Ethical Hacking: Introduction to Ethical Hacking
Offered By: LinkedIn Learning
Course Description
Overview
Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.
Syllabus
Introduction
- Locking down the organization
- Discovering resources
- Hacking ethically
- Recognizing elements of information security
- Providing information assurance
- Defending in depth
- Using AI and ML in cybersecurity
- Adapting to the threats
- Leveraging event correlation
- Modeling threats
- Using cyber threat intelligence
- Following the threat intelligence lifecycle
- Managing incidents
- Challenge: Hardening guide
- Solution: Hardening guide
- Understanding the cyber kill chain
- Utilizing MITRE ATT&CK
- Analyzing using the diamond model
- Identifying adversary behavior
- Discovering indicators of compromise
- Challenge: The cyber kill chain
- Solution: The cyber kill chain
- Managing risks
- Asset inventory
- Defining information security standards
- Outlining US regulations
- Exploring global cyber laws and standards
- Challenge: Cyber threat information sharing
- Solution: Cyber threat information sharing
- Comparing attack types and motives
- Outlining the types of hackers
- Recognizing the skills of an ethical hacker
- Stepping through the hacking phases
- Grasping the importance of ethical hacking
- Next steps
Taught by
Lisa Bock
Related Courses
Cybersecurity FoundationsLinkedIn Learning Ethical Hacking with JavaScript
LinkedIn Learning Cyber Security, Tools, Techniques and Counter Measures
IGNOU via Swayam Expert Malware Analysis and Reverse Engineering
Udemy Certified Basic Cyber Security Expert 2022
Udemy