Companies Home Search Profile

Ethical Hacking: Introduction to Ethical Hacking

Focused View

Lisa Bock

1:31:37

249 View
  • 01 - Locking down the organization.mp4
    00:58
  • 02 - What you should know.mp4
    00:33
  • 03 - Hacking ethically.mp4
    00:57
  • 01 - Information security overview.mp4
    03:29
  • 02 - Today's threat landscape.mp4
    03:09
  • 03 - Navigating attack vectors.mp4
    05:12
  • 04 - Comparing attack types.mp4
    05:43
  • 05 - Understanding the Cyber Kill Chain.mp4
    03:47
  • 06 - Challenge The Cyber Kill Chain.mp4
    00:55
  • 07 - Solution The Cyber Kill Chain.mp4
    02:43
  • 01 - Defining ethical hacking.mp4
    05:57
  • 02 - Defense in depth.mp4
    05:35
  • 03 - Managing incidents.mp4
    05:52
  • 01 - Protecting the data.mp4
    03:29
  • 02 - Defining standards and regulations.mp4
    04:41
  • 03 - Outlining the COBIT framework.mp4
    02:54
  • 04 - Exploring the security plan.mp4
    05:07
  • 05 - Creating security policies.mp4
    02:44
  • 06 - Recognizing components of a security policy.mp4
    04:33
  • 07 - Challenge Create a security policy.mp4
    00:51
  • 08 - Solution Create a security policy.mp4
    03:12
  • 01 - Understanding vulnerabilities.mp4
    02:39
  • 02 - Penetration testing methodology.mp4
    03:44
  • 03 - Hacking concepts.mp4
    03:36
  • 04 - The human factor in ethical hacking.mp4
    03:26
  • 05 - Stepping through the hacking phases.mp4
    04:41
  • 01 - Next steps.mp4
    01:10
  • Ex_Files_Ethical_Hacking_Upd.zip
  • Description


    What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.

    Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Experienced author with a demonstrated history of working in the e-learning industry. She is a security ambassador with a broad range of IT skills and knowledge, including networking, CyberOps, Wireshark, biometrics, Ethical Hacking and the IoT. Lisa is an author for LinkedIn Learning, Packt Publishing and CompTIA and is an award-winning speaker who has presented at several national conferences. She holds a MS in computer information systems/information assurance from UMGC. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband Mike enjoy bike riding, watching movies, and traveling.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 27
    • duration 1:31:37
    • Release Date 2023/01/18