I am fresher and want to work in cyber security. how do I have to start?

Asked by Last Modified  

Follow 0
Answer

Please enter your answer

That would be great start shiva. Security professionals are high in demand and has good market value. Apart from that you will have the ability to dig into u Explorer ed area of network and OS. Start with basics of Linux and build network fundamentals.
Comments

Learn the basic concepts and it is your first step and be a master.
Comments

there is high demand for professionals in security domain, first learn basics like networking and Linux operating system then learn courses like Ethical hacking, CCNA security,
Comments

Cyber security researcher

Start up with basics of Linux and have lots and lots of determination
Comments

Our advice for the students is that he/she should be aware of the basic networking, Programming languages, how the software works, latest security trends and the best tip for my side is to self research."If you are thinking of security only from 9am to 5pm, you cannot say yourself as an ethical hacker"....
read more
Our advice for the students is that he/she should be aware of the basic networking, Programming languages, how the software works, latest security trends and the best tip for my side is to self research."If you are thinking of security only from 9am to 5pm, you cannot say yourself as an ethical hacker". Since it is a continuous learning process as new threats and vulnerabilities comes daily so keep learning about them. read less
Comments

IT Researcher

For Cyber security you must have knowledge about computer networks. Then you have to attend a CEH class and certify yourself .you can contact me for more details.
Comments

Teacher

Basically you need to complete hardware, networking, various OS platforms, basic knowledge of softwares courses and then have hands on practice in a company. Once you get a thorough knowledge of all then you can go further in Cisco security channel along with EC- Council channel of courses. After experience...
read more
Basically you need to complete hardware, networking, various OS platforms, basic knowledge of softwares courses and then have hands on practice in a company. Once you get a thorough knowledge of all then you can go further in Cisco security channel along with EC- Council channel of courses. After experience you would be able to understand your strength and love is in securing networks or making security based softwares or both. But for this job profile engineering students are more eligible, if you are not please complete basic networking N+ course too. read less
Comments

View 5 more Answers

Related Questions

Do we need laptop or PC for the classes of hacking?

Yes, you require to have a laptop with 8 GB RAM. You will have to install 2 to 3 OS in VMware workstation to practice.
Shaik
how can do hack mobile technology
Mobile has got many vulnerabilities (weakness) eg through mobile app, server,hardware,application level and many more.once you understand those vulnerabilities then you will be in a stage to exploit those vulnerabilities that would be mobile hack.
Rajiv
0 0
6
How many types of hacking are there?
Hacking can be of many types. Basically what you want to know is not clear. Can you elaborate your question Deepak.
Deepak

Hi I'm a College dropout and I am interested in hacking. I want to learn or gain knowledge about Ethical hacking. I want some suggestions for taking a forward step

You have Only two options do join training in Ethical hacking somewhere or do train yourself there is a ton of content free online. make sure you have an interest in it and have some basic knowledge...
Lochan
What is the basic thing to do to become an ethical hacker???
Complete a the CEH V9 certification. The training and certification can cost you minimum 35000/-
Tridip

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

An Introduction to Backdooring
In the hacking world, backdooring is the way to control a computer remotely. An attacker would trick to install a piece of software which has a backdoor in it on the victim and as soon as he installs it,...
G

Grandhi Srikanth

0 0
0

WiFi White-Hat Attacks.
Hello, guys this is Harsha Vardhan.Today the hacks are about the white hat tricks in wi-fi network, what happens if some one doing weird stuff in your wi-fi network.The solution is :1) You can kick the...

How to get into cybersecurity in 2024
Demand for Cybersecurity professionals is high and growing Entry-level positions may not require a formal degree and instead prioritize skills Coming from a technical field with transferable skills...

Black Box VS Gray Box VS White Box Pentesting Difference?
Penetration testing, often referred to as penetration testing or penetration testing, is a security method that simulates a cyber attack on a computer system, network, or application to identify vulnerabilities...
B

Bharath Kumar

0 0
0

Type Of Hacker
There are three types of hacker. white hat hacker(ethical hacker)Grey hat hackerBlack hat hacker What is white hat hacker (ethical hacker)? “Ethical hacker” at parameter security, which...

Recommended Articles

Applications engineering is a hot trend in the current IT market.  An applications engineer is responsible for designing and application of technology products relating to various aspects of computing. To accomplish this, he/she has to work collaboratively with the company’s manufacturing, marketing, sales, and customer...

Read full article >

Microsoft Excel is an electronic spreadsheet tool which is commonly used for financial and statistical data processing. It has been developed by Microsoft and forms a major component of the widely used Microsoft Office. From individual users to the top IT companies, Excel is used worldwide. Excel is one of the most important...

Read full article >

Almost all of us, inside the pocket, bag or on the table have a mobile phone, out of which 90% of us have a smartphone. The technology is advancing rapidly. When it comes to mobile phones, people today want much more than just making phone calls and playing games on the go. People now want instant access to all their business...

Read full article >

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Looking for Ethical Hacking Training?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you