Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.
-
Learn about common and emerging threats to systems.
-
Practice using tools to test networks and identify risks.
-
Prepare for the Certified Ethical Hacker (312-50) exam.
课程
-
1
Ethical Hacking: Introduction to Ethical Hacking1 小时 52 分钟Ethical Hacking: Introduction to Ethical Hacking
讲师: Lisa Bock
Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.
-
2
Ethical Hacking: Footprinting and Reconnaissance1 小时 55 分钟Ethical Hacking: Footprinting and Reconnaissance
讲师: Lisa Bock
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
-
3
Ethical Hacking: Scanning Networks2 小时 15 分钟Ethical Hacking: Scanning Networks
讲师: Lisa Bock
Become an ethical hacker. Learn how to detect network vulnerabilities to prevent attacks on your organization's infrastructure and data.
-
4
Ethical Hacking: Enumeration2 小时 12 分钟Ethical Hacking: Enumeration
讲师: Malcolm Shore
Learn about the basic methods of enumerating networks and target systems using the standard ethical hacking enumeration tools.
-
5
Ethical Hacking: Vulnerability Analysis1 小时 38 分钟Ethical Hacking: Vulnerability Analysis
讲师: Lisa Bock
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
-
6
Ethical Hacking: System Hacking2 小时 13 分钟Ethical Hacking: System Hacking
讲师: Lisa Bock
Dive into ethical hacking, including gaining access, spyware, effective countermeasures, and more. This course maps to the System Hacking competency from the CEH Body of Knowledge.
-
7
Ethical Hacking: The Complete Malware Analysis Process1 小时 52 分钟Ethical Hacking: The Complete Malware Analysis Process
讲师: Malcolm Shore
Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
-
8
Ethical Hacking: Sniffers2 小时 8 分钟Ethical Hacking: Sniffers
讲师: Lisa Bock
Learn about ethical hacking, one of the most desired stills for any IT security professional.
-
9
Ethical Hacking: Social Engineering1 小时 33 分钟Ethical Hacking: Social Engineering
讲师: Lisa Bock
Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
-
10
Ethical Hacking: Denial of Service1 小时 42 分钟Ethical Hacking: Denial of Service
讲师: Malcolm Shore
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
-
11
Ethical Hacking: Session Hijacking1 小时 17 分钟Ethical Hacking: Session Hijacking
讲师: Malcolm Shore
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
-
12
Ethical Hacking: Evading IDS, Firewalls, and Honeypots2 小时 20 分钟Ethical Hacking: Evading IDS, Firewalls, and Honeypots
讲师: Malcolm Shore
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
-
13
Ethical Hacking: Hacking Web Servers and Web Applications1 小时 39 分钟Ethical Hacking: Hacking Web Servers and Web Applications
讲师: Malcolm Shore
Find out about the protocols used to access websites, and how to test websites and web applications to prevent exploitation through cyberattacks.
-
14
Ethical Hacking: Wireless Networks1 小时 45 分钟Ethical Hacking: Wireless Networks
讲师: Malcolm Shore
IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
-
15
Ethical Hacking: Mobile Devices and Platforms1 小时 58 分钟Ethical Hacking: Mobile Devices and Platforms
讲师: Malcolm Shore
Learn how to secure your organization's mobile devices and test iOS and Android applications for security flaws—key topics on the Certified Ethical Hacker exam.
-
16
Ethical Hacking: Hacking IoT Devices2 小时 3 分钟Ethical Hacking: Hacking IoT Devices
讲师: Lisa Bock
Explore IoT security challenges, learn ethical hacking for IoT/OT devices, and outline strategies to manage & defend against ICS attacks, followed by best practice guidelines.
-
17
Ethical Hacking: Cryptography3 小时 16 分钟Ethical Hacking: Cryptography
讲师: Diondria Holliman
Get ready for the Cryptography domain of the Certified Ethical Hacker certification exam. This course is part of our Ethical Hacking series.
-
18
Ethical Hacking: Cloud Computing2 小时 30 分钟Ethical Hacking: Cloud Computing
讲师: Daniel Lachance
Learn how to evaluate and harden cloud-deployed resources as you study for the Certified Ethical Hacker (CEH) exam.
-
19
Ethical Hacking: SQL Injection1 小时 45 分钟Ethical Hacking: SQL Injection
讲师: Malcolm Shore
Learn about the SQL command language and SQL injections. Examine SQL injections in MySQL, SQL Server, and Oracle XE, and discover how attackers defeat web application firewalls.
讲师
Lisa Bock
Cybersecurity Author @ LinkedIn | Certified Ethical Hacker, Penetration Testing
Malcolm Shore
Cybersecurity Consultant
Diondria Holliman
Cyber Security | Data Protection | Encryption & Privacy Professional | (ISC)2 Global Achievement Award Recipient
Daniel Lachance
Consultant, Trainer, Author, Editor at Lachance IT Consulting Inc.