Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals

it courses

Contents

Introduction to Ethical Hacking

In today's rapidly evolving digital landscape, the need for cybersecurity has never been greater. As cyber threats become more sophisticated and widespread, organizations require skilled professionals to protect their valuable data and systems. One such group of professionals is ethical hackers, who play a critical role in helping organizations identify and address potential vulnerabilities.

Ethical hacking, also known as penetration testing or white hat hacking, involves simulating the actions of a malicious attacker to uncover weaknesses in a computer system, network, or application. The primary goal of ethical hacking is to identify vulnerabilities before they can be exploited by cybercriminals, allowing organizations to proactively safeguard their digital assets.

Unlike black hat hackers, who engage in unauthorized and illegal activities for personal gain or malicious intent, ethical hackers work with the permission of the targeted organization. They follow a strict code of ethics, ensuring that their activities are lawful, responsible, and focused on improving security.

In this article, we will explore the basics of ethical hacking, providing beginners with a solid foundation to start their journey into this exciting and essential field. From understanding the hacker mindset to learning the methodology behind ethical hacking, this guide will equip you with the knowledge and skills needed to embark on a career in cybersecurity.

The Hacker Mindset and Approach

To become a successful ethical hacker, it is crucial to develop a deep understanding of the hacker mindset. This mindset is characterized by an insatiable curiosity and a desire to explore, experiment, and ultimately break through the barriers of systems and software. By thinking like a hacker, ethical hacking professionals can anticipate potential threats and identify weaknesses that might be exploited by malicious actors.

There are three main types of hackers, each with a distinct set of motivations and goals:

  1. White Hat Hackers (Ethical Hackers): These hackers use their skills to identify and fix vulnerabilities in computer systems, networks, and applications. They work within the boundaries of the law and adhere to a strict code of ethics, often employed or contracted by organizations to help improve their security posture.

  2. Black Hat Hackers: These individuals engage in unauthorized and illegal hacking activities for personal gain or malicious intent. They seek to exploit vulnerabilities in systems, steal sensitive data, or cause disruption to services.

  3. Grey Hat Hackers: These hackers fall somewhere between white and black hat hackers. They may engage in questionable activities, often without permission, but with the intention of exposing vulnerabilities and improving security. Their actions may be illegal, but their motivations can be seen as partially altruistic.

Cybersecurity Terminology

In the world of ethical hacking and cybersecurity, it is crucial to familiarize yourself with key terms and concepts. Here are some fundamental terms that every beginner should know:

  1. Vulnerability: A weakness or flaw in a system, network, or application that can be exploited by an attacker to gain unauthorized access or perform malicious actions.
  2. Exploit: A piece of software, chunk of data, or sequence of commands that takes advantage of a vulnerability to compromise a system or cause unintended behavior.
  3. Payload: The actual code or data that an exploit delivers to a target system, typically designed to perform a specific action, such as establishing a remote connection or exfiltrating data.
  4. Threat: A potential danger to an information system or network that can cause harm, compromise security, or disrupt services.
  5. Risk: The likelihood that a threat will exploit a vulnerability, combined with the potential impact of the resulting security breach.

There are also several types of attacks in cybersecurity, such as:

  1. Passive Attacks: These attacks involve monitoring or intercepting network traffic and data without actively engaging with the target system. Examples include eavesdropping, packet sniffing, and traffic analysis.
  2. Active Attacks: These attacks involve direct interaction with the target system, often exploiting vulnerabilities to gain unauthorized access, modify data, or disrupt services. Examples include SQL injection, cross-site scripting, and denial of service (DoS) attacks.
  3. Targeted Attacks: These attacks focus on specific organizations or individuals, often driven by financial gain, espionage, or other motives. Advanced persistent threats (APTs) are a prime example of targeted attacks.
  4. Opportunistic Attacks: These attacks are not targeted at specific victims but rather exploit widespread vulnerabilities to compromise as many systems as possible. Examples include malware infections, phishing campaigns, and automated scanning for open ports or unpatched software.

Networking Basics

A solid understanding of networking basics is crucial for ethical hackers, as many cybersecurity vulnerabilities and exploits are related to how networks and devices communicate with one another. Here are some key networking concepts to know:

  1. IP Addresses: Every device connected to a network has a unique identifier called an Internet Protocol (IP) address. There are two versions of IP addresses: IPv4 (32-bit) and IPv6 (128-bit). IP addresses allow devices to locate and communicate with one another.

  2. Ports: Network communication takes place through ports, which are logical endpoints for sending and receiving data. Each port is associated with a specific protocol and is identified by a unique number (ranging from 0 to 65535).

  3. Protocols: Protocols are standardized sets of rules that govern how data is transmitted over a network. Common protocols include HTTP (Hypertext Transfer Protocol) for web browsing, SMTP (Simple Mail Transfer Protocol) for email, and FTP (File Transfer Protocol) for file transfers.

  4. The OSI Model: The Open Systems Interconnection (OSI) model is a conceptual framework that standardizes the functions of a network into seven distinct layers. Each layer performs specific tasks and communicates with the layers above and below it. The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Some common networking tools used by ethical hackers include:

  1. Nmap: A versatile open-source tool for network discovery and security auditing. Nmap can be used to scan networks for open ports, detect operating systems, and identify running services, among other tasks.

  2. Wireshark: A popular network protocol analyzer that allows users to capture and analyze network traffic in real-time. Wireshark can be used to troubleshoot network issues, identify potential security vulnerabilities, and monitor network activity.

The Ethical Hacking Process

Ethical hackers follow a structured approach when assessing the security of a system, network, or application. This process generally consists of five phases, which help ensure a thorough and systematic evaluation of potential vulnerabilities and risks.

  1. Reconnaissance: This initial phase involves gathering information about the target system, such as IP addresses, domain names, network topology, and publicly available data. The goal is to learn as much as possible about the target to identify potential weaknesses and attack vectors.

  2. Scanning: In this phase, ethical hackers use various tools to actively probe the target system for vulnerabilities. This may involve scanning for open ports, identifying running services, and detecting software versions to uncover potential security flaws.

  3. Gaining Access: Once vulnerabilities have been identified, ethical hackers attempt to exploit them to gain unauthorized access to the target system. This may involve executing code, manipulating data, or leveraging misconfigurations to bypass security controls.

  4. Maintaining Access: After gaining access, ethical hackers often seek to establish a persistent foothold within the target environment. This allows them to maintain control over the system, monitor activities, and collect additional information. Techniques for maintaining access may include installing backdoors or rootkits, creating additional user accounts, or exploiting privilege escalation vulnerabilities.

  5. Covering Tracks: The final phase of the ethical hacking process involves erasing any evidence of the intrusion, making it difficult for defenders to detect or investigate the breach. This may involve deleting log files, tampering with system timestamps, or obfuscating network traffic.

Reconnaissance and Information Gathering

Reconnaissance is the first phase of the ethical hacking process and involves gathering as much information as possible about the target system. This information is used to identify potential vulnerabilities and plan subsequent attack strategies. Reconnaissance can be broadly categorized into two types:

  1. Passive Reconnaissance: In this method, the ethical hacker gathers information without directly interacting with the target system. Passive reconnaissance techniques include:

    • Open-source intelligence (OSINT) gathering: Collecting publicly available information from sources such as company websites, social media profiles, and domain registration records.
    • Network traffic analysis: Monitoring and analyzing network traffic to gather information about the target system, without actively sending packets or probing the system.
    • Social engineering: Manipulating individuals into divulging sensitive information, often through deception or persuasion.
  2. Active Reconnaissance: In this method, the ethical hacker directly interacts with the target system, probing it to gather information. Active reconnaissance techniques include:

    • Port scanning: Actively probing the target system to identify open ports and running services.
    • DNS enumeration: Querying DNS servers for information about the target domain, such as subdomains, mail servers, and IP addresses.
    • Network scanning: Actively probing network devices to gather information about the target network's topology and infrastructure.

Scanning and Vulnerability Assessment

Once the reconnaissance phase is complete, ethical hackers move on to scanning and vulnerability assessment. In this phase, they use various tools and techniques to actively probe the target system for vulnerabilities that could be exploited by an attacker. There are several types of scanning and assessment methods:

  1. Network Scanning and Enumeration: This involves scanning the target network for open ports, running services, and device configurations. Tools such as Nmap, Netcat, and Nessus can be used to conduct network scanning and enumeration.

  2. Vulnerability Scanning: Vulnerability scanners are automated tools that scan systems, networks, or applications for known security vulnerabilities. These tools often rely on databases of known vulnerabilities, such as the Common Vulnerabilities and Exposures (CVE) database. Popular vulnerability scanners include Nessus, OpenVAS, and Nexpose.

  3. Web Application Vulnerability Scanning: Web applications can have their own unique vulnerabilities that differ from traditional network vulnerabilities. Web application vulnerability scanners are designed to identify issues such as SQL injection, cross-site scripting (XSS), and broken authentication. Examples of web application vulnerability scanners include OWASP Zed Attack Proxy (ZAP) and Burp Suite.

  4. Configuration and Compliance Scanning: Misconfigurations in systems or applications can lead to security vulnerabilities. Configuration and compliance scanners check whether systems adhere to established security best practices and industry-specific regulations. Tools like OpenSCAP and Microsoft Baseline Security Analyzer (MBSA) can be used for configuration and compliance scanning.

Exploitation and Gaining Access

After identifying vulnerabilities in the target system, ethical hackers attempt to exploit these weaknesses to gain unauthorized access, simulate data breaches, or cause disruptions to services. Exploitation is an essential part of the ethical hacking process, as it demonstrates the real-world consequences of leaving vulnerabilities unaddressed. Some common exploitation techniques include:

  1. Code Injection: Injecting malicious code or scripts into a vulnerable application to execute arbitrary commands, gain unauthorized access, or manipulate data. Examples include SQL injection, cross-site scripting (XSS), and command injection.

  2. Buffer Overflow: Exploiting a vulnerability in an application's memory management to overwrite adjacent memory locations, potentially leading to arbitrary code execution, system crashes, or privilege escalation.

  3. Social Engineering: Manipulating individuals into divulging sensitive information or granting unauthorized access, often through deception or persuasion. Examples include phishing, pretexting, and baiting.

  4. Privilege Escalation: Gaining elevated privileges on a system by exploiting vulnerabilities or misconfigurations, allowing for unauthorized actions or access to sensitive data.

  5. Password Attacks: Attempting to crack or bypass authentication mechanisms to gain unauthorized access to a system. Methods include brute force attacks, dictionary attacks, and credential reuse attacks.

Ethical hackers use a variety of tools and frameworks to assist with the exploitation process, such as:

  1. Metasploit: A powerful exploitation framework that includes a vast collection of pre-built exploits, payloads, and auxiliary modules for a wide range of vulnerabilities.
  2. BeEF (Browser Exploitation Framework): A tool focused on exploiting web browsers and leveraging browser vulnerabilities to assess the security of web applications.
  3. PowerShell Empire: A post-exploitation framework that leverages the Windows PowerShell scripting language to execute various payloads and commands on compromised systems.

Maintaining Access and Post-Exploitation

Once ethical hackers have successfully exploited a vulnerability and gained access to a target system, they may seek to establish a persistent foothold within the environment. This process, known as maintaining access or post-exploitation, allows ethical hackers to simulate the actions of real-world attackers who may attempt to maintain control over compromised systems for an extended period.

Some common techniques used by ethical hackers for maintaining access include:

  1. Installing Backdoors: A backdoor is a secret entry point that provides unauthorized access to a system. Ethical hackers may install backdoors on compromised systems to simulate the actions of real-world attackers and test the organization's ability to detect and respond to such threats.

  2. Rootkits: Rootkits are a collection of tools or software designed to hide an attacker's presence on a compromised system and maintain unauthorized access. Ethical hackers may use rootkits to demonstrate the potential consequences of failing to detect and remediate vulnerabilities.

  3. Pivoting: Pivoting is the process of using a compromised system as a launching pad to attack other systems within the same network. Ethical hackers may use pivoting techniques to simulate how an attacker could move laterally through a network, potentially compromising additional systems and escalating the impact of a breach.

During the post-exploitation phase, ethical hackers may also perform various activities to further assess the security of the target environment, such as:

  1. Data Exfiltration: Simulating the theft of sensitive data from compromised systems to demonstrate the potential impact of a successful breach.
  2. Network Traffic Analysis: Monitoring network traffic to identify potential security weaknesses, such as insecure communication protocols or unencrypted data transmissions.
  3. System and Log Manipulation: Modifying system settings or log files to hide the presence of an attacker or disrupt system functionality, testing the organization's ability to detect and respond to such activities.

Covering Tracks and Reporting

The final phase of the ethical hacking process involves covering tracks and reporting. While malicious hackers often cover their tracks to avoid detection and hinder incident response, ethical hackers do so to simulate the actions of real-world attackers and test the organization's ability to detect and investigate security incidents. Some common techniques for covering tracks include:

  1. Log Tampering: Modifying or deleting log files to remove evidence of the intrusion and make it more difficult for defenders to identify and analyze the breach.
  2. Timestamp Manipulation: Changing system timestamps to hide the true timing of an attack or create confusion during incident response efforts.
  3. Traffic Obfuscation: Using encryption, tunneling, or other techniques to disguise network traffic and make it more difficult for defenders to identify and analyze malicious activity.

After completing the ethical hacking process, ethical hackers compile their findings and present them in a comprehensive report to the organization. This report typically includes:

  1. Executive Summary: A high-level overview of the assessment, including the scope, objectives, and key findings.
  2. Methodology: A description of the techniques and tools used during the ethical hacking process.
  3. Findings and Recommendations: A detailed breakdown of the vulnerabilities identified, the potential impact of these vulnerabilities, and recommended remediation steps.
  4. Technical Details: Supporting information and evidence, such as screenshots, logs, and exploit code, to help the organization understand and address the identified vulnerabilities.
  5. Conclusion: A summary of the overall security posture of the target environment and any additional insights or recommendations for improving security.

Ethics and Legality in Ethical Hacking

Ethical hacking, by its very nature, involves exploring and exploiting vulnerabilities in systems, networks, and applications. As such, it is crucial for ethical hackers to understand and adhere to ethical guidelines and legal boundaries to ensure they maintain a high level of professionalism and avoid potential legal issues. Some key considerations for ethical hackers include:

  1. Permission and Consent: Ethical hackers must always obtain explicit permission from the organization or system owner before conducting any security assessments or penetration tests. Engaging in unauthorized hacking activities can lead to severe legal consequences.

  2. Scope and Boundaries: Ethical hackers should work closely with the organization to define the scope and boundaries of the assessment, including any systems, networks, or applications that are off-limits. It is essential to respect these boundaries and avoid causing unintended harm or disruptions.

  3. Confidentiality and Non-Disclosure: Ethical hackers often have access to sensitive information during their assessments, such as system configurations, security vulnerabilities, and proprietary data. They must maintain strict confidentiality and adhere to any non-disclosure agreements (NDAs) they have signed with the organization.

  4. Responsible Disclosure: If an ethical hacker discovers a vulnerability in a third-party system or software, they should follow responsible disclosure guidelines by reporting the issue to the affected party and giving them a reasonable amount of time to address the vulnerability before making it public.

  5. Adhering to Laws and Regulations: Ethical hackers must stay up-to-date with relevant laws and regulations in the jurisdictions they operate in, including data protection laws, computer crime laws, and industry-specific regulations.

The future of ethical hacking

As technology continues to evolve rapidly, the demand for skilled ethical hackers and cybersecurity professionals will only grow. The future of ethical hacking will be shaped by several emerging trends and challenges:

  1. The Growing Importance of Cybersecurity: With an increasing number of high-profile data breaches and cyberattacks, organizations are becoming more aware of the importance of robust cybersecurity measures. Ethical hacking will play a critical role in helping organizations identify and remediate vulnerabilities and stay ahead of malicious actors.

  2. The Rise of Artificial Intelligence and Machine Learning: AI and ML are becoming more prevalent in cybersecurity, providing both opportunities and challenges for ethical hackers. While these technologies can help automate vulnerability detection and threat analysis, they can also be used by malicious actors to develop more advanced attacks and evasion techniques.

  3. The Internet of Things (IoT): The increasing number of interconnected IoT devices presents new attack surfaces and security concerns. Ethical hackers will need to adapt their skills and methodologies to assess the security of these devices and protect them from potential threats.

  4. Cloud Computing and DevSecOps: As more organizations adopt cloud computing and DevSecOps practices, ethical hackers will need to understand the unique security challenges and risks associated with these environments. This may involve learning new tools and techniques for assessing cloud-based infrastructure and applications.

  5. Evolving Legal and Regulatory Landscape: As laws and regulations related to cybersecurity and data protection continue to evolve, ethical hackers must stay informed about these changes to ensure they operate within the legal boundaries.

  6. Growing Skill Gap: The demand for skilled ethical hackers and cybersecurity professionals is expected to outpace the supply, leading to a growing skill gap in the industry. This presents both challenges and opportunities for ethical hackers, as organizations increasingly rely on their expertise to secure their digital assets.

In conclusion, ethical hacking is an essential component of modern cybersecurity efforts, helping organizations identify and remediate vulnerabilities in their systems, networks, and applications. By following a structured ethical hacking methodology, practitioners can systematically uncover security weaknesses and provide valuable insights to improve an organization's overall security posture.

As the future of ethical hacking unfolds, emerging trends and challenges such as AI, IoT, cloud computing, and evolving legal landscapes will shape the industry. Ethical hackers must continuously adapt their skills and stay informed about these developments to stay ahead of malicious actors and protect organizations from evolving threats.

Maintaining a strong understanding of ethics and legal boundaries is crucial for ethical hackers to ensure their work remains focused on improving security and preventing harm. As the demand for skilled ethical hackers grows, professionals in this field will play an increasingly vital role in securing our digital world and safeguarding sensitive information from malicious cyber threats.

Ethical Hacking: A Beginner's Guide to Cybersecurity Fundamentals PDF eBooks

The Complete Beginner’s Guide to React

The The Complete Beginner’s Guide to React is a beginner level PDF e-book tutorial or course with 89 pages. It was added on December 9, 2018 and has been downloaded 4060 times. The file size is 2.17 MB. It was created by Kristen Dyrr.


Artificial Intelligence for a Better Future

The Artificial Intelligence for a Better Future is an advanced level PDF e-book tutorial or course with 128 pages. It was added on November 9, 2021 and has been downloaded 650 times. The file size is 1.33 MB. It was created by Julian Kinderlerer.


Introduction to the Big Data Era

The Introduction to the Big Data Era is a beginner level PDF e-book tutorial or course with 15 pages. It was added on April 24, 2015 and has been downloaded 3975 times. The file size is 126.25 KB. It was created by Stephan Kudyba and Matthew Kwatinetz.


Purebasic A Beginner’s Guide To Computer Programming

The Purebasic A Beginner’s Guide To Computer Programming is a beginner level PDF e-book tutorial or course with 352 pages. It was added on September 20, 2017 and has been downloaded 4892 times. The file size is 1.15 MB. It was created by Gary Willoughby.


JavaScript Basics

The JavaScript Basics is a beginner level PDF e-book tutorial or course with 18 pages. It was added on October 18, 2017 and has been downloaded 5942 times. The file size is 180.46 KB. It was created by by Rebecca Murphey.


IP TABLES A Beginner’s Tutorial

The IP TABLES A Beginner’s Tutorial is an intermediate level PDF e-book tutorial or course with 43 pages. It was added on March 25, 2014 and has been downloaded 8906 times. The file size is 442.88 KB. It was created by Tony Hill.


Procreate: The Fundamentals

The Procreate: The Fundamentals is a beginner level PDF e-book tutorial or course with 38 pages. It was added on April 4, 2023 and has been downloaded 300 times. The file size is 2.45 MB. It was created by Procreate.


Kali Linux

The Kali Linux is a beginner level PDF e-book tutorial or course with 322 pages. It was added on December 5, 2017 and has been downloaded 56521 times. The file size is 496.8 KB. It was created by Hack with Github.


ASP.Net for beginner

The ASP.Net for beginner is level PDF e-book tutorial or course with 265 pages. It was added on December 11, 2012 and has been downloaded 7769 times. The file size is 11.83 MB.


Android Developer Fundamentals Course

The Android Developer Fundamentals Course is a beginner level PDF e-book tutorial or course with 566 pages. It was added on November 12, 2021 and has been downloaded 2138 times. The file size is 6.66 MB. It was created by Google Developer Training Team.


A beginner's guide to computer programming

The A beginner's guide to computer programming is level PDF e-book tutorial or course with 352 pages. It was added on September 7, 2013 and has been downloaded 14270 times. The file size is 1.13 MB.


Networking Fundamentals

The Networking Fundamentals is a beginner level PDF e-book tutorial or course with 56 pages. It was added on December 31, 2012 and has been downloaded 12533 times. The file size is 1.44 MB. It was created by BICSI.


A Short Introduction to Android

The A Short Introduction to Android is a beginner level PDF e-book tutorial or course with 38 pages. It was added on December 8, 2013 and has been downloaded 4549 times. The file size is 122.38 KB. It was created by unknown.


Excel Analytics and Programming

The Excel Analytics and Programming is an advanced level PDF e-book tutorial or course with 250 pages. It was added on August 28, 2014 and has been downloaded 40452 times. The file size is 3.12 MB. It was created by George Zhao.


Science of Cyber-Security

The Science of Cyber-Security is a beginner level PDF e-book tutorial or course with 86 pages. It was added on December 20, 2014 and has been downloaded 23351 times. The file size is 667.19 KB. It was created by JASON The MITRE Corporation.


Excel Fundamentals

The Excel Fundamentals is a beginner level PDF e-book tutorial or course with 60 pages. It was added on March 30, 2020 and has been downloaded 60183 times. The file size is 7.03 MB. It was created by St. George’s Information Services.


Fundamentals of Cryptology

The Fundamentals of Cryptology is an intermediate level PDF e-book tutorial or course with 503 pages. It was added on December 9, 2021 and has been downloaded 1897 times. The file size is 2.35 MB. It was created by Henk C.A. Tilborg.


jQuery Fundamentals

The jQuery Fundamentals is a beginner level PDF e-book tutorial or course with 108 pages. It was added on October 18, 2017 and has been downloaded 2849 times. The file size is 563.78 KB. It was created by Rebecca Murphey.


The FeathersJS Book

The The FeathersJS Book is a beginner level PDF e-book tutorial or course with 362 pages. It was added on October 10, 2017 and has been downloaded 1864 times. The file size is 3.03 MB. It was created by FeathersJS Organization.


Fundamentals of Python Programming

The Fundamentals of Python Programming is a beginner level PDF e-book tutorial or course with 669 pages. It was added on January 6, 2019 and has been downloaded 22702 times. The file size is 3.3 MB. It was created by Richard L. Halterman.


Fundamentals and GSM Testing

The Fundamentals and GSM Testing is an advanced level PDF e-book tutorial or course with 54 pages. It was added on December 8, 2016 and has been downloaded 1687 times. The file size is 784.04 KB. It was created by Marc Kahabka.


Introduction to Microcontrollers

The Introduction to Microcontrollers is a beginner level PDF e-book tutorial or course with 175 pages. It was added on December 5, 2017 and has been downloaded 7449 times. The file size is 1.24 MB. It was created by Gunther Gridling, Bettina Weiss.


Oracle Database 11g: SQL Fundamentals

The Oracle Database 11g: SQL Fundamentals is a beginner level PDF e-book tutorial or course with 499 pages. It was added on December 10, 2013 and has been downloaded 70083 times. The file size is 2.12 MB. It was created by Puja Singh - Brian Pottle.


Procreate: Editing Tools

The Procreate: Editing Tools is a beginner level PDF e-book tutorial or course with 50 pages. It was added on April 4, 2023 and has been downloaded 384 times. The file size is 2.8 MB. It was created by Procreate.


Computer Fundamentals

The Computer Fundamentals is a beginner level PDF e-book tutorial or course with 86 pages. It was added on August 17, 2017 and has been downloaded 13738 times. The file size is 772.52 KB. It was created by Dr Steven Hand.


AngularJS Fundamentals in 60 Minutes

The AngularJS Fundamentals in 60 Minutes is a beginner level PDF e-book tutorial or course with 102 pages. It was added on December 16, 2014 and has been downloaded 10709 times. The file size is 3.65 MB. It was created by Dan Wahlin.


Fundamentals of C++ Programming

The Fundamentals of C++ Programming is a beginner level PDF e-book tutorial or course with 766 pages. It was added on February 5, 2019 and has been downloaded 35388 times. The file size is 3.73 MB. It was created by Richard L. Halterman School of Computing Southern Adventist University.


Using Flutter framework

The Using Flutter framework is a beginner level PDF e-book tutorial or course with 50 pages. It was added on April 2, 2021 and has been downloaded 2926 times. The file size is 384.56 KB. It was created by Miroslav Mikolaj.


Excel for advanced users

The Excel for advanced users is an advanced level PDF e-book tutorial or course with 175 pages. It was added on December 3, 2012 and has been downloaded 95386 times. The file size is 6.19 MB. It was created by J. Carlton Collins.


Introduction to Scientific Programming with Python

The Introduction to Scientific Programming with Python is an intermediate level PDF e-book tutorial or course with 157 pages. It was added on November 8, 2021 and has been downloaded 1652 times. The file size is 1.28 MB. It was created by Joakim Sundnes.


it courses