SlideShare a Scribd company logo
www.tech-strategygroup.com
Ethical Hackers
Skills
Ethical Hackers should have expertise in the following
domain:
• Routers: broad understanding of routers, routing
protocols, and access control lists (ACLs). Additional
certifications such as Cisco Certified Network Associate
(CCNA), Cisco Certified Internetworking Expert (CCIE).
• Microsoft: posses skills in the operation, configuration
and management of Microsoft systems.
Ethical Hackers
Skills
• Linux:
Posses comprehensive understanding of Linux/UNIX OS, which
encompasses security, setting, configuration and services.
Fedora or Linux+ certification is beneficial.
• Firewalls:
Maintain knowledge of firewall configuration, Intrusion
Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
Cisco Certified Network Associate Security Professional (CCNA)
or Check Point Certified Security Administrator (CCSA) are
advantageous
• Programming:
Knowledge of programming, including SQL, programming
languages such as C++, Ruby, C#, and C, and scripting languages
such as PHP and Java
Ethical Hackers
Skills
• Mainframes:
Understanding of Mainframes
• Network Protocols:
Understanding of Transmission Control Protocol/Internet
Protocol (TCP/IP). Possess CompTIA Network+, Security+, or
Advanced Security Practitioner (CASP) certification.
Establishing
Ethical
Hacking Goals
The following types of questions that can help you establish
goals
1. What is the strategic intent of the organisation?
2. What unique objectives does the organization want to
achieve
3. What is the budget size
4. What is the scope of the test plans and when will they
be implemented ?
5. What are they core project deliverables ?
6. How will customers be informed ? etc
Additional
Reading
• http://www.hackerlaw.org/?page_id=55: U.S. hacker
laws
• https://tools.ietf.org/html/rfc1087: Ethics and the
Internet
• https://www.owasp.org/index.php/Main_Page: The
Open Web Application Security Project
• https://www.owasp.org/index.php/Penetration_testing
_methodologies: Various pen testing methodologies
• http://blogs.getcertifiedgetahead.com/quantitative-
risk-assessment/: Quantitative risk assessment
• https://www.pcisecuritystandards.org/documents/PCI%
20SSC%20Quick%20Reference%20Guide.pdf: A guide to
PCI-DSS
Additional
Reading
• http://www.informationisbeautiful.net/visualizations/
worlds-biggest-data-breaches-hacks/: Top IT security
breaches
• http://searchnetworking.techtarget.com/tutorial/Netw
ork-penetration-testing-guide: Guide to penetration
testing
• https://www.rapid7.com/resources/how-to-respond-to-
an-incident/: Incident response methodologies
• http://securityaffairs.co/wordpress/49624/hacking/cyb
er-red-team-blue-team.html: Description of hacking
teams including pen testers, blue teams, and red teams

More Related Content

PDF
DRC -- Cybersecurity concepts2015
PPT
Introduction to computer security syllabus
PPT
Computer Systems Security
PDF
DEF CON 23 - vivek ramachadran - chellam
PPTX
Nick Lancaster
PPT
Ethical Hacking
PPTX
Exfiltration slides-v1-release
DRC -- Cybersecurity concepts2015
Introduction to computer security syllabus
Computer Systems Security
DEF CON 23 - vivek ramachadran - chellam
Nick Lancaster
Ethical Hacking
Exfiltration slides-v1-release

What's hot (6)

PPT
Introduction to ceh
DOC
Ahmad Abu Ghaith
PPTX
501 ch 7 advanced attacks
PPTX
Building a Hacker Resistant Network
PPTX
fire walls
Introduction to ceh
Ahmad Abu Ghaith
501 ch 7 advanced attacks
Building a Hacker Resistant Network
fire walls

Similar to Skills you need to become a ethical hacker (20)

PDF
Top Ethical Hacking Classes in Delhi to Kickstart Your Career.pptx.pdf
PDF
Master Ethical Hacking Basics Like a Pro
PDF
What Is Ethical Hacking and How Does It Work?
PPTX
Skills-Required-to-Become-a-Ethical-Hacker.pptx
PDF
How to become an Ethical Hacker
PPT
Ethi mini - ethical hacking
PPT
Ethical hacking presentation
PPTX
Ethical Hacking
PDF
A Beginner’s Guide to Ethical Hacking.pdf
PPTX
Skills-of-Ethical-Hacking.pptx
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
PPTX
Ethical Hacking Dilemma Thesis Defense by Slidesgo.pptx
DOCX
Lesson plan ethical hacking
PPTX
Ethical Hacking and Cyber Security for Beginners
PPT
Ethicalhackingalicencetohack 120223062548-phpapp01
PDF
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
PPTX
Ethical Hacking.pptx
PDF
Hacking.pdf
PPTX
5 Skills A Professional Ethical Hacker Required..pptx
PPTX
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Top Ethical Hacking Classes in Delhi to Kickstart Your Career.pptx.pdf
Master Ethical Hacking Basics Like a Pro
What Is Ethical Hacking and How Does It Work?
Skills-Required-to-Become-a-Ethical-Hacker.pptx
How to become an Ethical Hacker
Ethi mini - ethical hacking
Ethical hacking presentation
Ethical Hacking
A Beginner’s Guide to Ethical Hacking.pdf
Skills-of-Ethical-Hacking.pptx
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
Ethical Hacking Dilemma Thesis Defense by Slidesgo.pptx
Lesson plan ethical hacking
Ethical Hacking and Cyber Security for Beginners
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking.pptx
Hacking.pdf
5 Skills A Professional Ethical Hacker Required..pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx

More from begmohsin (7)

PPTX
Attackers process
PPTX
Enumeration and system hacking
PPTX
How hackers collate information about employees
PPTX
Types of hackers
PPTX
Ethical System Hacking- Cyber Training Diploma
PPTX
Ethical Hacking Tools & Techniques
PPTX
Defend your organisation from Cyber Attacks
Attackers process
Enumeration and system hacking
How hackers collate information about employees
Types of hackers
Ethical System Hacking- Cyber Training Diploma
Ethical Hacking Tools & Techniques
Defend your organisation from Cyber Attacks

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
MIND Revenue Release Quarter 2 2025 Press Release
The AUB Centre for AI in Media Proposal.docx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Skills you need to become a ethical hacker

  • 2. Ethical Hackers Skills Ethical Hackers should have expertise in the following domain: • Routers: broad understanding of routers, routing protocols, and access control lists (ACLs). Additional certifications such as Cisco Certified Network Associate (CCNA), Cisco Certified Internetworking Expert (CCIE). • Microsoft: posses skills in the operation, configuration and management of Microsoft systems.
  • 3. Ethical Hackers Skills • Linux: Posses comprehensive understanding of Linux/UNIX OS, which encompasses security, setting, configuration and services. Fedora or Linux+ certification is beneficial. • Firewalls: Maintain knowledge of firewall configuration, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). Cisco Certified Network Associate Security Professional (CCNA) or Check Point Certified Security Administrator (CCSA) are advantageous • Programming: Knowledge of programming, including SQL, programming languages such as C++, Ruby, C#, and C, and scripting languages such as PHP and Java
  • 4. Ethical Hackers Skills • Mainframes: Understanding of Mainframes • Network Protocols: Understanding of Transmission Control Protocol/Internet Protocol (TCP/IP). Possess CompTIA Network+, Security+, or Advanced Security Practitioner (CASP) certification.
  • 5. Establishing Ethical Hacking Goals The following types of questions that can help you establish goals 1. What is the strategic intent of the organisation? 2. What unique objectives does the organization want to achieve 3. What is the budget size 4. What is the scope of the test plans and when will they be implemented ? 5. What are they core project deliverables ? 6. How will customers be informed ? etc
  • 6. Additional Reading • http://www.hackerlaw.org/?page_id=55: U.S. hacker laws • https://tools.ietf.org/html/rfc1087: Ethics and the Internet • https://www.owasp.org/index.php/Main_Page: The Open Web Application Security Project • https://www.owasp.org/index.php/Penetration_testing _methodologies: Various pen testing methodologies • http://blogs.getcertifiedgetahead.com/quantitative- risk-assessment/: Quantitative risk assessment • https://www.pcisecuritystandards.org/documents/PCI% 20SSC%20Quick%20Reference%20Guide.pdf: A guide to PCI-DSS
  • 7. Additional Reading • http://www.informationisbeautiful.net/visualizations/ worlds-biggest-data-breaches-hacks/: Top IT security breaches • http://searchnetworking.techtarget.com/tutorial/Netw ork-penetration-testing-guide: Guide to penetration testing • https://www.rapid7.com/resources/how-to-respond-to- an-incident/: Incident response methodologies • http://securityaffairs.co/wordpress/49624/hacking/cyb er-red-team-blue-team.html: Description of hacking teams including pen testers, blue teams, and red teams