lmhicks101 Posted October 7, 2014 ID:887397 Share Posted October 7, 2014 Hello I'm currently going to school to become a network technician and I'm studying for my CCENT and CCNA. However I would truly love to become a white hat and help find and prevent breaches. Where should I start? Thank You lmhicks101 Link to post Share on other sites More sharing options...
David H. Lipman Posted October 7, 2014 ID:887404 Share Posted October 7, 2014 CompTIA Security+ CISSP Ethical Hacking Link to post Share on other sites More sharing options...
Fingolfin Posted October 7, 2014 ID:887454 Share Posted October 7, 2014 Thanks for the links! Link to post Share on other sites More sharing options...
David H. Lipman Posted October 7, 2014 ID:887461 Share Posted October 7, 2014 Good Luck ! Link to post Share on other sites More sharing options...
lmhicks101 Posted October 7, 2014 Author ID:887469 Share Posted October 7, 2014 Thank you. How much experience would you recommend before attempting these? Link to post Share on other sites More sharing options...
David H. Lipman Posted October 7, 2014 ID:887473 Share Posted October 7, 2014 Too many variables to give it a "weight". It will depend on your age, your level of schooling, your technical expertise, etc. One might go into it while in High School and another may need to have some college level courses under their belt. Link to post Share on other sites More sharing options...
lmhicks101 Posted October 7, 2014 Author ID:887478 Share Posted October 7, 2014 What's a good place to start practicing and getting a better introduction and grasp? Link to post Share on other sites More sharing options...
David H. Lipman Posted October 7, 2014 ID:887482 Share Posted October 7, 2014 A good place to start would be to study the Transmission Control Protocol (TCP) and the Internet Protocol (IP) (aka; TCP/IP) and the Networking File System (NFS). Understand what a Connection Full protocol is as compared to a connectionless protocol (like; FTP vs. SNMP). Learn and understand the OSI Model and how communication protocols in general "work". To "find and prevent breaches" you must understand both normal and abnormal traffic patterns and to do that you must be well acquainted with the above subject matter. Getting training for Cisco is a part of it as they have a large niche but you also have to understand the concepts holistically and not just based upon a particular vendor's POV. Does that help ? Link to post Share on other sites More sharing options...
lmhicks101 Posted October 7, 2014 Author ID:887556 Share Posted October 7, 2014 That actually helps allot. Currently I'm actually studying the OSI model, layer 2 and 3 to be more precise, and I understand IP is for LAN and TCP is for end to end over the internet, but my problem is mainly with subnet. Do you have any advise with that? I grasp the other layer perfectly fine though. Link to post Share on other sites More sharing options...
David H. Lipman Posted October 7, 2014 ID:887560 Share Posted October 7, 2014 OK. While not seen as much Today, I suggest looking the Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) and the one that had potential for security but could not gain momentum due to the prevalence of TCP/IP - 1GOSIP .as well as; NetBIOS , LAN Manager and Server Message Blocks (SMB). By studying IPX/SPX you can contrast and compare that to TCP/IP.By studying GOSIP you can learn how TCP/IP became the defacto standard with all its drawbacks and inherent vulnerabilities.By studying NetBIOS, LAN Manager and SMB you will have a greater understanding how networking is done Today and its roots in earlier networking models such as OS/2. This will give you greater insight 'cause you have to know where you have been to look forward and move ahead and mitigate the threats as they come to light. ----1. Why reinvent the wheel when its already on the cart ? GOSIP had potential and could have mitigated much of success of malicious actors, hackers, hacktivists and data stealers. Link to post Share on other sites More sharing options...
lmhicks101 Posted October 7, 2014 Author ID:887564 Share Posted October 7, 2014 Okay thank you. This was a lot of help. Link to post Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now