Computer Networking

Computer Networking

Trending Questions and Lessons

Follow 11,158 Followers

Feed

Ask a Question

All

Lessons

Discussion

Overview

Questions 861

Lessons 12

Total Shares  

Lesson Posted on 16 May IT Courses/Computer Networking IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Ethical hacking : Important points for beginners

WiTTyMinds

WiTTyTech makes everybody skilful regarding technology. Its a knowledge hub which guarantees practical...

Dear passionate learners, I am posting below lesson to create enthusiasm among you all for learning ethical hacking . A beginner in Ethical Hacking is always in dilemma. Below are some misconceptions, which are barrier in learning ethical hacking:- 1) Hacking is done for bad purpose. 2)... read more

 

Dear passionate learners,

 

I am posting below lesson to create enthusiasm among you all for learning ethical hacking .

 

A beginner in Ethical Hacking is always in dilemma.

Below are some misconceptions, which are barrier in learning ethical hacking:-

1) Hacking is done for bad purpose.
2) Its done to steal data or money.
3) Hackers are always insecure about their stability and existence.
4) A Computer degree is required to become Ethical hacker.
5) hacking can be done only using a specific tools.


Now, lets see what are some basic knowledge and skills for Ethical Hacking:-

1) Basic Coding & knowledge of programming language.

Above is useful in knowing what a code does,and to know how the logic works.
i.e If a hacker whose intentions are bad and deployed his/her code on a system,in that
scenario we need to know what is the intention of the code.

2) Basic knowledge of Operating System especially Linux.

I would say, this is a must skill for ethical hackers.
Without knowing OS concepts ,its difficult for one to know about running processes,
system reachability,file systems and other protocols etc

 

3) Basic knowledge of networking.

Above is needed in order to know the route followed by packets.
i.e man in the middle attack in the network,phishing etc can be prevented ,if anybody knows the core concept of networking.
A lot of banks wants to know who are the intruders in the network where the server is located.


4) Cross platform execution of tools.

One must know how to execute a tool or code on all the platforms,because the server where we need to find the weakness can be of any platform i.e Windows or Linux.

5) Hacking is also known as finding weaknesses in system.

An ethical hacker finds weakness in system ,in order to prevent from external attack.

6) Basic knowledge of all Communication protocols.

One must know the basic protocols like TCP/UDP and routing protocols like OSPF etc to find weaknesses in system.


7) One must be a passionate and curious about knowing things.

A person who is always curious and passionate can learn easily, how thing works.



Below is analogy to computer system and home.
If anyone knows what are the entry points and exit points in a house,he/she can save the house from external intruders.
Doors and windows in a house are like ports in a computer systems.

 

Below video(which is created by me)  link which i have uploaded in my youtube channel,illustrating the analogy:-

 

https://www.youtube.com/watch?v=8vmJgpgW4E8

 

 

All the best in your learnings .

Regards,

wiTTyMinds Technology

read less
Comments
Dislike Bookmark Share

Lesson Posted on 16 May IT Courses/Computer Networking IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Ethical hacking : Important points for beginners

Abhay

Dear passionate learners, I am posting lesson to create enthusiasm among you all for learning ethical hacking. A beginner in Ethical Hacking is always in a dilemma. Below are some misconceptions, which are the barrier to learning ethical hacking:- 1) Hacking is done for the wrong purpose.... read more

 

Dear passionate learners,

 

I am posting lesson to create enthusiasm among you all for learning ethical hacking.

 

A beginner in Ethical Hacking is always in a dilemma.

Below are some misconceptions, which are the barrier to learning ethical hacking:-

1) Hacking is done for the wrong purpose.
2) Its done to steal data or money.
3) Hackers are always insecure about their stability and existence.
4) A Computer degree is required to become an Ethical Hacker.
5) hacking can be done only using specific tools.


Now, let's see what are some basic knowledge and skills for Ethical Hacking:-

1) Necessary Coding & knowledge of programming language.

Above is useful in knowing what code does, and to understand how the logic works.
i.e. If a hacker whose intentions are evil and has deployed the code on a system, in that scenario we need to know what is the purpose of the code.

2) Basic knowledge of Operating System especially Linux.

I would say, this is a must skill for ethical hackers.
Without knowing OS concepts, it's difficult for one to know about running processes,
system reachability, file systems and other protocols etc

 

3) Basic knowledge of networking.

Above is needed to know the route followed by packets.
i.e. man in the middle attack on the network, phishing etc. can be prevented, if anybody knows the core concept of networking.
A lot of banks wants to know who are the intruders in the network where the server is located.


4) Cross-platform execution of tools.

One must know how to execute a tool or code on all the platforms because the server where we need to find the weakness can be of any platform, i.e. Windows or Linux.

5) Hacking is also known as finding weaknesses in the system.

An ethical hacker finds the weakness in the system, to prevent the external attack.

6) Basic knowledge of all Communication protocols.

One must know the basic protocols like TCP/UDP and routing protocols like OSPF etc. to find weaknesses in the system.


7) One must be passionate and curious about knowing things.

A person who is always curious and passionate can learn easily, how the thing works.

 

Below is the analogy to the computer system and home.
If anyone knows what the entry points and exit points in a house are, he/she can save the house from external intruders.
Doors and windows in a house are like ports in a computer system.

 

Below video(which is created by me) link which I have uploaded in my youtube channel, illustrating the analogy:-

 

 

 

 

read less
Comments
Dislike Bookmark Share

Lesson Posted on 16 May IT Courses/IT Security Management /Ethical Hacking & Cyber Security IT Courses/Network Security IT Courses/Networking General +1 IT Courses/Computer Networking less

Ethical Hacking : Important Points for Beginners

WiTTyMinds

WiTTyTech makes everybody skilful regarding technology. Its a knowledge hub which guarantees practical...

Dear passionate learners,I am posting lesson to create enthusiasm among you all for learning ethical hacking.A beginner in Ethical Hacking is always in a dilemma. Below are some misconceptions, which are a barrier to learning ethical hacking:-1) Hacking is done for a bad purpose. 2) Its done to steal... read more

Dear passionate learners,

I am posting lesson to create enthusiasm among you all for learning ethical hacking.

A beginner in Ethical Hacking is always in a dilemma.


Below are some misconceptions, which are a barrier to learning ethical hacking:-

1) Hacking is done for a bad purpose.
2) Its done to steal data or money.
3) Hackers are always insecure about their stability and existence.
4) A Computer degree is required to become an Ethical Hacker.
5) hacking can be done only using specific tools.

Now, let's see what are some basic knowledge and skills for Ethical Hacking:-

1) Basic Coding & knowledge of programming language.

Above is useful in knowing what code does, and to know how the logic works.
i.e. If a hacker whose intentions are bad and deployed his/her code on a system, in that scenario we need to know what is the intention of the code.

2) Basic knowledge of Operating System especially Linux.

I would say, this is a must skill for ethical hackers.
Without knowing OS concepts, it's difficult for one to know about running processes,
system reachability, file systems and other protocols etc

3) Basic knowledge of networking.

Above is needed to know the route followed by packets.
i.e. man in the middle attack on the network, phishing etc. can be prevented, if anybody knows the core concept of networking.
A lot of banks wants to know who are the intruders in the network where the server is located.

4) Cross-platform execution of tools.

One must know how to execute a tool or code on all the platforms because the server where we need to find the weakness can be of any platform.

5) Hacking is also known as finding weaknesses in the system.

An ethical hacker finds a weakness in the system, to prevent the external attack.

6) Basic knowledge of all Communication protocols.

One must know the basic protocols like TCP/UDP and routing protocols like OSPF etc. to find weaknesses in the system.

7) Basic knowledge of Linux and Windows networking Commands, i.e. nmap, nestat etc.

Knowledge of these commands will provide information about the remote host and localhost.

8)Knowledge of Kali Linux, Wireshark/tcpdump etc. is added advantage.

Above provide tools and saves our time in writing an application for hacking.

9) One must be passionate and curious about knowing things.

A person who is always curious and passionate can learn how the thing works.

Below is an analogy to the computer system and home.
If anyone knows what the entry points and exit points in a house are, he can save the house from external intruders.
Doors and windows in a house are like ports in a computer system.

read less
Comments
Dislike Bookmark Share

Top Contributors

Connect with Expert Tutors & Institutes for Computer Networking

Answered on 20/12/2017 IT Courses/Computer Networking

What are the key components required for client workstations to connect to a network and access network resources?

Hemanth Beera

Trainer

The basic components are A switch/hub that links a network resource like a server or printer etc. An Ip address for each workstation and server Network configuration.
Answers 1 Comments
Dislike Bookmark Share

Answered on 14/12/2017 IT Courses/Computer Networking

What can cause a LAN communication network failure, either from a switch, router, or device such a PC?

Priya

Software Developer,Website & Corporate training,Expertise in Advanced C,C++,JAVA,DotNET,PHP,and OpenSource Langages

Switch
Answers 1 Comments
Dislike Bookmark Share

Answered on 20/12/2017 IT Courses/Computer Networking

Does Wi-Fi staying connected to a mobile device always throughout the day and night increase our Wi-Fi usage?

Hemanth Beera

Trainer

Yes. Depends on the devices that are accessing the network. Since data access can happen in the foreground as well as background. Foreground where a user opens any application that requires network i.e. when a user performs any action. Whereas, in the background where some apps may need data to run the... read more
Yes. Depends on the devices that are accessing the network. Since data access can happen in the foreground as well as background. Foreground where a user opens any application that requires network i.e. when a user performs any action. Whereas, in the background where some apps may need data to run the app. For eg. updates or upgrades for the apps or the operation system. read less
Answers 1 Comments
Dislike Bookmark Share

Answered on 07 Mar IT Courses/Computer Networking

What is a virtual private network? How is it used, and how is it beneficial?

Vikas Mishra

In Simple word "setupping LAN (private network) over internet between two parties is called as virtual private network" which ensure about confidentiallity, integrity, authentication.
Answers 1 Comments
Dislike Bookmark Share

Answered on 08/12/2017 IT Courses/Computer Networking

Why is IPv6 needed if we can use NAT and subnetting?

Mohan Bahadur

data link layer
Answers 1 Comments
Dislike Bookmark Share

Answered on 20/12/2017 IT Courses/Computer Networking

How can I get an IP address of a website user?

Balakrishna Jajam

Tutor

press windows+r then type cmd command after enter then type ipconfig u will get
Answers 1 Comments
Dislike Bookmark Share

Answered on 11/12/2017 IT Courses/Computer Networking

In a 3-way handshake, what does the SYN packet consist of?

Nidhi S.

Data link layer
Answers 1 Comments
Dislike Bookmark Share

About UrbanPro

UrbanPro.com helps you to connect with the best Computer Networking classes in India. Post Your Requirement today and get connected.

x

Ask a Question

Please enter your Question

Please select a Tag

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 25 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 6.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more