![]() This section will introduce you to one of the most commonly used languages among ethical hackers, Python. Most ethical hackers are proficient in a programming language. This section will introduce you to the basics of Linux and ramp up into building out Bash scripts to automate tasks as the course develops. Every good ethical hacker knows their way around Linux. We will discuss common ports and protocols, the OSI model, subnetting, and even walk through a network build with using Cisco CLI. This section focuses on the concepts of computer networking. We will discuss the important tools you can use to keep notes and be successful in the course and in the field. An ethical hacker is only as good as the notes he or she keeps. What does an ethical hacker do on a day to day basis? How much can he or she make? What type of assessments might an ethical hacker perform? These questions and more will be answered. A Day in the Life of an Ethical Hacker.Students can still participate in the course, but may experience slow lab environments. For Active Directory Lab Build: A minimum of 16GB of RAM is suggested.For Wireless Hacking: A wireless adapter that supports monitor mode (links provided in course). ![]()
0 Comments
Leave a Reply. |