Ethical Hacking: Understanding Ethical Hacking

Pluralsight is not an official partner or accredited training center of EC-Council. This course will significantly benefit security officers, network administrators, and anyone who is concerned about the integrity of their network infrastructure.
Course info
Rating
(1054)
Level
Beginner
Updated
May 20, 2015
Duration
7h 0m
Table of contents
Hacking Phases
28m 38s
Attack Types
32m 7s
Description
Course info
Rating
(1054)
Level
Beginner
Updated
May 20, 2015
Duration
7h 0m
Description

Pluralsight is not an official partner or accredited training center of EC-Council. This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the duty of all System Admins and Security Professionals to protect their infrastructure from not only outside attackers but also attackers within your company. We will cover the terminology used by attackers, the difference between "hacking" and "ethical hacking", the phases of hacking, the types of attacks on a system, what skills an Ethical Hacker needs to obtain, types of security policies, why Ethical Hacking is essential, how to be in the "know" of what's happening in the hacking world, who a "hacker" is, what are the biggest security attack vectors, and more. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

About the author
About the author

Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.

More from the author
More courses by Dale Meredith