2016
Lynda
Lisa Bock
1:12
English
What is ethical hacking? Hacking comes in many colors: white, gray, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or learning enough to secure your own networks, this introduction is for you.
Security expert Lisa Bock starts with a definition of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the "Introduction to Ethical Hacking" competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.
Introduction
2m 13s
Welcome
57s
What you should know
25s
Hacking ethically
51s
1. Ethical Hacking Overview
13m 45s
Information security
5m 12s
Threats and attack vectors
4m 16s
Compare attack types
4m 17s
2. Information Security Controls
26m 31s
Ethical hacking principles
4m 53s
Defense in depth
4m 59s
Managing incidents
5m 40s
Exploring security policies
4m 59s
Creating security policies
6m 0s
3. Supporting Ethical Hacking
29m 1s
Understand vulnerabilities
2m 50s
Common vulnerabilities
7m 18s
Protecting data
4m 58s
Penetration testing methodology
3m 14s
Hacking concepts
6m 50s
Hacking phases
3m 51s
Conclusion
48s
Next steps
48s
lynda.com/Security-tutorials/Introduction-Ethical-Hacking/455716-2.html
Download File Size:125.25 MB