Ethical Hacking - A Beginner's Guide to Cybersecurity Fundamentals
Ethical Hacking - A Beginner's Guide to Cybersecurity Fundamentals
There are three main types of hackers, each with a distinct set of
motivations and goals:
1. White Hat Hackers (Ethical Hackers): These hackers use their skills to
identify and fix vulnerabilities in computer systems, networks, and
applications. They work within the boundaries of the law and adhere
to a strict code of ethics, often employed or contracted by
organizations to help improve their security posture.
3. Grey Hat Hackers: These hackers fall somewhere between white and
black hat hackers. They may engage in questionable activities, often
without permission, but with the intention of exposing vulnerabilities
and improving security. Their actions may be illegal, but their
motivations can be seen as partially altruistic.
Cybersecurity Terminology
In the world of ethical hacking and cybersecurity, it is crucial to
familiarize yourself with key terms and concepts. Here are some
fundamental terms that every beginner should know:
1. Vulnerability: A weakness or flaw in a system, network, or application
that can be exploited by an attacker to gain unauthorized access or
perform malicious actions.
2. Exploit: A piece of software, chunk of data, or sequence of
commands that takes advantage of a vulnerability to compromise a
system or cause unintended behavior.
3. Payload: The actual code or data that an exploit delivers to a target
system, typically designed to perform a specific action, such as
establishing a remote connection or exfiltrating data.
4. Threat: A potential danger to an information system or network that
can cause harm, compromise security, or disrupt services.
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 2/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
Networking Basics
A solid understanding of networking basics is crucial for ethical hackers,
as many cybersecurity vulnerabilities and exploits are related to how
networks and devices communicate with one another. Here are some
key networking concepts to know:
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 3/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 4/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 5/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
Ethical hackers use a variety of tools and frameworks to assist with the
exploitation process, such as:
1. Metasploit: A powerful exploitation framework that includes a vast
collection of pre-built exploits, payloads, and auxiliary modules for a
wide range of vulnerabilities.
2. BeEF (Browser Exploitation Framework): A tool focused on exploiting
web browsers and leveraging browser vulnerabilities to assess the
security of web applications.
3. PowerShell Empire: A post-exploitation framework that leverages the
Windows PowerShell scripting language to execute various payloads
and commands on compromised systems.
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 8/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
2. Scope and Boundaries: Ethical hackers should work closely with the
organization to define the scope and boundaries of the assessment,
including any systems, networks, or applications that are off-limits. It
is essential to respect these boundaries and avoid causing
unintended harm or disruptions.
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 9/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
6. Growing Skill Gap: The demand for skilled ethical hackers and
cybersecurity professionals is expected to outpace the supply, leading
to a growing skill gap in the industry. This presents both challenges
and opportunities for ethical hackers, as organizations increasingly
rely on their expertise to secure their digital assets.
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 11/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
The Introduction to the Big Data Era is a beginner level PDF e-book tutorial or
course with 15 pages. It was added on April 24, 2015 and has been
downloaded 3948 times. The file size is 126.25 KB. It was created by Stephan
Kudyba and Matthew Kwatinetz.
JavaScript Basics
The JavaScript Basics is a beginner level PDF e-book tutorial or course with 18
pages. It was added on October 18, 2017 and has been downloaded 5839
times. The file size is 180.46 KB. It was created by by Rebecca Murphey.
Kali Linux
The Kali Linux is a beginner level PDF e-book tutorial or course with 322
pages. It was added on December 5, 2017 and has been downloaded 53913
times. The file size is 496.8 KB. It was created by Hack with Github.
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 12/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
Networking Fundamentals
The Networking Fundamentals is a beginner level PDF e-book tutorial or
course with 56 pages. It was added on December 31, 2012 and has been
downloaded 12270 times. The file size is 1.44 MB. It was created by BICSI.
Science of Cyber-Security
The Science of Cyber-Security is a beginner level PDF e-book tutorial or
course with 86 pages. It was added on December 21, 2014 and has been
downloaded 23145 times. The file size is 667.19 KB. It was created by JASON
The MITRE Corporation.
Excel Fundamentals
The Excel Fundamentals is a beginner level PDF e-book tutorial or course with
60 pages. It was added on March 30, 2020 and has been downloaded 59173
times. The file size is 7.03 MB. It was created by St. George’s Information
Services.
Fundamentals of Cryptology
The Fundamentals of Cryptology is an intermediate level PDF e-book tutorial
or course with 503 pages. It was added on December 9, 2021 and has been
downloaded 1841 times. The file size is 2.35 MB. It was created by Henk C.A.
Tilborg.
jQuery Fundamentals
The jQuery Fundamentals is a beginner level PDF e-book tutorial or course
with 108 pages. It was added on October 18, 2017 and has been downloaded
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 13/15
11/7/23, 1:34 PM Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals | PDF
2798 times. The file size is 563.78 KB. It was created by Rebecca Murphey.
Introduction to Microcontrollers
The Introduction to Microcontrollers is a beginner level PDF e-book tutorial or
course with 175 pages. It was added on December 5, 2017 and has been
downloaded 7407 times. The file size is 1.24 MB. It was created by Gunther
Gridling, Bettina Weiss.
Computer Fundamentals
The Computer Fundamentals is a beginner level PDF e-book tutorial or course
with 86 pages. It was added on August 17, 2017 and has been downloaded
13584 times. The file size is 772.52 KB. It was created by Dr Steven Hand.
https://www.computer-pdf.com/53-ethical-hacking-a-beginners-guide-to-cybersecurity-fundamentals 15/15