BECOME ETHICAL HACKER IN JUST 6 MONTHS

 Complete roadmap for becoming a ethical hacker in 6 months

BECOME ETHICAL HACKER IN JUST 6 MONTHS


Month 1: introduction

  • intro to information security
  • intro to cyber security
  • CIA traids
  • hacking and types of hackers
  • intro to ethical hacking
  • a career in ethical hacking
  • skills of an ethical hacker
  • phases of an ethical hacker
  • introduction to pentesting
  • build your habit to learn daily


Month 2: learn computer networking

  • network basis
  • IP and Mac address
  • Topology
  • Subnet mask
  • Ports
  • OSI model
  • TCP/IP model
  • TCP and UDP
  • Telnet and SSH
  • Ping
  • SSL
  • HTTP VS HTTPS
  • network devices
  • proxy
  • VPNs
  • server
  • BECOME ETHICAL HACKER IN JUST 6 MONTHS


Month 3: learn kali linux

  • basics commands and operators
  • directories and tree hierarchy
  • file system
  • types of users
  • file permission
  • packages
  • networking commands
  • *you can install kali linux in VMs 

Month 4 :phases of ethical hacking

footprinting

  • footprinting and objectives
  • OSINT
  • maltego
  • website footprinting
  • google dorks

scanning

  • basics of scanning
  • scanning methodology
  • port scanning
  • Nmap
  • banner grabbing
  • nessus

enumeration

  • introduction to enumeration
  • techniques
  • NetBIOS, SNMP, SMB, LDPA, SMTP, DNS, NTP, enumaration

Month 5 : learn different techniques

  • web hacking 
  • steganography
  • MITH attacks
  • wifi hacking
  • spoofing and sniffing
  • password cracking
  • google dorking
  • dark web
  • social engineering
  • cryptography
  • honey pot

Month 6 : programing and scripting

  • HTML
  • javascript
  • python
  • shell scripting


8 Comments

Please do not enter any spam links in the comments box.

  1. You have done good work by publishing this article here. I found this article too much informative, and also it is beneficial to enhance our knowledge. Grateful to you for sharing an article like this. professional hackers

    ReplyDelete
  2. Great blog ! I am impressed with suggestions of author. Cyber security Logan

    ReplyDelete
  3. It's very nice of you to share your knowledge through posts. I love to read stories about your experiences. They're very useful and interesting. I am excited to read the next posts. I'm so grateful for all that you've done. Keep plugging. Many viewers like me fancy your writing. Thank you for sharing precious information with us. Best professional hackers for hire service provider.

    ReplyDelete
  4. Excellent knowledge, You are providing important knowledge. It is really helpful and factual information for us and everyone to increase knowledge. Continue sharing your data. Thank you. Read more info about Hire A Professional Lottery Hacker in Usa

    ReplyDelete
  5. I simply needed to say this is an exquisitely formed article as we have seen here. I got some information from your article and furthermore it is a huge article for us. Gratitude for sharing an article like this.Hacker for hire

    ReplyDelete
  6. I admire this article for the well-researched content and excellent wording. I got so involved in this material that I couldn’t stop reading. I am impressed with your work and skill. Thank you so much. Read more info about Professional Cell Phone Hacker in Usa

    ReplyDelete
  7. I simply needed to say this is an exquisitely formed article as we have seen here. I got some information from your article and furthermore it is a critical article for us. Gratitude for sharing an article like this.Social media hacker

    ReplyDelete
  8. I read the above article and I got a few one of a kind of information from your article about a dozing cushion. It is a helpful article to update our understanding for us. Thankful to you for sharing an article like this.Domain Extensions And Meanings

    ReplyDelete

Post a Comment

Please do not enter any spam links in the comments box.

Previous Post Next Post