1. A. networking technologies (e.g., hardware, infrastructure)
  2. web technologies (e.g., web 2.0, skype)
  3. systems technologies
  4. communication protocols
  5. malware operations
  6. mobile technologies (e.g., smart phones)
  7. telecommunication technologies
  8. backups and archiving (e.g., local, network)



  1. A. data analysis
  2. systems analysis
  3. risk assessments
  4. technical assessment methods


  1. Security-
  2. systems security controls 25% 31
  3. application/file server
  4. firewalls
  5. cryptography
  6. network security
  7. physical security
  8. threat modeling
  9. verification procedures (e.g., false positive/negative validation)
  10. social engineering (human factors manipulation)
  11. vulnerability s canners
  12. security policy implications
  13. privacy/confidentiality (with regard to engagement)
  14. biometrics
  15. wireless access technology (e.g., networking, RFID, Bluetooth)
  16. trusted networks
  17. vulnerabilities


  1. Tools / Systems / Programs-
  2. network/host based intrusion
  3. network/wireless sniffers (e.g., WireShark, Airsnort)
  4. access control mechanisms (e.g., smart cards)
  5. cryptography techniques (e.g., IPsec, SSL, PGP)
  6. programming languages (e.g. C++, Java, C#, C)
  7. scripting languages (e.g., PHP, Java script)
  8. boundary protection appliances
  9. network topologies
  10. subnetting
  11. port scanning (e.g., NMAP)
  12. domain name system (DNS)
  13. routers/modems/switches
  14. vulnerability scanner (e.g., Nessus, Retna)
  15. vulnerability management and protection systems (e.g., Foundstone, Ecora)
  16. operating environments (e.g., Linux, Windows, Mac)
  17. antivirus systems and programs
  18. log analysis tools
  19. security models
  20. exploitation tools
  21. database structures


  1. Procedures /Methodology-
  2. cryptography
  3. public key infrastructure (PKI)
  4. Security Architecture (SA)
  5. Service Oriented Architecture
  6. information security incident
  7. N-tier application design
  8. TCP/IP networking (e.g., network routing)
  9. security testing methodology


  1. Regulation/Policy-
  2. security policies
  3. compliance regulations (e.g., PCI)


  1. Ethics-
  2. professional code of conduct
  3. appropriateness of hacking


Few Books that will probably will help you to be master as Professional Ethical Hacker

  1. Beagle Bone-for-Secret-Agents-eBook (Click To Download)
  2. Ninja-Hacking-Unconventional-Penetration-Testing-Tactics-and-Techniques (Click To Download)
  3. Metasploit-Penetration-Testers-Guide (Click To Download)
  4. Mastering Kali Linux for Advanced Penetration Testing (Click To Download)
  5. Python-for-Secret-Agents (Click To Download)
  6. Beagle B one-Robotic-Projects-eBook (Click To Download)



I can also teach you each part of every step to become a professional. Each one must be understood to be able to audit/pentest a network.

All rights reserved to the author of this books and if you like their books please support the authors to purchase from them. And all the books stuff etc are provided here by Christo Baccianno | STEPS FOR UNDERSTANDING CYBER SECURITY – Download Free Hacking Books

Related Articles

Leave a Reply

Back to top button