CEH v11: Cybersecurity Basics, Attacks & Information Warfare
Ethical Hacker v11
| Intermediate
- 5 videos | 1h 9m 27s
- Includes Assessment
- Earns a Badge
Building a strong foundation of knowledge is crucial to becoming an effective cybersecurity professional. In this course, you'll build that foundational knowledge by exploring the five core elements of cybersecurity. You'll examine how classifying what motivates an attacker to attack a network or system can go a long way into figuring out how to best protect systems and networks. Next, you'll explore the many types of attacks that threat actors use to gain access to systems and sensitive data. Finally, you'll learn about information warfare, including its categories and strategies. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize the ec-council certification process for certified ethical hacker v11Recognize the security control used to validate integrityidentify the elements of cyber securityIdentify the motivation for an attacker to plant ransomware on a systemrecognize the different types of motivations for attacksrecognize the different motivations for an attacker
-
Recognize the attack type that involves the attacker attacking the supplier of a companyrecognize the different types of attacksidentify the type of attack that involves the attacker interacting with the target systemIdentify the information warfare strategiesrecognize the information warfare type that involves prevention communication between systemsidentify the forms of information warfare
IN THIS COURSE
-
7m 13sUpon completion of this video, you will be able to recognize the EC-Council certification process for the Certified Ethical Hacker v11. FREE ACCESS
-
10m 35sUpon completion of this video, you will be able to recognize the security control used to validate integrity. FREE ACCESS
-
16m 20sAfter completing this video, you will be able to recognize the different motivations for an attacker. FREE ACCESS
-
17m 15sAfter completing this video, you will be able to recognize the attack type that involves the attacker attacking the supplier of a company. FREE ACCESS
-
18m 4sIn this video, you will learn how to identify the forms of information warfare. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.