Security Architect: Ethical Hacking Best Practices
IT Security
| Intermediate
- 14 videos | 46m 29s
- Includes Assessment
- Earns a Badge
To become a well-rounded ethical hacker, one must have good ethics, love a challenge, and be persistent. In addition, you must have a strong technical background and be familiar with common tools, strategies, and techniques used in a variety of ethical hacking situations. In this 14-video course, learners can explore best practices related to ethical hacking and incident handling, legal considerations, and proactive hacking practices and strategies. Begin with an overview of the importance of ethical hacking in today's world and different types of ethical hacking, and different types of real-world hackers, such as white, black, and grey hat. View benefits of ethical hacking, and rules of engagement prior to performing an ethical hacking exercise. Delve into vulnerability and penetration testing and the common ethical hacking tools. Conduct a network scan by using Nmap; learn about incident handling, and recognize the importance of using templates or checklists prior to and during a penetration test. Finally, recognize best practices when testing uncovers exploits or vulnerabilities, and legal considerations when performing an ethical hacking exercise.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of the importance of ethical hacking in today's worldList different types of ethical hacking such as web application, system hacking, web server, wireless, and social engineeringList different types of real-world hackers such as white hat, black hat, and grey hatList benefits of ethical hacking such as discovering vulnerabilities and exploits, saving money, and better uptimeDescribe how to outline the rules of engagement prior to performing an ethical hacking exerciseDescribe how proactive ethical hacking can build better overall security through vulnerability assessments
-
List common ethical hacking tools such as nmap, wireshark, metasploit, and kali linuxConduct a network scan using nmapRecognize how to respond to and manage incidentsRecognize the importance of using templates or checklists prior to and during a penetration testRecognize best practices when testing uncovers exploits or vulnerabilitiesRecognize legal considerations when performing an ethical hacking exerciseSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 52s
-
6m 37sAfter completing this video, you will be able to provide an overview of the importance of ethical hacking in today's world. FREE ACCESS
-
5m 17sUpon completion of this video, you will be able to list different types of ethical hacking, such as web application, system hacking, web server, wireless, and social engineering. FREE ACCESS
-
2m 2sAfter completing this video, you will be able to list different types of real-world hackers, such as white hat, black hat, and grey hat. FREE ACCESS
-
2m 40sUpon completion of this video, you will be able to list benefits of ethical hacking, such as discovering vulnerabilities and exploits, saving money, and better uptime. FREE ACCESS
-
3m 25sUpon completion of this video, you will be able to describe how to outline the rules of engagement prior to performing an ethical hacking exercise. FREE ACCESS
-
2m 37sAfter completing this video, you will be able to describe how proactive ethical hacking can improve overall security through vulnerability assessments. FREE ACCESS
-
3m 50sUpon completion of this video, you will be able to list common ethical hacking tools, such as Nmap, Wireshark, Metasploit, and Kali Linux. FREE ACCESS
-
2m 42sIn this video, you will learn how to conduct a network scan using Nmap. FREE ACCESS
-
2m 51sAfter completing this video, you will be able to recognize how to respond to and manage incidents. FREE ACCESS
-
3m 33sAfter completing this video, you will be able to recognize the importance of using templates or checklists prior to and during a penetration test. FREE ACCESS
-
4m 50sAfter completing this video, you will be able to recognize best practices when testing uncovers exploits or vulnerabilities. FREE ACCESS
-
3m 30sAfter completing this video, you will be able to recognize legal considerations when performing an ethical hacking exercise. FREE ACCESS
-
43s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course
Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services
Rating 4.7 of 25 users
(25)