Thank you for watching Ethical Hacking-Overview. Hopefully you're more comfortable with understanding current threats, attacks, vulnerabilities, policies and the concept of ethical hacking as it relates to organizational security. If you're interested in learning more please check out the IT segment of the library where new courses are added all the time.
- [Voiceover] Thanks for watching the first course in the ethical hacking series. I've covered some of the current threats, attacks, vulnerabilities, policies and the concept of ethical hacking as it relates to organizational security. If you're interested in learning more please check out the other IT courses in our library. New material is added all the time. If you're interested in learning about packet analysis check out my Wireshark course. If you're interested in learning about encryption, check out Essentials of Cryptography.
And you might want to check out Foundations of IT Security. If you're ready to continue your journey as an ethical hacker be sure to watch the other courses in the series. I hope to see you again soon.
Security expert Lisa Bock starts with an overview of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the "Introduction to Ethical Hacking" competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. Find more courses in the series on Lisa's author page.
- Ethical hacking principles
- Managing incidents
- Creating security policies
- Protecting data
- Conducting penetration testing
- Hacking in phases