Skip to main content

How Can I Start My Journey As A Beginner ?

 The question from where should in start learning pen testing, forensics, and stuff related to ethical hacking is frustrating. 

And the beginners are always in a dilemma that what is the best resource to start it from scratch to advance, and this dilemma leads them to waste of time on useless courses.

Today i will clear your all doubts related to "How To Start Journey In Cyber Security"




As i told in my previous post their are many different types of roles that you can choose in Information and security.
So it is very important that you should know that which field you want to achieve and luckily their are many present field to choose, some of them are Web Application Security,
Digital Forensics,
Network Security,
IOT Security,
Reverse Engineering, etc  

So the step 1 is to know that what you actually want to Learn and after you know that what you want to learn. Then set a target and imagine that, the target is on the other side of road and you have to cross the road, on which cars are going on high speed.

From this scenario i want to say that, this road is like basics, which you have to complete before actually keeping hands on actual testing and other things

Now a new question comes that what we have to learn in basics?................so it's very simple that you have to learn:
Computer Fundamentals,
Networking,
Linux.
cryptography,
and a programming language(scripting language like python is recommended)




So Now Lets Take a Closer Look To These Topics

Cyber Security is a Science as well as an Art. Like any other expertise, you need to put a lot of effort in order to acquire knowledge and become an expert hacker. Once you are on the track, you would need more effort to keep up-to-date with latest technologies, new vulnerabilities and exploitation techniques.
 
An security professional must be a computer systems expert and needs to have very strong programming and computer networking skills.
An security professional needs to have a lot of patience, persistence, and perseverance to try again and again and wait for the required result.

Additionally, an security expert should be smart enough to understand the situation. A good security expert has great problem-solving skills too.

Now we know what we have to learn, and now i'll just tell some topics of above mentioned requirements
COMPUTER FUNDAMENTALS
~How processing works
~Hardware components of your computer
~How things are working in your Windows/Mac/Linux machine

NETWORKING
~OSI, TCP/IP models
~TCP, UDP Differences and Flags
~Three-way handshake(SYN, SYN&ACK, ACK)  
~Ports and IP, how it works  
~Public and Private addresses  
~Definitions of DHCP, ARP,etc and how they work  

LINUX
~All Linux commands
~How things are working in Linux
~using terminal emulator

CRYPTOGRAPHY
~ Symmetric and Asymmetric encryption 
~What is Public key and Private key  
~What is Hash and Encryption
~HTTPS and why to use SSL/TLS  

PROGRAMMING
~Any scripting language(python recommended)

 

Therefore these are the requirements, prerequisites and some tips ......... :) 


  

Now we know what we have learn when we are on a beginner's  level.  then one more questions comes that "From where should i start learning these things" i don't have resources to start.

So the answer of that question is that the resources are already there on internet but we have to find, which one to choose and start with............here we have given solution for resources also, so in the next post we will tell the best resources for beginner's to start journey in information and security world 




Stay Tuned For Free Material And Best Industry Level Tips.................... peace :)
 

Comments

Popular posts from this blog

Configuring ModSecurity Web Application Firewall

ModSec is an open-source web application firewall which was designed for the apache server initially but now can be used for other different servers as well.ModSecurity is also known as ModSec and can filter HTTP requests and responses based on defined filtering rules. We will use the OWASP ModSecurity CORE RULE SET (CRS) here. We can also define our custom rules but that is a different topic.  Here is an illustration of how to configure a ModSec firewall using apache2. I have just created a simple PHP page that will be used to verify credentials. Put this page in /var/www/html/login.php Here is the page login.php: <html> <body> <?php if(isset($_POST[‘login’])) { $username = $_POST[‘username’]; $password = $_POST[‘password’]; $connection = mysqli_connect(‘localhost’,’root’,’test’,’testdb’); $result = mysqli_query($connection, “SELECT * FROM `users` WHERE username=’$username’ AND password=’$password’”); if(mysqli_num_rows($result) == 0) echo ‘Wrong Credentia

What Is Cryptography ?

  Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix "crypt-" means "hidden" or "vault" -- and the suffix "-graphy" stands for "writing."   Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication. Modern cryptography concerns itself with the following four objectives:   •  Confidentiality : the information cannot be understood by anyone for whom it was unintended •  Integrity : the information cannot be altered in storage or transit between sender and intended receiver without the alterati

How Internet Works ?

what is a protocol? A protocol is a set of rules specifying how computers should communicate with each other over a network. For example, the Transport Control Protocol has a rule that if one computer sends data to another computer, the destination computer should let the source computer know if any data was missing so the source computer can re-send it. Or the Internet Protocol which specifies how computers should route information to other computers by attaching addresses onto the data it sends.   What’s a packet? Data sent across the Internet is called a message. Before a message is sent, it is first split in many fragments called packets. These packets are sent independently of each other. The typical maximum packet size is between 1000 and 3000 characters. The Internet Protocol specifies how messages should be packetized.   What’s a packet routing network? It is a network that routes packets from a source computer to a destination computer. The Internet is made up of a massive ne