
Every good ethical hacker knows their way around Linux. We will discuss common ports and protocols, the OSI model, subnetting, and even walk through a network build with using Cisco CLI. This section focuses on the concepts of computer networking. We will discuss the important tools you can use to keep notes and be successful in the course and in the field. An ethical hacker is only as good as the notes he or she keeps. What does an ethical hacker do on a day to day basis? How much can he or she make? What type of assessments might an ethical hacker perform? These questions and more will be answered.

In this course, we will focus only on tools and topics that will make you successful as an ethical hacker.

Too many courses teach students tools and concepts that are never used in the real world. In this course, you will learn the practical side of ethical hacking. To enjoy this course, you need nothing but a positive attitude and a desire to learn. Welcome to this course on Practical Ethical Hacking.
