There are currently no items in your shopping cart.

User Panel

Forgot your password?.

lynda Ethical Hacking: Introduction to Ethical Hacking

Video Introducing this tutorial

Introduction :
Locking down the organization
What you should know
Hacking ethically

1. Ethical Hacking Overview :
Information security overview
Today's threat landscape
Navigating attack vectors
Comparing attack types
Understanding the Cyber Kill Chain
Challenge: The Cyber Kill Chain
Solution: The Cyber Kill Chain

2. Information Security Controls :
Defining ethical hacking
Defense in depth
Managing incidents

3. Data Protection in a Digital World :
Protecting the data
Defining standards and regulations
Outlining the COBIT framework
Exploring the security plan
Creating security policies
Recognizing components of a security policy
Challenge: Create a security policy
Solution: Create a security policy

4. Supporting Ethical Hacking :
Understanding vulnerabilities
Penetration testing methodology
Hacking concepts
The human factor in ethical hacking
Stepping through the hacking phases

Conclusion :
Next steps