English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 12m | 120 MB
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization’s network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it’s one of the most desired stills for any IT security professional. If you’re interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you.
Security expert Lisa Bock starts with an overview of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the “Introduction to Ethical Hacking” competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.
- Ethical hacking principles
- Managing incidents
- Creating security policies
- Protecting data
- Conducting penetration testing
- Hacking in phases