Hardware & Networking

Get insights from 1.6k questions on Hardware & Networking, answered by students, alumni, and experts. You may also ask and answer any question you like about Hardware & Networking

Follow Ask Question
1.6k

Questions

0

Discussions

82

Active Users

3.6k

Followers

New question posted

6 years ago

0 Follower 39 Views

New question posted

6 years ago

0 Follower 26 Views

New question posted

6 years ago

0 Follower 31 Views

New answer posted

6 years ago

0 Follower 53 Views

S
Sarvesh Kinfer

Guide-Level 13

Training and on-the-job experience are the only ways to become a network admin. Here are some steps:
Learn about how network protocols help to make a network work properly. L1, L2, L3 and L4.
Ethernet - L2 routing, ARP, STP, etc. IP - L3 routing, RIP, OSPF, etc. TCP/UDP - How packets are built and interact with the network. You would then learn vendor-specific tools/commands to make a network work and route packets correctly. At the end of the day, all networks work the same way, the only difference is what commands specific hardware required to make them work. I would also look into how network services like DNS, DHCP, PXE, etc. Work so
...more

New question posted

6 years ago

0 Follower 18 Views

New answer posted

6 years ago

0 Follower 30 Views

R
rahul r

Scholar-Level 18

An Ethical Hacker should have deep knowledge about networking field and SQL, besides being an expert programmer. And most of all a candidate should have a deep interest, knowledge and passion for his field. He must keep himself updated about the recent developments in his field. Some of the latest soft-wares in the field of hacking are Cain and Abel, Nessus, Nmap, NET Stumbler, SQL map etc. Regards.

New question posted

6 years ago

0 Follower 17 Views

New answer posted

6 years ago

0 Follower 21 Views

R
rahul r

Scholar-Level 18

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security. Ensuring cybersecurity requires coordinated efforts throughout an information system. Elements of cybersecurity include:
Application security
Information security
Network security
Disaster recovery / business continuity planning
Operational security
End-user education.

New answer posted

6 years ago

0 Follower 288 Views

R
rahul r

Scholar-Level 18

Yes, it is possible to pursue ethical hacking course after B.Sc. Computer Science. Please check for your eligibility to pursue ethical hacking courses from the criteria mentioned below:
Eligibility: An ethical hacker must have a Bachelors degree in IT, CS CE etc. Or an advanced Diploma in network security. Besides the Bachelors degree, candidate should also have extensive experience in network security and a working knowledge of various operating systems. A working knowledge of the latest penetration software is essential. Regards.

New answer posted

6 years ago

2 Followers 80 Views

V
Vikash Jain

Guide-Level 14

If you want to pursue a career in networking then there are two ways to do it:
1. Do specialization in computer networking by doing PG from IISc, IIT, NIT, etc. After completing PG, you will get a chance to work with networking giants like Cisco, Orange, Juniper, etc. Here you can get a chance to work in their R&D department. (Here you work as a researcher).
2. Another way is that you can enter into this field by obtaining vendor certifications like CCNA, CCNP, CCIE (Cisco track) or JNCIA, JNCIP, JNCIE (Juniper track), etc. By following this certification track, you will be able to design, install, configure and troubleshoot small to the
...more

Get authentic answers from experts, students and alumni that you won't find anywhere else

Sign Up on Shiksha

On Shiksha, get access to

  • 64k Colleges
  • 968 Exams
  • 627k Reviews
  • 1500k Answers

Share Your College Life Experience

×
×

This website uses Cookies and related technologies for the site to function correctly and securely, improve & personalise your browsing experience, analyse traffic, and support our marketing efforts and serve the Core Purpose. By continuing to browse the site, you agree to Privacy Policy and Cookie Policy.