CG数据库 >> Ethical Hacking: Understanding Ethical Hacking (2015)

Ethical Hacking: Understanding Ethical Hacking (2015)的图片1Ethical Hacking: Understanding Ethical Hacking (2015)

MP4 | AVC 399kbps | English | 1024x768 | 15fps | 7 hours | AAC stereo 127kbps | 748 MB

Genre: Video Training

This course is part of the 20 course Ethical Hacking Series. This course will significantly benefit security officers, network administrators, firewall administrators, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure. Additionally, anyone looking to obtain their Certified Ethical Hacker certification can use this course along with the others in this series to prepare for the exam. You should have a strong understanding in TCP/IP, operating systems, and have at least 1 year experience of networking technologies.

This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the duty of all System Admins and Security Professionals to protect their infrastructure from not only outside attackers but also attackers within your company. We will cover the terminology used by attackers, the difference between "hacking" and "ethical hacking", the phases of hacking, the types of attacks on a system, what skills an Ethical Hacker needs to obtain, types of security policies, why Ethical Hacking is essential, how to be in the "know" of what's happening in the hacking world, who a "hacker" is, what are the biggest security attack vectors, and more.

Table of contents:

The Truth About Living in a Technology Based World

6:56

Overview of the CEH Certification Program

21:10

How to Build a Lab to Hack Safely

42:36

Installing and Configuring Your Windows Server VMs

45:54

Installing and Configuring Your Desktop VMs

59:00

Information Security Overview

23:10

Security Threats and Attack Vectors

44:22

Hacking Concepts

46:55

Hacking Phases

28:38

Attack Types

32:07

Information Security Controls

48:50

How to Prepare for the Certified Ethical Hacker Exam

21:14

Ethical Hacking: Understanding Ethical Hacking (2015)的图片2 Ethical Hacking: Understanding Ethical Hacking (2015)的图片3 Ethical Hacking: Understanding Ethical Hacking (2015)的图片4