- Today's threat landscape
- Managing incidents
- Creating security policies
- Protecting data
- The COBIT framework
- Conducting penetration testing
Skill Level Beginner
- [Lisa] In today's complex environment significant breaches are increasing in number and severity. Attack vectors include businesses, consumers, along with mobile and IoT devices as well. Hello, my name is Lisa Bock, and I'm a security ambassador. In this course, we'll see why ethical hacking is an important element of a comprehensive security plan. I'll explore today's threat landscape.
I'll dissect the top attack vectors, and compare motives for attacks. I'll define ethical hacking and compare the differences between white, gray, and black hat hackers. The course will identify the variety of ways to secure an organization. I'll explore policies that help enforce the security objectives. And finally, I'll explain the importance of structured ethical hacking in an organization. This course is part of the Ethical Hacking series.
If you're ready to lock things down, let's get to it.