As educators, we often remind learners: “Skills are built before solutions are found.”
Ethical hacking is no different.
Before an ethical hacker can protect a system, they must first understand how it works, how it breaks, and how it can be defended.
This chapter explores the core skills and essential tools every beginner should know — explained in simple, relatable terms.
If computers were people, networks are the languages they speak.
Here are the basics — explained simply:
Think of TCP/IP as the postal system of the internet.
DNS = the internet’s phonebook.
When you type google.com, DNS translates that name into the IP address computers understand.
This is the language of web communication.
VPNs create a private tunnel for data to travel safely.
They protect identity and location — something both attackers and defenders use.
Ethical hackers must be comfortable using:
You don’t need to be a developer, but knowing how things are built helps you understand how they break.
Useful languages:
Ethical hacking is detective work.
You:
Just like inquiry-based learning, ethical hacking values curiosity over memorization.
At a beginner level, you should understand:
These concepts form the safety net when evaluating a system’s security posture.
A popular Linux distribution loaded with penetration-testing tools.
It's like a toolbox specifically designed for ethical hacking.
Think of Nmap as a digital radar.
It scans networks to reveal:
A packet analyzer — it allows you to “listen” to network traffic.
It's crucial for:
A powerful tool for web application security testing.
Useful for discovering:
A platform for:
This is where the offensive side of ethical hacking becomes hands-on.
Both are vulnerability scanners used to detect weaknesses quickly.
Python scripts can automate:
It’s a highly practical beginner skill.
Ethical hacking isn’t just about “breaking into systems.”
It’s about understanding how systems work, asking the right questions, and protecting what matters.
As an IB educator, I see ethical hacking through the lens of inquiry:
These skills and tools form the foundation upon which every ethical hacker — beginner or expert — builds their prtice.