<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[This Is Security]]></title><description><![CDATA[Cybersecurity, Ethical Hacking, Web App Security, Mobile App Security, IoT Security, Teaching, HackingSimplified.]]></description><link>http://localhost:8000/</link><image><url>http://localhost:8000/favicon.png</url><title>This Is Security</title><link>http://localhost:8000/</link></image><generator>Ghost 2.9</generator><lastBuildDate>Thu, 08 Dec 2022 18:44:28 GMT</lastBuildDate><atom:link href="http://localhost:8000/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Ethical Hacking 101]]></title><description><![CDATA[Ethical hacking, also known as penetration testing or "white hat" hacking, is the practice of testing a computer system, network, or web application to identify vulnerabilities that an attacker could exploit. These vulnerabilities can then be addressed to improve the security of the system.


Few key steps to getting started with 'Ethical Hacking' are :

 1. Terminologies and Legal Considerations : Familiarize yourself with the principles of ethical hacking and the legal considerations involved.]]></description><link>http://localhost:8000/ethical-hacking-101/</link><guid isPermaLink="false">Ghost__Post__63920fe3b79ed5021144dfec</guid><category><![CDATA[ethical-hacking-101]]></category><dc:creator><![CDATA[B]]></dc:creator><pubDate>Thu, 08 Dec 2022 18:42:28 GMT</pubDate><content:encoded><![CDATA[<figure class="kg-card kg-image-card"><img src="https://misty-surf-4229.fly.dev/content/images/2022/12/image-1.png" class="kg-image" alt="There are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it." loading="lazy" width="650" height="1337" srcset="https://misty-surf-4229.fly.dev/content/images/size/w600/2022/12/image-1.png 600w, https://misty-surf-4229.fly.dev/content/images/2022/12/image-1.png 650w"/></figure><p>Ethical hacking, also known as <u>penetration testing</u> or "<em>white hat</em>" hacking, is the practice of testing a computer system, network, or web application to identify vulnerabilities that an attacker could exploit. These vulnerabilities can then be addressed to improve the security of the system.<br/></p><p>Few key steps to getting started with 'Ethical Hacking' are :</p><ol><li><strong>Terminologies and Legal Considerations </strong>: Familiarize yourself with the principles of ethical hacking and the legal considerations involved. Ethical hacking should always be performed with the permission of the owner of the system being tested, and it is important to understand the laws and regulations that apply to hacking activities.</li><li><strong>Tools and Techniques</strong> : Learn about the tools and techniques used by ethical hackers. This may include learning about different types of attacks, such as SQL injection or cross-site scripting, and how to use tools like network scanners and password crackers.</li><li><strong>Practice Grounds</strong> : Practice your skills on a safe and controlled environment, such as a personal computer or a virtual machine. You can use online resources or books to learn about common vulnerabilities and how to exploit them, and then practice using the tools and techniques you have learned.</li><li><strong>Certifications </strong>: Consider obtaining a certification in ethical hacking. This can help demonstrate your knowledge and skills to potential employers, and many certification programs also provide additional training and resources to help you continue to develop as an ethical hacker.</li><li><strong>Jobs and Self-Employed Opportunities </strong>: Start looking for opportunities to use your skills in a professional setting. This could include working for a security consulting firm, joining the security team at a company, or offering your services as a freelance ethical hacker.<br/></li></ol><p>Remember that ethical hacking is a complex and <em><u>constantly evolving field</u></em>, and it is important to <u><em>continue learning and staying up-to-date on the latest tools and techniques</em></u>. </p><p>With dedication and practice, you can develop the skills and knowledge needed to become a successful ethical hacker.</p><p>Each of these steps, in itself is very vast. We will explore each of these steps in this course briefly and then continue with dedicated course on each of them.</p>]]></content:encoded></item><item><title><![CDATA[Coming soon !]]></title><description><![CDATA[This is This Is Security, a brand new site by AShrey that's just getting started. Things will be up and running here shortly, but you can subscribe in the meantime if you'd like to stay up to date and receive emails when new content is published!]]></description><link>http://localhost:8000/coming-soon/</link><guid isPermaLink="false">Ghost__Post__638e5c33b79ed5021144de1c</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[AShrey]]></dc:creator><pubDate>Mon, 05 Dec 2022 21:01:39 GMT</pubDate><media:content url="https://static.ghost.org/v4.0.0/images/feature-image.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://static.ghost.org/v4.0.0/images/feature-image.jpg" alt="Coming soon !"/><p>This is This Is Security, a brand new site by AShrey that's just getting started. Things will be up and running here shortly, but you can <a href="#/portal/">subscribe</a> in the meantime if you'd like to stay up to date and receive emails when new content is published!</p>]]></content:encoded></item></channel></rss>