Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.
Overview
Syllabus
Introduction
- Locking down the organization
- Discovering resources
- Hacking ethically
- Recognizing elements of information security
- Providing information assurance
- Defending in depth
- Using AI and ML in cybersecurity
- Adapting to the threats
- Leveraging event correlation
- Modeling threats
- Using cyber threat intelligence
- Following the threat intelligence lifecycle
- Managing incidents
- Challenge: Hardening guide
- Solution: Hardening guide
- Understanding the cyber kill chain
- Utilizing MITRE ATT&CK
- Analyzing using the diamond model
- Identifying adversary behavior
- Discovering indicators of compromise
- Challenge: The cyber kill chain
- Solution: The cyber kill chain
- Managing risks
- Asset inventory
- Defining information security standards
- Outlining US regulations
- Exploring global cyber laws and standards
- Challenge: Cyber threat information sharing
- Solution: Cyber threat information sharing
- Comparing attack types and motives
- Outlining the types of hackers
- Recognizing the skills of an ethical hacker
- Stepping through the hacking phases
- Grasping the importance of ethical hacking
- Next steps
Taught by
Lisa Bock