTP
  • IRC
  • FTP
  • Telnet and SSH
  • DNS
  • DHCP
  • LESSON 5 SYSTEM IDENTIFICATION
  • Identifying a Server
  • Identifying the Owner of a Domain
  • Identifying the IP address of a Domain
  • Identifying Services
  • Ping and TraceRoute
Size : 3005.24 Kb
File type : pdf
Downloads: 622
Created: 2019-05-03

Others Cyber Security Tutorials

Denial of service attacks and network defense

Cyber Security Planning Guide

Intrusion Detection Systems with Snort

Others related eBooks about How to become an Ethical Hacker

Rust tutorial in PDF

Download free Rust tutorial course in PDF, training file in 50 chapters and 184 pages. Free unaffiliated ebook created from Stack OverFlow contributor....

Azure Pipelines Succinctly

Download free course Azure Pipelines Succinctly, pdf file on 123 pages by by Antonio Liccardi....

Efficient Learning Machines: Theories, Concepts, and Applications for Engineers and System Designers

Machine learning techniques provide cost-effective alternatives to traditional methods for extracting underlying relationships between information and data and for predicting future events by processing existing information to train models. Efficient Learning Machines explores the major topics of ma...

Eye Tracking Methodology

Download free course Eye Tracking Methodology, pdf file on 387 pages by Andrew T. Duchowski....

Thinking Forth: A Language and Philosophy for Solving Problems

Thinking Forth is a book about the philosophy of problem solving and programming style, applied to the unique programming language Forth. Published first in 1984, it could be among the timeless classics of computer books, such as Fred Brooks' The Mythical Man-Month and Donald Knuth's The Art of Comp...

PicoLisp Works

Download free course PicoLisp Works, pdf file on 467 pages by Thorsten Jolitz....

Intertwingled

Download free course Intertwingled, pdf file on 157 pages by Douglas Dechow, Daniele Struppa....

HackSpace Magazine: Issue 48

Download free course HackSpace Magazine: Issue 48, pdf file on 116 pages by HackSpace Team....

Policy-Oriented Technology Assessment Across Europe: Expanding Capacities

Download free course Policy-Oriented Technology Assessment Across Europe: Expanding Capacities, pdf file on 188 pages by Lars Klüver, Rasmus Øjvind Nielsen, Marie Louise Jørgensen....

Cloud Native Applications

Cloud computing is a game changer. Being able to automate and constantly adjust infrastruc..., download free Cloud tutorial in PDF (123 pages) created by ....