Starting a Career as an Ethical Hacker
The book, ‘Pentester Blueprint’ by Phillip L. Wylie a & Kim Crawley offers some great insight into the path to becoming a Pentester.
In brief, the formula to follow is:
Technical Knowledge + Pentesting Techniques + Persistence Minsdet = Pentesting Success
To improve these elements of the formula, we need to place emphasis on developing these Skills and Knowledge:
- Windows
- Linux
- Networking
- Security philosophy and knowledge
- Scripting - Bash, python, Powershell
- Active Directory (AD)
- Web Technologies
- Wireless Technologies
- Internet of Things (IoT)
- Hacking
- Web Hacking
- Wireless Hacking
- Social Engineering
- Physical Pentesting
- Android
- iOS
- macOS
- Firewall Configuration
- Python
- Java
- Reverse Engineering
- Antivirus
- Firewalls
- Critical Thinking
- Talking to Businesspeople
- Empathising with End Users to understand how they
- Creativity
- Perseverance
Where are your knowledge gaps?