Discover that that whether or not a company is required by law to ensure data protection, ethical hacking is important in an organization. Lisa Bock discusses the current threat landscape, what a data breach is, what constitutes personally identifiable information, and outlines the importance of Ethical Hacking.
- [Voiceover] Security compliance requires…organizations exercise due diligence and due care…in providing information security and risk management.…Well, what does that mean?…Let's boil it down.…That means I understand what I need to do…and I'm taking steps to do the right thing.…Ethical hacking is a structured methodology…that is the due care in assessing…an infrastructure's security posture.…Now, just what is at stake?…I'm at this website, the European Union Agency…for Network and Information Security.…
Now, there is a lot of information on this website,…but I was more specifically concerned…with the threat landscape.…I will go down here to take a look…at the Threat Landscape in 2015.…There is the document, and we're gonna…take a look at the threat landscape, and I've opened it up.…Now, I'll go to page three, where if I scroll down,…we can see the different types of threats,…and you can read about the threats and their implications.…
In addition, there is also…the Top 15 Cyber Threats of 2015.…Now I've opened this document as well and let's take a look.…
Security expert Lisa Bock starts with an overview of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the "Introduction to Ethical Hacking" competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. Find more courses in the series on Lisa's author page.
- Ethical hacking principles
- Managing incidents
- Creating security policies
- Protecting data
- Conducting penetration testing
- Hacking in phases