If I want to become an ethical hacker, what would be the best choice for university?
Forum Thread: What University Options Are Best for an Ethical Hacker
- Hot
- Active
-
Forum Thread: Free Proxy Servers? 9 Replies
17 hrs ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
1 day ago -
Forum Thread: 12 Ways How to Hack Any Social Network and Protect Yourself 2018 1 Replies
2 days ago -
Metasploit Error: Handler Failed to Bind 40 Replies
5 days ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
2 wks ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
2 wks ago -
Forum Thread: How to Hack School Website 8 Replies
3 wks ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
3 wks ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
3 wks ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
1 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
1 mo ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 48 Replies
1 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
1 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
2 mo ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 17 Replies
2 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
2 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
3 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
3 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
3 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
3 mo ago
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Scan Websites for Interesting Directories & Files with Gobuster
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
Tutorial: Create Wordlists with Crunch
-
How To: Create Custom Wordlists for Password Cracking Using the Mentalist
-
How To: Embed a Metasploit Payload in an Original .Apk File | Part 2 – Do It Manually
-
How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone
-
How To: Find Anyone's Private Phone Number Using Facebook
-
Hacking macOS: How to Hack a Mac Password Without Changing It
-
How To: Find Hidden Web Directories with Dirsearch
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Exploit EternalBlue on Windows Server with Metasploit
1 Response
I'm currently doing IST with a concentration in Cyber but very few schools offer that specific concentration. If you are looking to do pen testing/sys admin type work (or red/blue teaming) look into an IST major. If you are interested in malware development or coding in general check out a CS major.
Share Your Thoughts