Hacking and Networks

Practical Ethical Hacking

The following blog posts are notes that I have taken while I was working through TCM Sec Academy’s “Practical Ethical Hacking” course. The list has the same struture as the course, but the notes reflect my own preferences. I have left out or shortened stuff that I knew already, and I may add additional information from other sources over time. Just reading my notes is surely no substitute for taking the course.

The first half of the course is available free of charge on youtube.

Notekeeping

Networking Refresher

Introduction to Linux

Introduction to Python

The Hacker Methodology

Information Gathering (Reconnaissance)

Scanning & Enumeration

Vulnerability Scanning with Nessus

Exploitation Basics