وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking: Introduction to Ethical Hacking

سرفصل های دوره

Ethical hacking tests the strength of an organization's defenses and is a desired skill for any IT professional. In this course, security expert Lisa Bock explains how to protect data in a digital world and covers the basics of Information security. She begins by discussing how to layer defenses and outlines the power of using adaptive security controls. Lisa describes how artificial intelligence can help early threat detection and explains the benefits of MITRE ATT&CK, which provides tools and techniques specific to the ethical hacking process. She then stresses the need to maintain a vigilant posture, by using threat modeling and cyber threat intelligence. Lisa also provides an overview of the various hacker frameworks and reviews the laws and standards that define best practice behavior. She concludes by covering why it’s essential to perform ethical hacking, examines attack types and motives, lists the main hacking phases, and outlines the desired skills of an ethical hacker.


01 - Introduction
  • 01 - Locking down the organization
  • 02 - Discovering resources
  • 03 - Hacking ethically

  • 02 - 1. Protect Data in a Digital World
  • 01 - Recognizing elements of information security
  • 02 - Providing information assurance
  • 03 - Defending in depth
  • 04 - Using AI and ML in cybersecurity
  • 05 - Adapting to the threats
  • 06 - Leveraging event correlation

  • 03 - 2. Maintain a Vigilant Posture
  • 01 - Modeling threats
  • 02 - Using cyber threat intelligence
  • 03 - Following the threat intelligence lifecycle
  • 04 - Managing incidents
  • 05 - Challenge Hardening guide
  • 06 - Solution Hardening guide

  • 04 - 3. Summarize Hacking Frameworks
  • 01 - Understanding the cyber kill chain
  • 02 - Utilizing MITRE ATT&CK
  • 03 - Analyzing using the diamond model
  • 04 - Identifying adversary behavior
  • 05 - Discovering indicators of compromise
  • 06 - Challenge The cyber kill chain
  • 07 - Solution The cyber kill chain

  • 05 - 4. Review Security Laws and Standards
  • 01 - Managing risks
  • 02 - Asset inventory
  • 03 - Defining information security standards
  • 04 - Outlining US regulations
  • 05 - Exploring global cyber laws and standards
  • 06 - Challenge Cyber threat information sharing
  • 07 - Solution Cyber threat information sharing

  • 06 - 5. Support Ethical Hacking
  • 01 - Comparing attack types and motives
  • 02 - Outlining the types of hackers
  • 03 - Recognizing the skills of an ethical hacker
  • 04 - Stepping through the hacking phases
  • 05 - Grasping the importance of ethical hacking

  • 07 - Conclusion
  • 01 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 18875
    حجم: 217 مگابایت
    مدت زمان: 113 دقیقه
    تاریخ انتشار: 20 شهریور 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید