Complete roadmap for becoming a ethical hacker in 6 months
Month 1: introduction
- intro to information security
- intro to cyber security
- CIA traids
- hacking and types of hackers
- intro to ethical hacking
- a career in ethical hacking
- skills of an ethical hacker
- phases of an ethical hacker
- introduction to pentesting
- build your habit to learn daily
Month 2: learn computer networking
- network basis
- IP and Mac address
- Topology
- Subnet mask
- Ports
- OSI model
- TCP/IP model
- TCP and UDP
- Telnet and SSH
- Ping
- SSL
- HTTP VS HTTPS
- network devices
- proxy
- VPNs
- server
Month 3: learn kali linux
- basics commands and operators
- directories and tree hierarchy
- file system
- types of users
- file permission
- packages
- networking commands
- *you can install kali linux in VMs
Month 4 :phases of ethical hacking
footprinting
- footprinting and objectives
- OSINT
- maltego
- website footprinting
- google dorks
scanning
- basics of scanning
- scanning methodology
- port scanning
- Nmap
- banner grabbing
- nessus
enumeration
- introduction to enumeration
- techniques
- NetBIOS, SNMP, SMB, LDPA, SMTP, DNS, NTP, enumaration
Month 5 : learn different techniques
- web hacking
- steganography
- MITH attacks
- wifi hacking
- spoofing and sniffing
- password cracking
- google dorking
- dark web
- social engineering
- cryptography
- honey pot
Month 6 : programing and scripting
- HTML
- javascript
- python
- shell scripting
You have done good work by publishing this article here. I found this article too much informative, and also it is beneficial to enhance our knowledge. Grateful to you for sharing an article like this. professional hackers
ReplyDeleteGreat blog ! I am impressed with suggestions of author. Cyber security Logan
ReplyDeleteIt's very nice of you to share your knowledge through posts. I love to read stories about your experiences. They're very useful and interesting. I am excited to read the next posts. I'm so grateful for all that you've done. Keep plugging. Many viewers like me fancy your writing. Thank you for sharing precious information with us. Best professional hackers for hire service provider.
ReplyDeleteExcellent knowledge, You are providing important knowledge. It is really helpful and factual information for us and everyone to increase knowledge. Continue sharing your data. Thank you. Read more info about Hire A Professional Lottery Hacker in Usa
ReplyDeleteI simply needed to say this is an exquisitely formed article as we have seen here. I got some information from your article and furthermore it is a huge article for us. Gratitude for sharing an article like this.Hacker for hire
ReplyDeleteI admire this article for the well-researched content and excellent wording. I got so involved in this material that I couldn’t stop reading. I am impressed with your work and skill. Thank you so much. Read more info about Professional Cell Phone Hacker in Usa
ReplyDeleteI simply needed to say this is an exquisitely formed article as we have seen here. I got some information from your article and furthermore it is a critical article for us. Gratitude for sharing an article like this.Social media hacker
ReplyDeleteI read the above article and I got a few one of a kind of information from your article about a dozing cushion. It is a helpful article to update our understanding for us. Thankful to you for sharing an article like this.Domain Extensions And Meanings
ReplyDeletePost a Comment
Please do not enter any spam links in the comments box.