Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: Introduction to Ethical Hacking

Description

What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.

Tags

Syllabus

Introduction
  • Locking down the organization
  • What you should know
  • Hacking ethically
1. Ethical Hacking Overview
  • Information security overview
  • Today's threat landscape
  • Navigating attack vectors
  • Comparing attack types
  • Understanding the Cyber Kill Chain
  • Challenge: The Cyber Kill Chain
  • Solution: The Cyber Kill Chain
2. Information Security Controls
  • Defining ethical hacking
  • Defense in depth
  • Managing incidents
3. Data Protection in a Digital World
  • Protecting the data
  • Defining standards and regulations
  • Outlining the COBIT framework
  • Exploring the security plan
  • Creating security policies
  • Recognizing components of a security policy
  • Challenge: Create a security policy
  • Solution: Create a security policy
4. Supporting Ethical Hacking
  • Understanding vulnerabilities
  • Penetration testing methodology
  • Hacking concepts
  • The human factor in ethical hacking
  • Stepping through the hacking phases
Conclusion
  • Next steps

Online Course


Ethical Hacking: Introduction to Ethical Hacking

Affiliate notice

What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.

Introduction
  • Locking down the organization
  • What you should know
  • Hacking ethically
1. Ethical Hacking Overview
  • Information security overview
  • Today's threat landscape
  • Navigating attack vectors
  • Comparing attack types
  • Understanding the Cyber Kill Chain
  • Challenge: The Cyber Kill Chain
  • Solution: The Cyber Kill Chain
2. Information Security Controls
  • Defining ethical hacking
  • Defense in depth
  • Managing incidents
3. Data Protection in a Digital World
  • Protecting the data
  • Defining standards and regulations
  • Outlining the COBIT framework
  • Exploring the security plan
  • Creating security policies
  • Recognizing components of a security policy
  • Challenge: Create a security policy
  • Solution: Create a security policy
4. Supporting Ethical Hacking
  • Understanding vulnerabilities
  • Penetration testing methodology
  • Hacking concepts
  • The human factor in ethical hacking
  • Stepping through the hacking phases
Conclusion
  • Next steps