CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
CEH v12
| Intermediate
- 5 videos | 1h 35m 26s
- Includes Assessment
- Earns a Badge
Building a strong foundation of knowledge is crucial to becoming an effective cybersecurity professional. In this course, you'll build that foundational knowledge by exploring the five core elements of cybersecurity. You'll examine how classifying what motivates an attacker to attack a network or system can go a long way into figuring out how to best protect systems and networks. Next, you'll explore the many types of attacks that threat actors use to gain access to systems and sensitive data. Finally, you'll learn about information warfare, including its categories and strategies. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Outline the ceh hacking methodology and define each of the phases and goalsRecognize the security control used to validate integrityidentify the elements of cyber securityRecognize the different motivations for an attackeridentify the motivation for an attacker to plant ransomware on a systemrecognize the different types of motivations for attacks
-
Recognize the different types of attacksrecognize the attack type that involves the attacker attacking the supplier of a companyidentify the type of attack that involves the attacker interacting with the target systemIdentify the forms of information warfareidentify the information warfare strategiesrecognize the information warfare type that involves prevention communication between systems
IN THIS COURSE
-
5m 27sAfter completing this video, you will be able to outline the EC-Council certification process for Certified Ethical Hacker v12. FREE ACCESS
-
26m 58sUpon completion of this video, you will be able to define the five core elements of cybersecurity. FREE ACCESS
-
14m 27sAfter completing this video, you will be able to recognize the common motives, goals, and objectives of threat actors. FREE ACCESS
-
24m 45sUpon completion of this video, you will be able to recognize different attack classifications and examples of each. FREE ACCESS
-
23m 48sAfter completing this video, you will be able to recognize information warfare categories and strategies. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.