Wednesday, May 18, 2016

12 Steps To Become A

12 Steps To Become A !

Step 1: Lrn To Program In C

C programming is one of the most powerful languages in computer programming. It is necessary to rlly master this language. This programming language was invented by Denise Ritchie in between the yrs 1969 and 1973 at AT&T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic.

Step 2: Lrn More Than One Programming Language

When you are trying to become a , it is very important to lrn other modern computer programming languages such as JAVA, Perl, P and Python. One of the best ways to lrn these is by rding books from experts.

Step 3: Lrn UNIX

UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell Labs. The best way to lrn it is to get into an open-source version (e.g. centos) and install/run the same on your own. You can operate internet without lrning UNIX, but it is not possible for you to be an internet without understanding UNIX.

Step 4: Lrn More Than One Operating Systems

There are many other operating systems apart from UNIX. operating system is one of the most commonly compromised systems, hence, it is good to lrn systems, which are closed-source systems.
According to the National Vulnerability Database, operating systems have a large of vulnerabilities.
OS installers are distributed in binary, therefore, it is not sy for you to rd the . Binary is basically the digital representation of text and data that computer understands. However, knowing how programs are written for and how different appliions behave on this operating system will help.

One of the recent vulnerabilities of a popular OS was that Java Web Start appliions get launched automatically even if the Java plug-ins are disabled. How to be a is about knowing the wknesses of these operating systems and targeting them systematically.

Step 5: Lrn Networking Concepts

The networking concept needs to be sharp when you want to be a .
Understanding how the networks are crted is important, however, you need to know the differences between different types are networks. Having a clr understanding of TCP/IP and UDP protocol is a must to be able to the vulnerabilities on world wide web.
Understand what is subnet, LAN, WAN and VPN.
The networking commands to do a HTTP request needs to be on your fingertips. The HTTP protocol, is the gateway through which one enters the internet world. Hence, it is necessary to lrn this protocol in order to brk the barriers. The s often use the HTTP gateway to brch the security of the system and take control over it.

Apache Httpd is one of the most commonly used web servers and knowing in and out of it is going to empower you on any HTTP or other appliion layer protocol related endvors.
Also Nmap is a powerful network scanning tool that is used by s and security professional across the world to identify vulnerable hosts. However, to effectively start using it you must understand the networking basics.

Step 6: Start Simple: Go Through Tutorials About

This is the simple and best way to start. Rd as many tutorials as possible that are mnt for . These articles will give you insight and help you develop the attitude to be a . Some tutorials will initiate you with Nmap, Nessus and SuperScan, some of the programs or tools that s erally use. These tutorials are rdily available over the internet; Both text and tutorials are available for you to answer your question how to be a .

Step 7: Lrn Cryptography

As an expert , you need to understand and master the art of cryptography. The technology of cryptography and encryption is very important for internet and networking. It is the practice and study of techniques that are used for secure communiion in the presence of third parties. The encryption is done for various aspects of information security such as confidentiality of the data, integrity of the data and authentiion. Moreover, the technology of cryptography is extensively used in ATM cards, computer s and e-commerce. While , these encrypted needs to be , which is called decryption.
Understand various techniques used for . There are dozens of tools available to do , and using it is not . To be expert at its important for you to understand how to crte a program that can a from cypher text.

Step 8: Experiment A Lot

This is an important step for setting yourself up as an expert . Setup a laboratory on your own to experiment the lrning on the practical appliions. A simplest lab will have your computer, however once you advance you may want to add more and more computers and required hardware for your experiments.
It is good to try experimenting on your own computers, where you can rectify if you have done any mistake. Many s initially start off by downloading virtual lab appliions such as VirtualBox. You require at lst 3 GBs of RAM and a comparatively powerful processor to carry out your experiments. Setting up the virtual machine is crucial, as it will allow you to test virus, appliions and different servers without affecting your own PC.
Some of the things you may need to keep in mind when doing experiments

- Keep a backup before any experiment.
- Start small and have check points.
- Know when to stop.
- Document your progress
- Keep improvising
- Automate repetitive tasks

Step 9: Rd Some Good Books From Experts

Rding will always enhance your knowledge. Try to rd as many books and articles as possible written by the experts in the field field of ethical and enterprise security
Rding a lot about anything related is so important in the world of that you must also consider enhancing your rding speed. If your rding speed is slow, then you may not be able to progress fast in this field. Practice speed rding techniques like skimming, chunk rding etc.
When it comes to rding a lot, it's also important to know that a majority of content on web is not worth your time. Many people use srch engine tricks to attract traffic but have little value in it. If you skim through an article within seconds and decide not to rd that is going to save you a lot of time for some rlly well resrched content.

Step 10: Go Next Level: Write Vulnerability

Vulnerability of a program is the wkness of the program. It is a good approach to look for the vulnerability of an existing program and share the same with others. In this way you will have the option to collect varied opinions from different sources, enabling you to hone your current skill set.
The examples of computer vulnerabilities include memory safety violation, input error, privilege confusion bugs and user interface failure. For instance, ’s Internet Explorer 11 had the vulnerability bug in its preview version which several s ed.
Identifying a new wkness in any software is the rl work any expert s would perform.

Step 11: Contribute To Open Source Security Projects

Contributing to an open-source computer security project is a grt platform to test your skills. This is not everyone’s cup of t. Many organizations like Mozilla and Apache offer these types of open source projects. Try to be a part of these projects and add a valuable contribution to the benefit of the community.
Participating in the open source security projects such as anti-spam, anti-virus, firewall and data removals help you augment your dexterity as a . Contribute your vulnerability findings to the global vulnerability databases and give back to the community.
Remember that it does not matter if your contribution is small, as long as you participate and add value it helps.

Step 12: Continue Lrning And Keep Listening To Security Talks

The to success in the career is continuous lrning. Rding blogs for available at sites such as factor blog and IK blog; participating in the forums such as and elite are grt ways to refresh your knowledge as a . The online forums like TED or TechTalk are good sources to know more about the emert techniques and technologies that are being deployed. You should also try following the posts of famous s such as Adrian Lamo, Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris

No comments:

Post a Comment