Save For Later

Become an Ethical Hacker

Save For Later

Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.

In this learning path,

  • Learn about common and emerging threats to systems.
  • Practice using tools to test networks and identify risks.
  • Implement countermeasures to prevent cybersecurity attacks.

OpenCourser is an affiliate partner of LinkedIn Learning and may earn a commission when you buy through our links.

From LinkedIn Learning
Hours 66
Instructors Lisa Bock, James Williamson, Scott Simpson, Malcolm Shore, Dale Meredith, Troy Hunt, Luciano Ferrari, Jason Helmick, Stephanie Domas, Daniel Lachance
Language English
Subjects IT & Networking Programming

Similar Courses

Sorted by relevance

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).

Ethical cost accountant $64k

Ethical cost accountant $64k

Ethical Hacker or Pen Tester $67k

Ethical Hacker or Pen Tester $67k

Courses in this Learning Path

Listed in the order in which they should be taken

Starts Course Information

On Demand

Ethical Hacking: Introduction to Ethical Hacking

What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Overview

What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They...

LinkedIn Learning

Save

On Demand

Introduction to Web Design and Development

New to web design? Start here first. Instructor James Williamson introduces the fundamental concepts, tools, and learning paths for web design. He explains what it means to be a...

LinkedIn Learning

Save

On Demand

Learning Cryptography and Network Security

Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of...

LinkedIn Learning

Save

On Demand

Troubleshooting Your Network with Wireshark

Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network...

LinkedIn Learning

Save

On Demand

Learning Bash Scripting

Bash, or the Bourne Again Shell, is a widely popular command-line interpreter for administration and programming tasks. It's also the default option on Mac OS X and Linux. But...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Vulnerability Analysis

Pluralsight is not an official partner or accredited training center of EC-Council. Networks aren’t what they use to be. They’re more complex than ever. Systems today are so...

Pluralsight

Save

On Demand

Learning Kali Linux

Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Footprinting and Reconnaissance

If you watched ourContents:Introduction1. Reconnaisance Overview2. Email and Websites3. Reconnaissance ToolsConclusion

LinkedIn Learning

Save

On Demand

Ethical Hacking: The Complete Malware Analysis Process

The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Denial of Service

Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there....

LinkedIn Learning

Save

On Demand

Ethical Hacking: System Hacking

Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we've done our research, we've found our target, and...

Pluralsight

Save

On Demand

Ethical Hacking: Scanning Networks

Pluralsight is not an official partner or accredited training center of EC-Council. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to...

Pluralsight

Save

On Demand

Ethical Hacking: Enumeration

Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of...

Pluralsight

Save

On Demand

Ethical Hacking: Social Engineering

Pluralsight is not an official partner or accredited training center of EC-Council. Security defenses within information systems focus primarily on technology controls, that is,...

Pluralsight

Save

On Demand

Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Sniffers (You were viewing this course)

Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Hacking Web Servers and Web Applications

Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyberattacks. Knowing how to detect and prevent web attacks is a...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Session Hijacking

Pluralsight is not an official partner or accredited training center of EC-Council. Session persistence is a fundamental concept in information systems. On the web, for example,...

Pluralsight

Save

On Demand

Ethical Hacking: Mobile Devices and Platforms

Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Viruses and Worms

Malware is often one of the first ways hackers will target a system or network. Ethical hackers can combat malware such as viruses and worms by understanding exactly how they are...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Hacking Wireless Networks

Pluralsight is not an official partner or accredited training center of EC-Council. Great! You have just finished setting up your wireless network. You did everything you were...

Pluralsight

Save

On Demand

Ethical Hacking: Hacking IoT Devices

The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Trojans and Backdoors

It is crucial to maintain a network secure enough to prevent sophisticated attacks, especially if you are part of an enterprise organization. Some of the more dangerous threats to...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Cryptography

While the science of cryptography—in which data is mathematically scrambled—has roots in the protection of top-secret military communications, modern cryptography helps secure...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Website and Web Application Testing

Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyber attacks. Knowing how to detect and prevent web attacks is a...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Cloud Computing

Pluralsight is not an official partner or accredited training center of EC-Council. "The Cloud" is revolutionizing how we run software and services by providing low cost,...

Pluralsight

Save

On Demand

Ethical Hacking: Perimeter Defenses

Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity...

LinkedIn Learning

Save

On Demand

Ethical Hacking: Penetration Testing

Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it...

Pluralsight

Save

LinkedIn Learning

From LinkedIn Learning
Hours 66
Instructors Lisa Bock, James Williamson, Scott Simpson, Malcolm Shore, Dale Meredith, Troy Hunt, Luciano Ferrari, Jason Helmick, Stephanie Domas, Daniel Lachance
Language English
Subjects IT & Networking Programming

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).

Ethical cost accountant $64k

Ethical cost accountant $64k

Ethical Hacker or Pen Tester $67k

Ethical Hacker or Pen Tester $67k

Similar Courses

Sorted by relevance