Companies Home Search Profile

Ethical Hacking: Introduction to Ethical Hacking

Focused View

Lisa Bock

1:52:35

116 View
  • 01 - Locking down the organization.mp4
    00:51
  • 02 - Discovering resources.mp4
    00:59
  • 03 - Hacking ethically.mp4
    00:55
  • 01 - Recognizing elements of information security.mp4
    03:57
  • 02 - Providing information assurance.mp4
    03:44
  • 03 - Defending in depth.mp4
    04:01
  • 04 - Using AI and ML in cybersecurity.mp4
    03:50
  • 05 - Adapting to the threats.mp4
    03:35
  • 06 - Leveraging event correlation.mp4
    02:35
  • 01 - Modeling threats.mp4
    03:59
  • 02 - Using cyber threat intelligence.mp4
    04:09
  • 03 - Following the threat intelligence lifecycle.mp4
    03:12
  • 04 - Managing incidents.mp4
    04:16
  • 05 - Challenge Hardening guide.mp4
    00:47
  • 06 - Solution Hardening guide.mp4
    01:12
  • 01 - Understanding the cyber kill chain.mp4
    04:48
  • 02 - Utilizing MITRE ATT&CK.mp4
    03:40
  • 03 - Analyzing using the diamond model.mp4
    04:41
  • 04 - Identifying adversary behavior.mp4
    04:21
  • 05 - Discovering indicators of compromise.mp4
    04:32
  • 06 - Challenge The cyber kill chain.mp4
    01:22
  • 07 - Solution The cyber kill chain.mp4
    02:33
  • 01 - Managing risks.mp4
    03:14
  • 02 - Asset inventory.mp4
    04:35
  • 03 - Defining information security standards.mp4
    03:47
  • 04 - Outlining US regulations.mp4
    04:08
  • 05 - Exploring global cyber laws and standards.mp4
    03:39
  • 06 - Challenge Cyber threat information sharing.mp4
    01:02
  • 07 - Solution Cyber threat information sharing.mp4
    02:23
  • 01 - Comparing attack types and motives.mp4
    04:02
  • 02 - Outlining the types of hackers.mp4
    04:06
  • 03 - Recognizing the skills of an ethical hacker.mp4
    03:59
  • 04 - Stepping through the hacking phases.mp4
    04:42
  • 05 - Grasping the importance of ethical hacking.mp4
    03:36
  • 01 - Next steps.mp4
    01:23
  • Description


    Ethical hacking tests the strength of an organization's defenses and is a desired skill for any IT professional. In this course, security expert Lisa Bock explains how to protect data in a digital world and covers the basics of Information security. She begins by discussing how to layer defenses and outlines the power of using adaptive security controls. Lisa describes how artificial intelligence can help early threat detection and explains the benefits of MITRE ATT&CK, which provides tools and techniques specific to the ethical hacking process. She then stresses the need to maintain a vigilant posture, by using threat modeling and cyber threat intelligence. Lisa also provides an overview of the various hacker frameworks and reviews the laws and standards that define best practice behavior. She concludes by covering why it’s essential to perform ethical hacking, examines attack types and motives, lists the main hacking phases, and outlines the desired skills of an ethical hacker.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 35
    • duration 1:52:35
    • English subtitles has
    • Release Date 2023/09/06

    Courses related to Ethical Hacking

    Courses related to Computer Network

    Courses related to Network Engineering