This is a series of lessons that's basic about the networking concepts, networking tools, security and countermeasures.
This is suitable for your kids /teens , and novices who wants to be an ethical hacker.
This can be called your foundation step.
Table of contents
- LESSON 1 BEING A HACKER
- Introduction and Objectives
- LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS
- Requirements and Setup
- System Operation: WINDOWS
- How to open an MS-DOS window
- System Operations: Linux
- How to open a console window
- Commands and tools (Linux)
- LESSON 3 PORTS AND PROTOCOLS
- Basic concepts of networks
- Devices
- Topologies
- TCP/IP model
- Introduction
- Layers
- Application
- Transport
- Internet
- Network Access
- Protocols
- LESSON 4 SERVICES AND CONNECTIONS
- Services
- HTTP and The Web
- E-Mail – POP and SMTP
- IRC
- FTP
- Telnet and SSH
- DNS
- DHCP
- LESSON 5 SYSTEM IDENTIFICATION
- Identifying a Server
- Identifying the Owner of a Domain
- Identifying the IP address of a Domain
- Identifying Services
- Ping and TraceRoute
Size : | 3005.24 Kb |
Downloads: | 625 |
Created: | 2019-05-03 |
Warning: Trying to access array offset on false in /home/tutovnfz/public_html/amp/article-amp.php on line 263
Others related eBooks about How to become an Ethical Hacker
This PDF tutorial will examine various denial of service attacks and network defense measures taken against them.
Download free eBook in PDF about Intrusion Detection Systems with Snort, Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID.
The cybersecurity action plan is a critical element of cybersecurity readiness. This tutorial explains what goes into these plans and how to start one.