Ethical Hacking: Introduction to Ethical Hacking

0
Join & Subscribe
LinkedIn Learning
Free Trial Available
English
Certificate Available
1-2 hours worth of material
selfpaced

Overview

What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.
Introduction
  • Locking down the organization
  • What you should know
  • Hacking ethically
1. Ethical Hacking Overview
  • Information security overview
  • Today's threat landscape
  • Navigating attack vectors
  • Comparing attack types
  • Understanding the Cyber Kill Chain
  • Challenge: The Cyber Kill Chain
  • Solution: The Cyber Kill Chain
2. Information Security Controls
  • Defining ethical hacking
  • Defense in depth
  • Managing incidents
3. Data Protection in a Digital World
  • Exploring security policies
  • Creating security policies
  • Components of a security policy
  • Protecting the data
  • Standards and regulations
  • The COBIT framework
  • Exploring the security plan
  • Creating security policies
  • Recognizing components of a security policy
  • Challenge: Create a security policy
  • Solution: Create a security policy
4. Supporting Ethical Hacking
  • Understanding vulnerabilities
  • Penetration testing methodology
  • Hacking concepts
  • The human factor in ethical hacking
  • Stepping through the hacking phases
Conclusion
  • Next steps

Syllabus

Introduction
  • Locking down the organization
  • What you should know
  • Hacking ethically
1. Ethical Hacking Overview
  • Information security overview
  • Today's threat landscape
  • Navigating attack vectors
  • Comparing attack types
  • Understanding the Cyber Kill Chain
  • Challenge: The Cyber Kill Chain
  • Solution: The Cyber Kill Chain
2. Information Security Controls
  • Defining ethical hacking
  • Defense in depth
  • Managing incidents
3. Data Protection in a Digital World
  • Exploring security policies
  • Creating security policies
  • Components of a security policy
  • Protecting the data
  • Standards and regulations
  • The COBIT framework
  • Exploring the security plan
  • Creating security policies
  • Recognizing components of a security policy
  • Challenge: Create a security policy
  • Solution: Create a security policy
4. Supporting Ethical Hacking
  • Understanding vulnerabilities
  • Penetration testing methodology
  • Hacking concepts
  • The human factor in ethical hacking
  • Stepping through the hacking phases
Conclusion
  • Next steps

Taught by

Lisa Bock