SlideShare a Scribd company logo
1 of 7
www.tech-strategygroup.com
Ethical Hackers
Skills
Ethical Hackers should have expertise in the following
domain:
• Routers: broad understanding of routers, routing
protocols, and access control lists (ACLs). Additional
certifications such as Cisco Certified Network Associate
(CCNA), Cisco Certified Internetworking Expert (CCIE).
• Microsoft: posses skills in the operation, configuration
and management of Microsoft systems.
Ethical Hackers
Skills
• Linux:
Posses comprehensive understanding of Linux/UNIX OS, which
encompasses security, setting, configuration and services.
Fedora or Linux+ certification is beneficial.
• Firewalls:
Maintain knowledge of firewall configuration, Intrusion
Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
Cisco Certified Network Associate Security Professional (CCNA)
or Check Point Certified Security Administrator (CCSA) are
advantageous
• Programming:
Knowledge of programming, including SQL, programming
languages such as C++, Ruby, C#, and C, and scripting languages
such as PHP and Java
Ethical Hackers
Skills
• Mainframes:
Understanding of Mainframes
• Network Protocols:
Understanding of Transmission Control Protocol/Internet
Protocol (TCP/IP). Possess CompTIA Network+, Security+, or
Advanced Security Practitioner (CASP) certification.
Establishing
Ethical
Hacking Goals
The following types of questions that can help you establish
goals
1. What is the strategic intent of the organisation?
2. What unique objectives does the organization want to
achieve
3. What is the budget size
4. What is the scope of the test plans and when will they
be implemented ?
5. What are they core project deliverables ?
6. How will customers be informed ? etc
Additional
Reading
• http://www.hackerlaw.org/?page_id=55: U.S. hacker
laws
• https://tools.ietf.org/html/rfc1087: Ethics and the
Internet
• https://www.owasp.org/index.php/Main_Page: The
Open Web Application Security Project
• https://www.owasp.org/index.php/Penetration_testing
_methodologies: Various pen testing methodologies
• http://blogs.getcertifiedgetahead.com/quantitative-
risk-assessment/: Quantitative risk assessment
• https://www.pcisecuritystandards.org/documents/PCI%
20SSC%20Quick%20Reference%20Guide.pdf: A guide to
PCI-DSS
Additional
Reading
• http://www.informationisbeautiful.net/visualizations/
worlds-biggest-data-breaches-hacks/: Top IT security
breaches
• http://searchnetworking.techtarget.com/tutorial/Netw
ork-penetration-testing-guide: Guide to penetration
testing
• https://www.rapid7.com/resources/how-to-respond-to-
an-incident/: Incident response methodologies
• http://securityaffairs.co/wordpress/49624/hacking/cyb
er-red-team-blue-team.html: Description of hacking
teams including pen testers, blue teams, and red teams

More Related Content

What's hot (6)

Introduction to ceh
Introduction  to cehIntroduction  to ceh
Introduction to ceh
 
Ahmad Abu Ghaith
Ahmad Abu GhaithAhmad Abu Ghaith
Ahmad Abu Ghaith
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
fire walls
fire wallsfire walls
fire walls
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 

Similar to Skills you need to become a ethical hacker

Similar to Skills you need to become a ethical hacker (20)

11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)
11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)
11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)
 
Kupch_Resume
Kupch_ResumeKupch_Resume
Kupch_Resume
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
 
Chandu cyber security career path
Chandu cyber security career pathChandu cyber security career path
Chandu cyber security career path
 
Mohamed_Omar_Cv
Mohamed_Omar_CvMohamed_Omar_Cv
Mohamed_Omar_Cv
 
RizwanJamal-Resume
RizwanJamal-ResumeRizwanJamal-Resume
RizwanJamal-Resume
 
Walk In On 26.09.10 Kolkata
Walk In On 26.09.10 KolkataWalk In On 26.09.10 Kolkata
Walk In On 26.09.10 Kolkata
 
Willard_Grayson_2015
Willard_Grayson_2015Willard_Grayson_2015
Willard_Grayson_2015
 
C.V
C.VC.V
C.V
 
Information technology
Information technologyInformation technology
Information technology
 
Aorangzeb
AorangzebAorangzeb
Aorangzeb
 
Dinesh Resume
Dinesh ResumeDinesh Resume
Dinesh Resume
 
New Opportunity Coming On Your Way.........
New Opportunity Coming On Your Way.........New Opportunity Coming On Your Way.........
New Opportunity Coming On Your Way.........
 
KINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_ITKINGSLEY_OWUSU_Resume_IT
KINGSLEY_OWUSU_Resume_IT
 
04/12/18 Raytheon IIS Career Fair (Denver)
04/12/18 Raytheon IIS Career Fair (Denver) 04/12/18 Raytheon IIS Career Fair (Denver)
04/12/18 Raytheon IIS Career Fair (Denver)
 
Sirjoon-CV (1)
Sirjoon-CV (1)Sirjoon-CV (1)
Sirjoon-CV (1)
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
 
Mohamed Malik Resume PC-LAN PR1 -f
Mohamed Malik Resume PC-LAN PR1 -fMohamed Malik Resume PC-LAN PR1 -f
Mohamed Malik Resume PC-LAN PR1 -f
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
CV - copie
CV  - copieCV  - copie
CV - copie
 

More from begmohsin

Attackers process
Attackers processAttackers process
Attackers processbegmohsin
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hackingbegmohsin
 
How hackers collate information about employees
How hackers collate information about employees How hackers collate information about employees
How hackers collate information about employees begmohsin
 
Types of hackers
Types of hackersTypes of hackers
Types of hackersbegmohsin
 
Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma begmohsin
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques begmohsin
 
Defend your organisation from Cyber Attacks
Defend your organisation from Cyber AttacksDefend your organisation from Cyber Attacks
Defend your organisation from Cyber Attacksbegmohsin
 

More from begmohsin (7)

Attackers process
Attackers processAttackers process
Attackers process
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
How hackers collate information about employees
How hackers collate information about employees How hackers collate information about employees
How hackers collate information about employees
 
Types of hackers
Types of hackersTypes of hackers
Types of hackers
 
Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma Ethical System Hacking- Cyber Training Diploma
Ethical System Hacking- Cyber Training Diploma
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques
 
Defend your organisation from Cyber Attacks
Defend your organisation from Cyber AttacksDefend your organisation from Cyber Attacks
Defend your organisation from Cyber Attacks
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Skills you need to become a ethical hacker

  • 2. Ethical Hackers Skills Ethical Hackers should have expertise in the following domain: • Routers: broad understanding of routers, routing protocols, and access control lists (ACLs). Additional certifications such as Cisco Certified Network Associate (CCNA), Cisco Certified Internetworking Expert (CCIE). • Microsoft: posses skills in the operation, configuration and management of Microsoft systems.
  • 3. Ethical Hackers Skills • Linux: Posses comprehensive understanding of Linux/UNIX OS, which encompasses security, setting, configuration and services. Fedora or Linux+ certification is beneficial. • Firewalls: Maintain knowledge of firewall configuration, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). Cisco Certified Network Associate Security Professional (CCNA) or Check Point Certified Security Administrator (CCSA) are advantageous • Programming: Knowledge of programming, including SQL, programming languages such as C++, Ruby, C#, and C, and scripting languages such as PHP and Java
  • 4. Ethical Hackers Skills • Mainframes: Understanding of Mainframes • Network Protocols: Understanding of Transmission Control Protocol/Internet Protocol (TCP/IP). Possess CompTIA Network+, Security+, or Advanced Security Practitioner (CASP) certification.
  • 5. Establishing Ethical Hacking Goals The following types of questions that can help you establish goals 1. What is the strategic intent of the organisation? 2. What unique objectives does the organization want to achieve 3. What is the budget size 4. What is the scope of the test plans and when will they be implemented ? 5. What are they core project deliverables ? 6. How will customers be informed ? etc
  • 6. Additional Reading • http://www.hackerlaw.org/?page_id=55: U.S. hacker laws • https://tools.ietf.org/html/rfc1087: Ethics and the Internet • https://www.owasp.org/index.php/Main_Page: The Open Web Application Security Project • https://www.owasp.org/index.php/Penetration_testing _methodologies: Various pen testing methodologies • http://blogs.getcertifiedgetahead.com/quantitative- risk-assessment/: Quantitative risk assessment • https://www.pcisecuritystandards.org/documents/PCI% 20SSC%20Quick%20Reference%20Guide.pdf: A guide to PCI-DSS
  • 7. Additional Reading • http://www.informationisbeautiful.net/visualizations/ worlds-biggest-data-breaches-hacks/: Top IT security breaches • http://searchnetworking.techtarget.com/tutorial/Netw ork-penetration-testing-guide: Guide to penetration testing • https://www.rapid7.com/resources/how-to-respond-to- an-incident/: Incident response methodologies • http://securityaffairs.co/wordpress/49624/hacking/cyb er-red-team-blue-team.html: Description of hacking teams including pen testers, blue teams, and red teams