Ethical Hacking and the Need for Penetration Testing
This course is included in our On-demand training solution.
Ethical hacking – this almost seems like a contradiction of words, but it isn’t; it is a skill set that is increasingly in demand from year to year. This course examines the differences between hacking and ethical hacking, the stages and phases of ethical hacking, the laws that govern hacking and ethical hacking, and the penetration testing methodology that is used to perform ethical hacking. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.
Existing or in-training IT security professionals seeking detailed security penetration testing skills
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems
Key Concepts in Ethical Hacking
Becoming an Ethical Hacker
Analyzing Attacks and Protecting Ethical Hackers
Hacking and the Law
Penetration Testing Methodology
Risk Analysis for Ethical Hacking
Computer Crime and Punishment