Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.
Learn about common and emerging threats to systems.
Practice using tools to test networks and identify risks.
Implement countermeasures to prevent cybersecurity attacks.
Ethical Hacking: Introduction to Ethical Hacking with Lisa Bock
What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.
1h 21m • COURSE
Introduction to Web Design and Development with James Williamson
New to web design? Find out if it's right for you. Learn how to get started in web design, how to choose the right tools, and what you should learn next.
3h 38m • COURSE
Learning Cryptography and Network Security with Lisa Bock
Understand the basics of cryptography to keep your networks, systems, and data secure.
1h 45m • COURSE
Troubleshooting Your Network with Wireshark with Lisa Bock
Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network intrusions.
2h 35m • COURSE
Learning Bash Scripting with Scott Simpson
A fast-paced introduction to Bash script, a popular shell scripting language on Mac OS X and Linux.
1h 25m • COURSE
Learning Kali Linux with Malcolm Shore
Meet Kali Linux, the operating system for ethical hackers, digital forensics experts, and penetration (pen) testers. Learn how to use and install Kali Linux and its toolsets for vulnerability assessment, password cracking, and more.
2h 31m • COURSE
Ethical Hacking: Footprinting and Reconnaissance with Lisa Bock
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
1h 31m • COURSE
Ethical Hacking: Denial of Service with Malcolm Shore
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
1h 33m • COURSE
Ethical Hacking: System Hacking with Lisa Bock
Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.
1h 18m • COURSE
Ethical Hacking: Scanning Networks with Lisa Bock
Want to become an ethical hacker? Learn how to detect network vulnerabilities through scanning, and use a variety of tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.
1h 54m • COURSE
Ethical Hacking: Enumeration with Malcolm Shore
Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.
1h 57m • COURSE
Ethical Hacking: Social Engineering with Lisa Bock
Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
1h 18m • COURSE
Ethical Hacking: Sniffers with Lisa Bock
Hackers use sniffing to intercept network traffic. Explore sniffing and discover how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.
1h 13m • COURSE
Ethical Hacking: Session Hijacking with Malcolm Shore
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems. This course is part of our Certified Ethical Hacking test prep series.
1h 10m • COURSE
Ethical Hacking: Viruses and Worms with Lisa Bock
Malware is often the first line of attack. Learn how to detect and neutralize malware such as viruses and worms in this course from our Certified Ethical Hacker test prep series.
38m 22s • COURSE
Ethical Hacking: Wireless Networks with Malcolm Shore
IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
1h 39m • COURSE
Ethical Hacking: Trojans and Backdoors with Lisa Bock
Learn how to identify vulnerabilities in your system and how to then take countermeasures to prevent unwanted access. Join cybersecurity expert Lisa Bock as she discusses the methods and tools hackers use to penetrate a network. She then explains how you can perform ethical hacking of your own system to detect and address susceptible areas.
1h 15m • COURSE
Ethical Hacking: Website and Web Application Testing with Malcolm Shore
Find out how to test websites and web applications for weaknesses and prevent cyber attacks like SQL injections and cross-site scripting exploits, in this course from our Certified Ethical Hacker exam prep series.
1h 35m • COURSE
Ethical Hacking: Perimeter Defenses with Malcolm Shore
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, and special-purpose perimeter devices.
1h 32m • COURSE
Ethical Hacking: Penetration Testing with Lisa Bock
The only way to know your systems are secure is to test them. Learn how to use penetration testing to check for vulnerabilities in computers, networks, applications, email, and people.
1h 20m • COURSE
You'll learn ethical hacking skills with these experts
Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.
Adobe Certified Instructor James Williamson is a trainer in web, print, and digital video experience.
James Williamson is a senior author for lynda.com and an Adobe Certified Instructor. He has many years of web, print, and digital video experience, and has been a featured speaker at Flashforward as well as a regular speaker at Adobe MAX. James also blogs (infrequently) about all things web at his site, Simple Primate, which can be found at www.simpleprimate.com.
Scott Simpson has a master's in education and currently creates technology courses as an author at LinkedIn.
Scott has been interested in computers since he was about seven years old, and for most of that time, he's been teaching friends, family, and strangers how to use them. This geeky hobby turned into a job with Apple during college, and after completing his master's degree in education at San Diego State University, he has helped to shape the Developer segment here at lynda.com as a content producer. Scott enjoys building web apps and exploring new technologies. He can be found on Twitter at @scotty82.
Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB.
Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security.