Learn to be a Hacker with Cybrary

July 25, 2016 | Views: 29274

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Where do you start with this? At the moment, you may have far too many people sharing their own ideas about being a hacker. I’m not here to sugar coat it for you. I’m not going to tell you that you need to be “creative,” “adaptive,” or “persistant”. If you’re choosing to be an ethical hacker, then you should possess these qualities already. If you find yourself uninterested after you find out what hard work it is, it’s the wrong profession for you. And, this is a profession.

The state of affairs with current learning in Universities across the world have seen only a slight improvement in offering actual courses for Cyber Security and Ethical Hacking. This is disturbing since Cybercrime in the UK alone accounts for more than physical crime now. With the recent Brexit from Europe, there should be more investment in Cyber Security development and education.

This is where this small guide comes in. Using only your home computer and Cybrary, you can start your journey to becoming an Ethical Hacker.




Cybrary has courses that can guide you on your way to starting this profession. Let’s assume you know nothing about computers or how they work. Congrats, you get to start from the bottom. This isn’t meant to put you off. This is a chance for you to learn and build a solid foundation for your learning. For this, you need to be looking at the CompTIA A+ and Network+ courses.

I bet you’re looking at a Linux build, Kali Linux, right? Maybe BlackArch? Let’s get something straight: Kali and BlackArch are similar, but both have different commands built into them. You need to learn the basics or running a Linux system. Get on the Linux+ from CompTIA.

By this time, you’ll have a solid working knowledge of computer systems, networks and Linux. You can’t build a better foundation for your studies. Yes, it will be long. Yes, it will sometimes seem like a grind. But, if you don’t already possess the skills these courses will teach you, you’re going to be wondering what the lecturers are talking about when it comes to the more advanced stuff.



Taking the next step, you can begin the fun side of Ethical Hacking: building your own lab environment. I’m not going to teach you how to do that here; there are plenty of places that will. But, there will be some things that you’ll need:

  • A computer that allows virtualization
  • At least 6GB of RAM (For safely running a small virtualized network)
  • VMwarePlayer or VirtualBox
  • A Kali Linux VM

You’ll need to start with the basics – Web Application Penetration Testing. This course does exactly what it says, giving you instruction on how to use Kali to attack most companies largest surface area: their web app. It takes you through several ways to break the security of websites and better equip yourself for the future. You also get familiar with Kali Linux this way.

Penetration Testing and Ethical Hacking takes you through the CEH v8 course with Cybrary. Inside is useful theory and technical advice along with several attack vectors, offering another useful way to learn more of what you need.

Metasploit should be a go-to for everyone. Cybrary has a complete course on this and once you download Metasploitable as a VM, you can use the program Metasploit that already comes with Kali Linux. It’s another stepping stone.



And, then on to more advanced things: courses like Advanced Penetration Testing and Post Exploitation Hacking take you through what to do once you gain access to a system. Remember, this can all be learned through your own computer at home. I setup a network of ten using two computers. You can do this, too.



Want to delve deeper? Or, perhaps you’ve found a specialization that you prefer? Good. Hackers aren’t masters of everything. Normally, they’re part of a team who all have different abilities. Some are good at Malware Analysis, some are good at Forensics, some at Social Engineering. Finding your niche is the best way to progress in Cyber Security, you can’t be an expert at everything. Be the best you can be in your field.

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Wow Thank you, well illustrated, but a small problem, aren’t hackers required to be well versed with programming languages? i didn’t see you mentioning it here. thnx

  2. well documented and illustrated in simple, easy and yet elegant way. Thankyou

  3. Nice article. Love it.. Taking a step towards it

  4. Kickass article! Thanks for the motivation.

Page 10 of 10« First...«678910
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?