Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.
Tags
Syllabus
Introduction
- Locking down the organization
- What you should know
- Hacking ethically
- Information security overview
- Today's threat landscape
- Navigating attack vectors
- Comparing attack types
- Understanding the Cyber Kill Chain
- Challenge: The Cyber Kill Chain
- Solution: The Cyber Kill Chain
- Defining ethical hacking
- Defense in depth
- Managing incidents
- Protecting the data
- Defining standards and regulations
- Outlining the COBIT framework
- Exploring the security plan
- Creating security policies
- Recognizing components of a security policy
- Challenge: Create a security policy
- Solution: Create a security policy
- Understanding vulnerabilities
- Penetration testing methodology
- Hacking concepts
- The human factor in ethical hacking
- Stepping through the hacking phases
- Next steps
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/43e576997117.jpeg)
Ethical Hacking: Introduction to Ethical Hacking
Affiliate notice
-
TypeOnline Course
-
Provider
What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.
Introduction
- Locking down the organization
- What you should know
- Hacking ethically
- Information security overview
- Today's threat landscape
- Navigating attack vectors
- Comparing attack types
- Understanding the Cyber Kill Chain
- Challenge: The Cyber Kill Chain
- Solution: The Cyber Kill Chain
- Defining ethical hacking
- Defense in depth
- Managing incidents
- Protecting the data
- Defining standards and regulations
- Outlining the COBIT framework
- Exploring the security plan
- Creating security policies
- Recognizing components of a security policy
- Challenge: Create a security policy
- Solution: Create a security policy
- Understanding vulnerabilities
- Penetration testing methodology
- Hacking concepts
- The human factor in ethical hacking
- Stepping through the hacking phases
- Next steps
Tags
Loading...
Saving...
Loading...