Ethical Hacking: Introduction to Ethical Hacking

Ethical Hacking: Introduction to Ethical Hacking
Ethical Hacking: Introduction to Ethical Hacking
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 27m | 237 MB

What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization’s network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it’s one of the most desired skills for any IT security professional. If you’re interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today’s threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.

Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.

Topics include:

  • Today’s threat landscape
  • Managing incidents
  • Creating security policies
  • Protecting data
  • The COBIT framework
  • Conducting penetration testing
Table of Contents

Introduction
1 Lock down the organization
2 What you should know
3 Hacking ethically

Ethical Hacking Overview
4 Information security overview
5 Today’s threat landscape
6 Threats and attack vectors
7 Comparing attack types

Information Security Controls
8 Defining ethical hacking
9 Defense in depth
10 Managing incidents
11 Exploring security policies
12 Creating security policies
13 Components of a security policy

Data Protection in a Digital World
14 Protecting the data
15 Standards and regulations
16 The COBIT framework

Supporting Ethical Hacking
17 Understanding vulnerabilities
18 Penetration testing methodology
19 Hacking concepts
20 The human factor in ethical hacking
21 Hacking phases

Conclusion
22 Next steps