i m a student of compter science 3r year, want to learn hacking and network related bugs what vl b the min tme to make a command over basics

Asked by Last Modified  

Follow 0
Answer

Please enter your answer

Tutor

We provide practical handson training in Ethical Hacking . Fresh batch starting soon
Comments

It will take 3 months
Comments

There is no particular time frame to master any technology. Having said that you may get a good exposure on the said domain in a month or so. Again it depends upon your dedication, effort and proper guidance.
Comments

Ethical Hacker

If you talk about basics then it will take around 2 weeks that's it. But still you will be a noob so you need to focus on advance attacks then only basics would be nothing for you.
Comments

IT Researcher

Hi Ankit! The min time will be atleast 2 to 3 months
Comments

Minimum time will be 2 to 3 months it includes soft skills and personality development also...
Comments

Teacher

Dear Ankit, you are mixing two things at a time. CEH is a combo of hardware, networking and softwares. You need to understand what you want to learn and do. As far as softwares are concerned you need to write programmes which will help to secure assets of company. Learning a language depends upon your...
read more
Dear Ankit, you are mixing two things at a time. CEH is a combo of hardware, networking and softwares. You need to understand what you want to learn and do. As far as softwares are concerned you need to write programmes which will help to secure assets of company. Learning a language depends upon your interest and related practice and answeer to time required can only be answered by you only. read less
Comments

View 5 more Answers

Related Questions

I am studying cyber security at my college. If I do training on android, is it beneficial for me?
Yes, If you learn mobile technologies you can easily conduct mobile application security testing.
Siddharth
0 0
9
How can I hack a Facebook or gmail account?
Hello Saikumar, You can hack anything but you should have strong knowledge on hacking. We can hack Facebook and Gmail easily in LAN environment.
Saikumar
0 0
5
How many hours
40hrs training on real time modules.
Arunprasath
0 0
8

Hi I'm a College dropout and I am interested in hacking. I want to learn or gain knowledge about Ethical hacking. I want some suggestions for taking a forward step

You have Only two options do join training in Ethical hacking somewhere or do train yourself there is a ton of content free online. make sure you have an interest in it and have some basic knowledge...
Lochan
If I did "Cyber security and Ethical hacking" course. Will I get any certificate from that institution?
The certificate from any training institute does not have any value when you are applying for a job. You need to have standard certifications like CEH or Security+ to prove your knowledge. Its better to...
Hrishikesh
0 0
5

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

How to become an Ethical Hacker?
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using...

How to crack CEH?
Learn all the modules taught in the CEC course at infysec, practise thoroughly and then crack CEH - EC COUNCIL within 2 months time frame.

Black Box VS Gray Box VS White Box Pentesting Difference?
Penetration testing, often referred to as penetration testing or penetration testing, is a security method that simulates a cyber attack on a computer system, network, or application to identify vulnerabilities...
B

Bharath Kumar

0 0
0

Types of Ethical Hackers
This is the internet age! The more that we use the internet and technology, the more we are vulnerable to Hacking and Data theft, Ethical Hacking going to play the best role in this era There are mainly...

9 Cybersecurity Trends & Predictions For 2018
The unpleasant cyber attacks of 2017 are still fresh in the minds of the people. To mention a few, they are Wanna Cry, Not Petya, Equifax, and etc. Evidently, the 'Cybersecurity' term which was known...

Recommended Articles

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Almost all of us, inside the pocket, bag or on the table have a mobile phone, out of which 90% of us have a smartphone. The technology is advancing rapidly. When it comes to mobile phones, people today want much more than just making phone calls and playing games on the go. People now want instant access to all their business...

Read full article >

Applications engineering is a hot trend in the current IT market.  An applications engineer is responsible for designing and application of technology products relating to various aspects of computing. To accomplish this, he/she has to work collaboratively with the company’s manufacturing, marketing, sales, and customer...

Read full article >

Hadoop is a framework which has been developed for organizing and analysing big chunks of data for a business. Suppose you have a file larger than your system’s storage capacity and you can’t store it. Hadoop helps in storing bigger files than what could be stored on one particular server. You can therefore store very,...

Read full article >

Looking for Ethical Hacking Training?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you