Security & Monitoring

Ethical Hacking Roadmap Cheatsheet

Comprehensive roadmap for aspiring ethical hackers covering essential computer skills, networking, Linux, programming, practical training platforms (HTB, THM), and professional certifications (PEH, eJPT, OSCP).

#ethical-hacking #security #penetration-testing #certification #oscp #ejpt #hackthebox #tryhackme

Getting started with ethical hacking? Revisit the essentials on our main hub and keep an eye on live infrastructure trends via the performance dashboard.

When you are ready to evaluate lab environments, browse the benchmark collection, shortlist options in the VPS comparison tool, and vet vendors through our provider directory.

Sign In to Download

Free account required

What is Ethical Hacking?

Ethical hacking is the practice of intentionally testing computer systems, networks, and applications to find security vulnerabilities that malicious hackers could exploit. Ethical hackers use the same techniques as malicious hackers but with permission and the goal of improving security.

Legal & Authorized
Always get permission before testing
Systematic Approach
Follow methodologies and frameworks
Continuous Learning
Technology evolves, so must you
01

Computer Skills

Foundation knowledge of how computers work is essential before diving into ethical hacking.

Core Concepts to Master

Operating Systems: Windows, Linux, macOS architecture
Hardware: CPU, RAM, storage, peripherals
File Systems: NTFS, ext4, permissions
Processes: Services, daemons, task management
Virtualization: VMware, VirtualBox, Docker
Basic Networking: IP addresses, ports, protocols

Learning Resources

  • Professor Messer's YouTube: Free CompTIA A+ course
  • How Computers Work: Understanding hardware and software
  • Operating Systems Basics: Process management, memory, I/O
Time Investment: 2-4 weeks for fundamentals. Set up a lab environment with virtual machines for hands-on practice.
02

Networking Skills

Networking is the backbone of ethical hacking. Understanding how data flows across networks is crucial.

Essential Networking Concepts

TCP/IP Model & OSI Model

Understand the 7 layers and how data is encapsulated/decapsulated

Common Protocols

HTTP/HTTPS, FTP, SSH, DNS, DHCP, SMTP, SNMP

IP Addressing & Subnetting

IPv4, IPv6, CIDR notation, subnet masks, network/broadcast addresses

Network Devices

Routers, switches, firewalls, load balancers, proxies

Packet Analysis

Using Wireshark and tcpdump to capture and analyze network traffic

Hands-On Practice

# Network scanning with nmap
nmap -sV 192.168.1.0/24

# Packet capture with tcpdump
sudo tcpdump -i eth0 -w capture.pcap

# DNS lookup
dig example.com
nslookup example.com

# Trace route
traceroute example.com

Pair these exercises with our security tools suite, including the port scanner and DNS lookup utility, then reinforce network theory through the TCP handshake cheatsheet and our DNS fundamentals guide.

Recommended Learning Path

  • CompTIA Network+: Industry-standard networking certification
  • Cisco CCNA: Deep dive into networking fundamentals
  • Professor Messer's Network+ Course: Free YouTube series
  • Practical Networking: YouTube channel with excellent visualizations
03

Linux Skills

Linux is the most popular choice for hackers. Master the command line and you'll be miles ahead.

Critical Linux Skills

File System Navigation
cd, ls, pwd, find, locate
File Manipulation
cat, grep, sed, awk, cut, sort
User Management
useradd, passwd, chmod, chown
Process Management
ps, top, kill, systemctl
Package Management
apt, yum, dnf, pacman
Bash Scripting
variables, loops, conditionals

Need quick references? Keep the Linux commands cheatsheet and file permissions guide nearby, and map hybrid lab deployments with the cloud platform models reference.

Recommended Distributions

Kali Linux: Pre-loaded with 600+ security tools, perfect for penetration testing
ParrotOS: Lightweight alternative to Kali with similar tools
Ubuntu: Beginner-friendly for learning Linux basics

Learning Resources

  • OverTheWire Bandit: Interactive Linux command line challenges
  • Linux Journey: Free online Linux learning platform
  • The Linux Command Line Book: By William Shotts (free PDF)
04

Programming Skills

Programming enables you to automate tasks, write exploits, and understand how applications work.

Essential Programming Languages

Python (Priority #1)

The most important language for ethical hacking. Used for scripting, automation, exploit development, and tool creation.

Learn: Variables, loops, functions, file I/O, libraries (requests, socket, subprocess)

Bash Scripting

Automate Linux tasks and create security tools

JavaScript

Essential for web application security (XSS, DOM manipulation)

SQL

Database queries and SQL injection testing

C/C++

Understanding memory, buffers, and low-level exploits

Sample Python Security Script

#!/usr/bin/env python3
import socket
import sys

def port_scanner(host, start_port, end_port):
    print(f"Scanning {host} from port {start_port} to {end_port}...")
    
    for port in range(start_port, end_port + 1):
        try:
            sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            sock.settimeout(1)
            result = sock.connect_ex((host, port))
            
            if result == 0:
                print(f"Port {port}: OPEN")
            
            sock.close()
        except socket.error:
            print(f"Error scanning port {port}")
            sys.exit()

if __name__ == "__main__":
    target = "192.168.1.1"
    port_scanner(target, 1, 100)

Learning Resources

  • Python for Cybersecurity: Black Hat Python book
  • Automate the Boring Stuff with Python: Beginner-friendly
  • OWASP WebGoat: Learn web security with hands-on challenges
  • Codecademy: Interactive Python tutorials
05

Practical Ethical Hacking by TCM Security

Hands-on course focusing on practical penetration testing skills rather than theory.

Why This Course?

  • Hands-On Focus: Real-world penetration testing techniques
  • Complete Methodology: Full penetration testing lifecycle
  • Affordable: Best value course for beginners
  • Active Directory: Enterprise environment hacking

Course Topics Covered

• Reconnaissance & Information Gathering
• Scanning & Enumeration
• Vulnerability Analysis
• Exploitation Techniques
• Post-Exploitation
• Privilege Escalation
• Web Application Testing
• Active Directory Attacks
• Report Writing
• Legal & Ethical Considerations
06

Practice on HackTheBox (HTB)

HackTheBox is an online cybersecurity training platform with real-world vulnerable machines.

What Makes HTB Special?

  • Real Machines: Hack actual vulnerable VMs, not simulations
  • Difficulty Levels: From Easy to Insane boxes
  • Community: Active forums and writeups after machine retirement
  • Ranking System: Track your progress and compete globally

Getting Started with HTB

1
Create Account

Sign up at hackthebox.com (free tier available)

2
Connect to VPN

Download OpenVPN config and connect to HTB labs

3
Start with Easy Boxes

Try retired machines: Lame, Legacy, Blue, Jerry

4
Document Your Process

Take notes, create writeups, build your methodology

Pro Tip: Watch IppSec's YouTube channel for detailed machine walkthroughs and methodology building.
07

Practice on TryHackMe (THM)

TryHackMe is a more beginner-friendly platform with guided learning paths and hands-on labs.

Why TryHackMe?

  • Beginner-Friendly: Step-by-step guidance with hints
  • Learning Paths: Structured courses for different specializations
  • Browser-Based: AttackBox available (no need for VPN initially)
  • Affordable: Many free rooms, premium is cheap

Recommended Learning Paths

Complete Beginner Path

Linux basics, web hacking, networking, privilege escalation

Offensive Pentesting Path

Real-world penetration testing scenarios

Web Fundamentals

OWASP Top 10, SQLi, XSS, CSRF, file uploads

Jr Penetration Tester

Preparation for eJPT certification

Essential THM Rooms for Beginners

• Basic Pentesting
• OWASP Top 10
• Nmap
• Metasploit
• Linux Privilege Escalation
• Windows Privilege Escalation
• Burp Suite Basics
• Web Application Security
08

eLearnSecurity Junior Penetration Tester (eJPT)

Your first professional certification in penetration testing - beginner-friendly with hands-on exam.

Certification Overview

Provider: INE Security (formerly eLearnSecurity)
Level: Entry-level / Beginner
Duration: 48 hours for exam (3 days)
Format: Practical exam with 20 multiple choice questions
Cost: ~$200-250 USD

What You'll Learn

Assessment Methodologies

Systematic pentesting approach

Host & Network Auditing

Scanning and enumeration

Web Application Security

OWASP vulnerabilities

System Exploitation

Metasploit, manual exploitation

Study Resources

  • INE Starter Pass: Free training materials
  • TryHackMe Jr Pentester Path: Excellent preparation
  • TCM PEH Course: Covers most eJPT topics
  • Practice Labs: PentesterLab, VulnHub machines

Why Start with eJPT?

eJPT is perfect as your first certification. It's affordable, practical, and builds your confidence before attempting OSCP. The 48-hour exam window means less stress compared to OSCP's 24 hours.

09

Offensive Security Certified Professional (OSCP)

The gold standard certification for penetration testers - highly respected in the industry.

Certification Details

Provider: Offensive Security
Level: Intermediate
Exam Duration: 23 hours 45 minutes + 24 hours for report
Format: Compromise machines to earn 70+ points out of 100
Cost: $1,649 USD (includes 90 days lab access + exam)
Motto: "Try Harder" - encourages independent problem-solving

OSCP Course (PEN-200)

Comprehensive penetration testing with kali linux (PWK) course includes:

• Extensive PDF courseware
• Video tutorials
• 70+ lab machines
• Active Directory environments
• Bonus exercises for extra points
• Community forums

Exam Structure

Active Directory Set: 3 machines 40 points
Standalone Box (Hard): 1 machine 20 points
Standalone Box (Medium): 1 machine 20 points
Standalone Box (Easy): 1 machine 20 points
Passing Score: 70 points (must fully compromise AD set to get 40 pts)

Preparation Strategy

  • Complete PWK Lab: Compromise all 70+ machines
  • Practice on Proving Grounds: OffSec's practice platform
  • HTB OSCP-Like Boxes: TJnull's list of OSCP preparation machines
  • Master Active Directory: Focus heavily on AD enumeration and attacks
  • Build Your Methodology: Document your process for recon, enum, exploitation
  • Take Care of Yourself: Sleep well before exam, take breaks
Reality Check: OSCP is challenging. Expect to spend 3-6 months preparing. Don't rush - build a solid foundation first with eJPT and HTB/THM practice.
10

Continuous Learning & Career Growth

Ethical hacking requires lifelong learning. Technology evolves, and so must your skills.

Stay Updated

Security News

Follow Krebs on Security, The Hacker News, Bleeping Computer

Twitter/X Security Community

Follow @hackinarticles, @IppSec, @thecybermentor

YouTube Channels

IppSec, John Hammond, LiveOverflow, STÖK

Podcasts

Darknet Diaries, Malicious Life, Security Now

Advanced Certifications

OSEP: Offensive Security Experienced Penetration Tester
OSWE: Offensive Security Web Expert
OSED: Offensive Security Exploit Developer
CRTP: Certified Red Team Professional
PNPT: Practical Network Penetration Tester (TCM)

Bug Bounty Programs

Apply your skills to find real vulnerabilities and earn money:

HackerOne: Most popular bug bounty platform
Bugcrowd: Crowdsourced security platform
Synack: Invite-only, vetted researchers
Intigriti: European bug bounty platform

Join Communities

  • Reddit: r/netsec, r/AskNetsec, r/HowToHack
  • Discord Servers: TryHackMe, HackTheBox, TCM Security
  • OWASP Chapters: Local security meetups
  • DEF CON Groups: Global hacker community
  • Local BSides: Security conferences in your area

Build Your Brand

GitHub Portfolio: Share your tools and scripts
Blog Writeups: Document your HTB/THM solutions
LinkedIn Presence: Connect with security professionals
CTF Participation: Compete in Capture The Flag events

Final Words

Hacking is a lifelong learning journey. There are new vulnerabilities discovered daily, new tools released, and new techniques developed. Embrace the "Try Harder" mindset, stay curious, network with other professionals, and most importantly - hack ethically and legally. Your reputation is everything in this field.

Ready to Test Your Security Skills?

Put your ethical hacking knowledge to work. Explore VPS security benchmarks, analyze server configurations, and understand real-world security implementations. Practice makes perfect!

Stay aligned with our testing methodology on the About page, and if you need tailored lab advice, drop a note via the contact form. Reviewing policies is just as critical as patching systems—scan the privacy policy before gathering assessment data.

Correlate your findings with real infrastructure metrics on the performance dashboard, and expand your study plan with adjacent guides like the DHCP cheatsheet and our OSI vs. TCP/IP reference to level up network reconnaissance skills.