![]() Most ethical hackers are proficient in a programming language. This section will introduce you to the basics of Linux and ramp up into building out Bash scripts to automate tasks as the course develops. Every good ethical hacker knows their way around Linux. We will discuss common ports and protocols, the OSI model, subnetting, and even walk through a network build with using Cisco CLI. This section focuses on the concepts of computer networking. We will discuss the important tools you can use to keep notes and be successful in the course and in the field. An ethical hacker is only as good as the notes he or she keeps. What does an ethical hacker do on a day to day basis? How much can he or she make? What type of assessments might an ethical hacker perform? These questions and more will be answered.
0 Comments
Leave a Reply. |