I am fresher and want to work in cyber security. how do I have to start?

Asked by Last Modified  

Follow 0
Answer

Please enter your answer

That would be great start shiva. Security professionals are high in demand and has good market value. Apart from that you will have the ability to dig into u Explorer ed area of network and OS. Start with basics of Linux and build network fundamentals.
Comments

Learn the basic concepts and it is your first step and be a master.
Comments

there is high demand for professionals in security domain, first learn basics like networking and Linux operating system then learn courses like Ethical hacking, CCNA security,
Comments

Cyber security researcher

Start up with basics of Linux and have lots and lots of determination
Comments

Our advice for the students is that he/she should be aware of the basic networking, Programming languages, how the software works, latest security trends and the best tip for my side is to self research."If you are thinking of security only from 9am to 5pm, you cannot say yourself as an ethical hacker"....
read more
Our advice for the students is that he/she should be aware of the basic networking, Programming languages, how the software works, latest security trends and the best tip for my side is to self research."If you are thinking of security only from 9am to 5pm, you cannot say yourself as an ethical hacker". Since it is a continuous learning process as new threats and vulnerabilities comes daily so keep learning about them. read less
Comments

IT Researcher

For Cyber security you must have knowledge about computer networks. Then you have to attend a CEH class and certify yourself .you can contact me for more details.
Comments

Teacher

Basically you need to complete hardware, networking, various OS platforms, basic knowledge of softwares courses and then have hands on practice in a company. Once you get a thorough knowledge of all then you can go further in Cisco security channel along with EC- Council channel of courses. After experience...
read more
Basically you need to complete hardware, networking, various OS platforms, basic knowledge of softwares courses and then have hands on practice in a company. Once you get a thorough knowledge of all then you can go further in Cisco security channel along with EC- Council channel of courses. After experience you would be able to understand your strength and love is in securing networks or making security based softwares or both. But for this job profile engineering students are more eligible, if you are not please complete basic networking N+ course too. read less
Comments

View 5 more Answers

Related Questions

what is the job of bug bounty hunters called

Clients will pay you once you find any vulnerabilities in the applciation.
Kunal
0 0
8
What is the basic thing to do to become an ethical hacker???
Complete a the CEH V9 certification. The training and certification can cost you minimum 35000/-
Tridip
Which the best training institute of OSCP?
Hi, we can help you with GPEN ( GIAC Penetration Testing)
Bhuvaneshwar
0 0
6

Do we need laptop or PC for the classes of hacking?

Yes, you require to have a laptop with 8 GB RAM. You will have to install 2 to 3 OS in VMware workstation to practice.
Shaik

Can someone hack our PC/Laptop? If they do, how to recover our device? 

Yes hackers can hack pc or laptop. And we can recover our device. Try to find out what kind of attack was happen then look for precaution. First update every service. If your pc is windows Enable windows...
Guntupalli

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

Malware Analysis: Analyzing Macros For Payload
Hello There ! last night I got a mail from an Unknown source regarding a Credit card which include a Document attachment. I was Curious that it may be Social engineering attack One of the Popular Attacking...

How to become an Ethical Hacker?
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using...

A Torch for the Green Hats.
How do I become a hacker? I have received this question countless times on formal and informal occasions. I feel the need to put a small sum up on the rules for you. Step 1. Ask yourself the Why. Do...

What Is Cyber Crime?
Computer activities carried out by means computer or the internet.Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or...
D

Deleted User

0 0
0

Union Based SQL Injection | DVWA (Legal)
Union Based Injection:Technology: phpDatabase: MysqlThe main objective of this injection is to access database, of the website, by just given some malicious sql inputs in front end and get an access of...

Recommended Articles

Applications engineering is a hot trend in the current IT market.  An applications engineer is responsible for designing and application of technology products relating to various aspects of computing. To accomplish this, he/she has to work collaboratively with the company’s manufacturing, marketing, sales, and customer...

Read full article >

Microsoft Excel is an electronic spreadsheet tool which is commonly used for financial and statistical data processing. It has been developed by Microsoft and forms a major component of the widely used Microsoft Office. From individual users to the top IT companies, Excel is used worldwide. Excel is one of the most important...

Read full article >

Almost all of us, inside the pocket, bag or on the table have a mobile phone, out of which 90% of us have a smartphone. The technology is advancing rapidly. When it comes to mobile phones, people today want much more than just making phone calls and playing games on the go. People now want instant access to all their business...

Read full article >

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Looking for Ethical Hacking Training?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you