Monday 7 May 2018

About this Tutorial
Hacking has been a part of computing for almost five decades and it is a very broad
discipline, which covers a wide range of topics. The first known event of hacking had taken
place in 1960 at MIT and at the same time, the term "Hacker" was originated.
In this tutorial, we will take you through the various concepts of Ethical Hacking and
explain how you can use them in a real-time environment.
Audience
This tutorial has been prepared for professionals aspiring to learn the basics of Ethical
Hacking and make a career as an ethical hacker.
Prerequisites
Before proceeding with this tutorial, you should have a good grasp over all the
fundamental concepts of a computer and how it operates in a networked environment.
Copyright & Disclaimer
 Copyright 2016 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent
of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial,

No comments:

Post a Comment