YoVDO

Ethical Hacking: Introduction to Ethical Hacking

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Cybersecurity Courses Risk Management Courses Information Assurance Courses Incident Management Courses Cyber Threat Intelligence Courses Cyber Kill Chain Courses MITRE ATT&CK Courses

Course Description

Overview

Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.

Syllabus

Introduction
  • Locking down the organization
  • Discovering resources
  • Hacking ethically
1. Protect Data in a Digital World
  • Recognizing elements of information security
  • Providing information assurance
  • Defending in depth
  • Using AI and ML in cybersecurity
  • Adapting to the threats
  • Leveraging event correlation
2. Maintain a Vigilant Posture
  • Modeling threats
  • Using cyber threat intelligence
  • Following the threat intelligence lifecycle
  • Managing incidents
  • Challenge: Hardening guide
  • Solution: Hardening guide
3. Summarize Hacking Frameworks
  • Understanding the cyber kill chain
  • Utilizing MITRE ATT&CK
  • Analyzing using the diamond model
  • Identifying adversary behavior
  • Discovering indicators of compromise
  • Challenge: The cyber kill chain
  • Solution: The cyber kill chain
4. Review Security Laws and Standards
  • Managing risks
  • Asset inventory
  • Defining information security standards
  • Outlining US regulations
  • Exploring global cyber laws and standards
  • Challenge: Cyber threat information sharing
  • Solution: Cyber threat information sharing
5. Support Ethical Hacking
  • Comparing attack types and motives
  • Outlining the types of hackers
  • Recognizing the skills of an ethical hacker
  • Stepping through the hacking phases
  • Grasping the importance of ethical hacking
Conclusion
  • Next steps

Taught by

Lisa Bock

Related Courses