YoVDO

Become an Ethical Hacker

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Cloud Computing Courses Cryptography Courses Network Security Courses Penetration Testing Courses Malware Analysis Courses Social Engineering Courses SQL Injection Courses Vulnerability Analysis Courses

Course Description

Overview

Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.
  • Learn about common and emerging threats to systems.
  • Practice using tools to test networks and identify risks.
  • Prepare for the Certified Ethical Hacker (312-50) exam.

Syllabus

Courses under this program:
Course 1: Ethical Hacking: Introduction to Ethical Hacking
-What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.

Course 2: Ethical Hacking: Footprinting and Reconnaissance
-Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.

Course 3: Ethical Hacking: Scanning Networks
-Become an ethical hacker. Learn how to detect network vulnerabilities through scanning, and use tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.

Course 4: Ethical Hacking: Enumeration
-Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.

Course 5: Ethical Hacking: Vulnerability Analysis
-Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.

Course 6: Ethical Hacking: System Hacking
-Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.

Course 7: Ethical Hacking: The Complete Malware Analysis Process
-Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.

Course 8: Ethical Hacking: Sniffers
-Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.

Course 9: Ethical Hacking: Social Engineering
-Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.

Course 10: Ethical Hacking: Denial of Service
-Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.

Course 11: Ethical Hacking: Session Hijacking
-Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.

Course 12: Ethical Hacking: Evading IDS, Firewalls, and Honeypots
-Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.

Course 13: Ethical Hacking: Hacking Web Servers and Web Applications
-Find out about the protocols used to access websites, and how to test websites and web applications to prevent exploitation through cyberattacks.

Course 14: Ethical Hacking: Wireless Networks
-IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.

Course 15: Ethical Hacking: Mobile Devices and Platforms
-Learn how to secure your organization's mobile devices and test iOS and Android applications for security flaws—key topics on the Certified Ethical Hacker exam.

Course 16: Ethical Hacking: Hacking IoT Devices
-Find out how to make IoT devices more secure by learning about the technologies and protocols used and how to implement countermeasures to address vulnerabilities.

Course 17: Ethical Hacking: Cryptography
-Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.

Course 18: Ethical Hacking: Cloud Computing
-Learn how to evaluate and harden cloud-deployed resources as you study for version 10 of the Certified Ethical Hacker (CEH) exam.

Course 19: Ethical Hacking: SQL Injection
-Learn about the SQL command language and SQL injections. Examine SQL injections in MySQL, SQL Server, and Oracle XE, and discover how attackers defeat web application firewalls.


Courses

  • 0 reviews

    2 hours 31 minutes

    View details
    Learn how to evaluate and harden cloud-deployed resources as you study for the Certified Ethical Hacker (CEH) exam.
  • 0 reviews

    1 hour 1 minute

    View details
    Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.
  • 0 reviews

    1 hour 43 minutes

    View details
    Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
  • 0 reviews

    1 hour 56 minutes

    View details
    Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
  • 0 reviews

    1 hour 53 minutes

    View details
    Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.
  • 0 reviews

    1 hour 59 minutes

    View details
    Learn how to secure your organization's mobile devices and test iOS and Android applications for security flaws—key topics on the Certified Ethical Hacker exam.
  • 0 reviews

    1 hour 17 minutes

    View details
    Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
  • 0 reviews

    2 hours 9 minutes

    View details
    Learn about ethical hacking, one of the most desired stills for any IT security professional.
  • 0 reviews

    1 hour 29 minutes

    View details
    Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.
  • 0 reviews

    1 hour 46 minutes

    View details
    IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
  • 0 reviews

    1 hour 39 minutes

    View details
    Find out about the protocols used to access websites, and how to test websites and web applications to prevent exploitation through cyberattacks.
  • 0 reviews

    2 hours 16 minutes

    View details
    Become an ethical hacker. Learn how to detect network vulnerabilities to prevent attacks on your organization's infrastructure and data.
  • 0 reviews

    1 hour 34 minutes

    View details
    Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
  • 0 reviews

    2-3 hours

    View details
    Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
  • 0 reviews

    2-3 hours

    View details
    Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
  • 0 reviews

    View details
    Find out how to make IoT devices more secure by learning about the technologies and protocols used and how to implement countermeasures to address vulnerabilities.
  • 0 reviews

    1 hour 45 minutes

    View details
    Learn about the SQL command language and SQL injections. Examine SQL injections in MySQL, SQL Server, and Oracle XE, and discover how attackers defeat web application firewalls.
  • 0 reviews

    1-2 hours

    View details
    Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
  • 0 reviews

    1-2 hours

    View details
    Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.

Taught by

Lisa Bock, Malcolm Shore, Luciano Ferrari, CCISO, CISSP, CISM, CRISC, MBA, Stephanie Domas and Dan Lachance

Related Courses

Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera
Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn
The Complete Social Engineering, Phishing, OSINT & Malware
Udemy
A Complete Cyber Security Guide For Beginners 2024
Udemy
Learn Social Engineering From Scratch 2024
Udemy