Lynda - Introduction to Ethical Hacking

seeders: 8
leechers: 9
Added on April 21, 2016 by nex_xenin Other > Tutorials
Torrent verified.



Lynda - Introduction to Ethical Hacking (Size: 134.17 MB)
 01_01-Welcome.mp44.99 MB
 01_03-Hacking ethically.mp41.63 MB
 01_02-What you should know.mp4678.55 KB
 02_01-Information security.mp49.25 MB
 02_03-Compare attack types.mp47.51 MB
 02_02-Threats and attack vectors.mp46.92 MB
 03_05-Creating security policies.mp410.51 MB
 03_03-Managing incidents.mp49.92 MB
 03_04-Exploring security policies.mp48.83 MB
 03_02-Defense in depth.mp48.35 MB
 03_01-Ethical hacking principles.mp48.28 MB
 04_05-Hacking concepts.mp413.76 MB
 04_02-Common vulnerabilities.mp412.64 MB
 04_03-Protecting data.mp410.56 MB
 04_01-Understand vulnerabilities.mp47.16 MB
 04_06-Hacking phases.mp46.53 MB
 04_04-Penetration testing methodology.mp45.52 MB
 05_01-Next steps.mp41.13 MB

Description

What is ethical hacking? Hacking comes in many colors: white, gray, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or learning enough to secure your own networks, this introduction is for you.
Security expert Lisa Bock starts with a definition of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the "Introduction to Ethical Hacking" competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.

Sharing Widget


Download torrent
134.17 MB
seeders:8
leechers:9
Lynda - Introduction to Ethical Hacking