An upcoming series for someone who wants to enter the field of cybersecurity with basically zero knowledge.

Hello everyone,

I am Chitranjan Singh, an ethical hacker with hands-on experience in network, web, and android penetration testing.

I am starting a blog series on my medium account(link provided below) in which I’ll be writing about how someone can enter the field of cybersecurity. No IT background needed, It’ll be in layman language so that anyone can cope up and understand the series.

After completely following up with the series you’ll be able to give C|EH (Certified Ethical Hacker) exam( price for giving the exam- $1199/- or ₹87383.82/- as of 09/02/2021.) and will be able to pass with flying colors.

Prerequisites for following up with the series-

  • Basics of computer(like how to turn it on/off).
  • You should have a good internet connection.
  • Either Linux installed (kali or parrot preferred as they already have required tools installed otherwise any Debian distro will do) or virtual-box installed in your windows system. If you don’t know how to install virtual-box, you can watch any related video on youtube and you’ll be able to do it in 5 mins.

And yeah that’s basically it. You don’t need to know or have anything other than this as everything will be described in the series.

What you’ll learn in this series of blogs-

  • What is ethical hacking?
  • Types of ethical hackers.
  • What is the dark web and deep web?
  • Some basic terminology like threat, vulnerability, exploit.
  • Phases of hacking.
  • What is red teaming and blue teaming?
  • Types of penetration testing.
  • Basics of networking-

What is a network?

  • Learn to use netdiscover.
  • What is loopback/ localhost/home/ own IP?
  • Basics of NMAP.
  • Some important ports.
  • Basics of Metasploit.
  • Then we will hack windows 7 using Metasploit.
  • What is brute forcing?
  • Basics of Hydra.
  • Make your own wordlist.
  • Basics of OpenVas and Nessus.
  • Basics of Sqlmap.
  • Types of cross-site scripting(XSS).
  • Basics of wifi hacking- WEP, WPA, WPA2, WPA3, 3-WAY, and 4-WAY handshake, WPS.
  • What is a virus, trojan horses, RAT?
  • Basics of Linux including what is the use of its different directories.
  • Basics of Bash.
  • And finally making payloads with or without bash.
  • Some more terminologies- honeypots, bot, CIA triad, etc.

And much more. After doing this wholeheartedly you can proudly say that you are an ethical hacker and can clear C|EH.

After this series of blogs is completed, am also thinking of starting blogs on python for cybersecurity, Android pen testing, and web application penetration testing.

The first blog will be out on Feb 11, 2021.

Hope you like it.

Social media accounts-



Github username- Chitranjan404

Twitter username- Chitranjan404

Instagram username- its._.chitranjan.

*Legal Disclaimer:

The Authors, or any Party Related to this series of blogs or its Contents, Will not be Responsible for Any kind of Loss to anyone in any way due to this series.

Chitranjan is an Ethical Hacker with hands-on experience in network, android and web peneteration testing.