-to become Hackers-

Necessary Skills

 

 

* Computing

1. Basic understanding of operating systems

2. Understanding of basic software system

3. Grasp on CLI commands

 

* Networking

1. Cables, Systems, Switches

2. Networking Architecture

3. Understanding of different netwoking protocols

 

* Life Skills

1. Ability to think out of the box

2. Ability to accept failure and move on

3. Perseverance (인내심. 펄서비랜스)

 

* Tools

1. How ot use a lot of tools

2. Networkng

3. Security

 

* Networking

1. How to capture packets from a network

2. TCP/IP in detail

3. Unsderstanding how protocols interact

 

* Methods

1. How to use gathered information

2. Getting the best out of your resources

 

 

 

-Ethical hacking Agenda-

1. cybersecurity cryptography

confidentiality

intergrity

availability

 

2. cyber threats

mitigate

vulerabilities

*8 types of cyber attcaks

ㄱ. malware - computer virus, spyware, adware, worm, trojan horse

how to infected? email attachments / software downloads / OS vulnerabilities

Prevention - suspicious links / updated firewall / updated OS

ㄴ. phising

ㄷ. passwd attacks - Brute force attacks / Dictionary attacks / keylogger attacks

ㄹ. DDOS : packet flooading / overload

ㅁ. man in the middle

ㅂ. drive-by download

ㅅ. malvertising

ㅇ. Rogue Software

 

 

3. History of Ethical Hacking

 

4. Fundamentals of Networking

 

5. Ethical Hacking Using Kali Linux

 

6. Penetration Testing

Metaspliot tools - vulnerability analysis

install back doors in different computer systems

 

7. nmap

gather information from networks

how to use information?

 

-three cyber attacks-

8. XSS (Cross-site Scripting)

9. DDOS (distributed denial of service)

10. SQL Injection attacks

how they are orchestrated??

how we can mitigate them?

 

-Advanced cryptography methods-

11. Steganography

used for 'hidding digital code inside images'

 

 

12. Ethical Hacker Roadmap

job profiles in the industry.

hiring for these job profiles along with the salaries being offered.

 

*Career begin

: Cybersecurity

: Computer Science

: Information Secutiry

 

: Gain Hands on Experience

: Earn Minor Certificates (CCNA / CASSP / CEH v10)

 

 

 

* Roles and Responsibilities

1. Scannning open and closed ports using reconnaissance tools like Nessus and NMAP.

Scanning is a set of procedures for identifying live hosts, ports, and services, discovering

Operating system and architecture of target system, Identifying vulerabilities and threats

in the network. Network scannning is userd to create a profile of the target organization.

 

2. It is the reponsibilities of an Ethical Hacker to engage his organisations member in 

social engineering, awareness activities. Social Engineering for the purpose of Hacking

has proven to be one of the most effective ways over time and knowing how to avoid

any forms of social manipulation is key to organisations security!

 

3. Ethical Hacker also get to test new patch releases and software updates pertaining to the companies product and peripherals. It is their responsibility to identify any vulnerability that might exits in the patch and notify the appropriate team to fix them.

 

4. Ethical Hackers are also responsible for building and maintaining effective intrusion prevention and intrusion detection system. IDS/IPS help monitor traffic and prevent any

sort of DDOS attacks that might be targeted.

 

5. Ethical hackers are responsible for employing strategies like sniffing networks, bypassing and cracking wireless encryption, and hijacking web servers and web applications for testing security of a system.

 

 

 

* Skills Required

Database Handling & Networking & Operating System & communication skills

 

1. Sniffing is the process of monitoring and capturing all the packets passing through

a given network using sniffing tools. It is a form of 'taping phone wires' and get to know

about the conversation. It is also called wiretapping applied to the computer networks.

 

2. Ethical Hackers should know how to orchestrate different types of Network and Database attack as their main job is to predict black hat hacker and to do this one must be able to think and act like a black hat hacker.

 

3. Ethical Hackers have to deal with different kind of operating system on a daily basis with Linux being the daily driver. So, it is obvious that an Ethical Hacker needs to have an in depth knowledge of the working of operating system in general.

 

4. Ethical hackers have to deal with different kind of database formats. Whether it be SQL, Postgresql, NoSQL an Ethical Hacker at least needs a general knowledge of their working.

 

5. An Ethical Hacker should also be proficient in cryptanlysis, which is basically the deciphering of cipher text without knowing the key. This is also the fundamentals of password cracking using different methods like brute force, dictionaty attacks, etc

 

6. Ethical Hackers generally are endowed with the responsibility of network traffic monitoring. Therefore they must be proficient in intrusion detection and prevention techniques, session hijacking knowledge and overall an in depth knowledge of network in general.

 

7. Ethical Hackers also have to make custom software to trackle the use case specific security flaws that might be affecting the company. This requires general programming knowledge so that you can execute solutions to problems. It also helps in automating a lot pf tasks that would generally take a lot of specious time.

 

 

 

13. Interview Questions

50 most common interview questions

 

 

728x90

'정보보안공부 > 정보보안용 영어공부' 카테고리의 다른 글

How to become a Red Team Operator  (0) 2021.02.21

+ Recent posts