Practical Ethical Hacking by TCM Sec: Refreshing The Foundation . . .

Sharzun
3 min readMar 31, 2024

--

Weekly Update #2:

REFRESHING THE FOUNDATION

Greetings, Everyone! 🌟

I hope everyone is having a good day & had a wonderful week. surely had a great week, hehe. Anyway, as mentioned last week, I have been studying EthicalHacking through the course Practical Ethical Hacking by TCM Security Academy. To be honest, the course is very well structured so far for beginners who want to pursue this career. So far, I have completed the foundational parts of the Cybersecurity realm, which are Computer Networking & IT, Linux & Python. I used an app called Remnote to take my notes as it is more convenient for me compared to other suggestions given by Heath Adams.

So, the first thing I would like to talk about is Networking. The main topics discussed in this part were TCP/IP, OSI model, and subnetting. There were some subnetting practices given in this section for a better understanding of the typical network structure used in SOHO and homes. Other than that, there are quizzes given at the end of each section. I feel this is a great way for the students to evaluate their understanding of the specific topic.

Labs in the IT field are virtual machines that simulate certain environments, allowing users to practice skills. These labs are a way to provide IT training through the Internet, with participants and instructors interacting in a simulated environment. I love to use VMWare Workstation over Virtual Box. So, I just used the virtual setup I used in my previous projects and lessons. The main setup for this lab was just a virtual machine and Kali Linux.

During the Introductory section for Kali Linux, we explored Kali Linux for daily use and common commands that we use daily, such as Sudo-usage, file system navigation, users & privileges, tools installation & updating, and file creation & editing. Some advanced commands for IT specialists and students were also taught in the section, such as common network commands, starting & stopping services, bash scripting, and many more. Although I have learned most of the commands through my IT journey & Linux 101 course previously, I was able to learn some new commands in this section.

Last but not least, the final section of the week was Python Introduction. Just like the Linux section, there were some beginner topics and advanced topics. First, I went through the basic parts like strings, maths, variables & methods, functions, boolean expressions & operators, conditional statements, list[], tuples(), dictionaries{}, and loops. Then, advanced topics were taught, such as user input, advanced strings, module imports, socket, reading & writing files in the system, and Object Oriented Programming. There were also 3 small projects in this section, which were building a basic calculator, building a small port scanner & building a shoe budget tool using object-oriented programming. Although I have taken the Python 101 course before, this section taught me a lot of new things which I believe is going to be greatly beneficial for me in this course later. The projects are not that important but surely will help the students to understand the application of the syntaxes that they learned.

So, yeah. That’s all for the week as I am trying to go with a slow pace as I am fasting in the month of Ramadan. I do not want to force or strain myself because of the climate and for my health (too hotttt!!!!). Once done with my fasting, I will spend more time learning everything to speed up my progress. So, please wait for next week as things going to get heated up. We are going to dive into the actual methodology of Ethical Hacking, Reconnaissance, Scanning & Enumeration, Vulnerability Scanning, Basic Exploitation, and many more.

For now, it’s time for me to sign off 😉.
Till then, Peace Out! ✌🏼

Practical Ethical Hacking

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Sharzun
Sharzun

Written by Sharzun

Cybersecurity enthusiast sharing insights on hacking, tools, training, courses & certs. Passionate about ethical hacking, learning, & staying vigilant in cyber!

No responses yet

Write a response