YoVDO

Ethical Hacking: Introduction to Ethical Hacking

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Cybersecurity Courses Risk Management Courses Information Assurance Courses Incident Management Courses Cyber Threat Intelligence Courses Cyber Kill Chain Courses MITRE ATT&CK Courses

Course Description

Overview

Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.

Syllabus

Introduction
  • Locking down the organization
  • Discovering resources
  • Hacking ethically
1. Protect Data in a Digital World
  • Recognizing elements of information security
  • Providing information assurance
  • Defending in depth
  • Using AI and ML in cybersecurity
  • Adapting to the threats
  • Leveraging event correlation
2. Maintain a Vigilant Posture
  • Modeling threats
  • Using cyber threat intelligence
  • Following the threat intelligence lifecycle
  • Managing incidents
  • Challenge: Hardening guide
  • Solution: Hardening guide
3. Summarize Hacking Frameworks
  • Understanding the cyber kill chain
  • Utilizing MITRE ATT&CK
  • Analyzing using the diamond model
  • Identifying adversary behavior
  • Discovering indicators of compromise
  • Challenge: The cyber kill chain
  • Solution: The cyber kill chain
4. Review Security Laws and Standards
  • Managing risks
  • Asset inventory
  • Defining information security standards
  • Outlining US regulations
  • Exploring global cyber laws and standards
  • Challenge: Cyber threat information sharing
  • Solution: Cyber threat information sharing
5. Support Ethical Hacking
  • Comparing attack types and motives
  • Outlining the types of hackers
  • Recognizing the skills of an ethical hacker
  • Stepping through the hacking phases
  • Grasping the importance of ethical hacking
Conclusion
  • Next steps

Taught by

Lisa Bock

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network