Ethical Hacking: Introduction to Ethical Hacking
Offered By: LinkedIn Learning
Course Description
Overview
Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.
Syllabus
Introduction
- Locking down the organization
- Discovering resources
- Hacking ethically
- Recognizing elements of information security
- Providing information assurance
- Defending in depth
- Using AI and ML in cybersecurity
- Adapting to the threats
- Leveraging event correlation
- Modeling threats
- Using cyber threat intelligence
- Following the threat intelligence lifecycle
- Managing incidents
- Challenge: Hardening guide
- Solution: Hardening guide
- Understanding the cyber kill chain
- Utilizing MITRE ATT&CK
- Analyzing using the diamond model
- Identifying adversary behavior
- Discovering indicators of compromise
- Challenge: The cyber kill chain
- Solution: The cyber kill chain
- Managing risks
- Asset inventory
- Defining information security standards
- Outlining US regulations
- Exploring global cyber laws and standards
- Challenge: Cyber threat information sharing
- Solution: Cyber threat information sharing
- Comparing attack types and motives
- Outlining the types of hackers
- Recognizing the skills of an ethical hacker
- Stepping through the hacking phases
- Grasping the importance of ethical hacking
- Next steps
Taught by
Lisa Bock
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network