Ethical Hacking: Understanding Ethical Hacking
Pluralsight is not an official partner or accredited training center of EC-Council. This course will significantly benefit security officers, network administrators, and anyone who is concerned about the integrity of their network infrastructure.
What you'll learn
Pluralsight is not an official partner or accredited training center of EC-Council. This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the duty of all System Admins and Security Professionals to protect their infrastructure from not only outside attackers but also attackers within your company. We will cover the terminology used by attackers, the difference between "hacking" and "ethical hacking", the phases of hacking, the types of attacks on a system, what skills an Ethical Hacker needs to obtain, types of security policies, why Ethical Hacking is essential, how to be in the "know" of what's happening in the hacking world, who a "hacker" is, what are the biggest security attack vectors, and more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Table of contents
- Overview of Hacking Concepts 2m
- Hacking Defined 1m
- History of Hacking: In the Beginning 4m
- History of Hacking: Currently 6m
- Ethical Hacking Defined 5m
- What Skills Should an Ethical Hacker Have? 4m
- Type of Pen Tests 3m
- Why a Hacker Hacks 5m
- Types of Hackers 5m
- How Does Hacking Influence Companies? 10m
- Summary of Hacking Concepts 2m
- Overview of Information Security Controls 3m
- Necessity of Ethical Hacking 4m
- What Skills You Must Have 4m
- Multi-layered Defense 3m
- Incident Management 4m
- IM Process 4m
- Data Leakage 11m
- Artificial Intelligence and Machine Learning 4m
- Security Policies 3m
- Taxonomy of Security Policies 5m
- Vulnerability Research 10m
- Penetration Testing 6m
- Summary of Information Security Controls 5m