Advertisement

How to get started in Ethical Hacking - 0xKayala

How to get started in Ethical Hacking



1. First, I recommend knowing the basics of networking. For this, you can check out Professor Messer's free Net+ course.

Link: CompTIA N10-007 Network+ Course


2. I recommend walking through Professor Messer's Sec+ and A+ courses. Quality Content.

Link: SY0-601 CompTIA Security+ Course

Link: CompTIA 220-1101 A+ Training Course

Link: CompTIA 220-1102 A+ Training Course


3. Programming is also an essential skill. You could choose any language of your own, but I would recommend Python since it's widely used and there are just so many things you can do with this.

Learn Python from the below video.



4. Once you learn Python, you can take the networking with Python course. I would absolutely recommend it, but you can just know the basics and come back to this at any point.

Learn Networking with Python from the below video.


5. Personally speaking, any Ethical Hacker in my terms should be well knowledgeable in Linux. This wouldn't make a lot of sense initially, but Linux essentials & scripting will be super useful down the journey.

Learn Linux Essentials from the below video:


6. Now that you have the fundamentals ready, I would highly recommend checking out TCMSecurity's Practical Ethical Hacking course.

Learn the Free Practical Ethical Hacking course (12 hours) from the below video.


Learn the Paid Practical Ethical Hacking course (25 hours) using the below link.

Link: TCM's Practical Ethical Hacking


7. How much will learning theory do if you don't practice?

Practice Linux here: OverTheWire: Bandit


8. Practice playing CTFs on both the below platforms.

Link: TryHackMe

I Would recommend checking Tryhackme's basic paths and then filtering FREE rooms in increasing difficulty and starting working from the topmost ones.

Prove your cybersecurity skills on the official Hack The Box Capture The Flag (CTF) Platform!

Link: HackTheBox

The above resources are generic and from here you can go for Web Application Penetration Testing, Network Penetration Testing, Mobile Penetration Testing, Red Teaming, Blue Teaming and so on. 

I believe once you complete these, you'll get a fair understanding of what you want to do.

Credits: Nithin

Support me: If you like to support me, buy me a cup of Coffee

Follow me: Medium | LinkedIn | Twitter

Post a Comment

0 Comments