Security expert Lisa Bock starts with an overview of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the "Introduction to Ethical Hacking" competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. Find more courses in the series on Lisa's author page.
- Ethical hacking principles
- Managing incidents
- Creating security policies
- Protecting data
- Conducting penetration testing
- Hacking in phases
Skill Level Intermediate
- [Voiceover] Hello, my name is Lisa Bock, and I'm a security ambassador. Today, cyber threats are everywhere, and are becoming more aggressive, complex and sophisticated. Enter the white hat hacker, who protects users by diligently seeking out the weak spots so a company can fine-tune their security posture. In this course, I'll explore today's threat landscape, dissecting the top attack vectors and motives for attacks.
I'll define ethical hacking and compare the differences between white, grey, and black hat hackers. Finally, I'll explain the importance of structured ethical hacking in an organization. This course is part of the ethical hacking series. If you're ready to lock things down, let's get to it.