About this Learning Path
Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.
In this learning path,
- Learn about common and emerging threats to systems.
- Practice using tools to test networks and identify risks.
- Implement countermeasures to prevent cybersecurity attacks.
From | LinkedIn Learning |
---|---|
Hours | 66 |
Instructors | Lisa Bock, James Williamson, Scott Simpson, Malcolm Shore, Dale Meredith, Troy Hunt, Luciano Ferrari, Jason Helmick, Stephanie Domas, Daniel Lachance |
Language | English |
Subjects | IT & Networking Programming |
Similar Courses
Sorted by relevance
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).
Ethical cost accountant $64k
Ethical cost accountant $64k
Ethical Hacker or Pen Tester $67k
Ethical Hacker or Pen Tester $67k
Courses in this Learning Path
Listed in the order in which they should be taken
Starts | Course Information | |
---|---|---|
On Demand |
Ethical Hacking: Introduction to Ethical Hacking (You were viewing this course) What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They... LinkedIn Learning |
Save
|
On Demand |
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They... LinkedIn Learning |
Save
|
On Demand |
Introduction to Web Design and Development New to web design? Start here first. Instructor James Williamson introduces the fundamental concepts, tools, and learning paths for web design. He explains what it means to be a... LinkedIn Learning |
Save
|
On Demand |
Learning Cryptography and Network Security Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of... LinkedIn Learning |
Save
|
On Demand |
Troubleshooting Your Network with Wireshark Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network... LinkedIn Learning |
Save
|
On Demand |
Bash, or the Bourne Again Shell, is a widely popular command-line interpreter for administration and programming tasks. It's also the default option on Mac OS X and Linux. But... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Vulnerability Analysis Pluralsight is not an official partner or accredited training center of EC-Council. Networks aren’t what they use to be. They’re more complex than ever. Systems today are so... Pluralsight |
Save
|
On Demand |
Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Footprinting and Reconnaissance If you watched ourContents:Introduction1. Reconnaisance Overview2. Email and Websites3. Reconnaissance ToolsConclusion LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: The Complete Malware Analysis Process The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Denial of Service Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there.... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: System Hacking Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we've done our research, we've found our target, and... Pluralsight |
Save
|
On Demand |
Ethical Hacking: Scanning Networks Pluralsight is not an official partner or accredited training center of EC-Council. So, after reconnaissance, we need to scan for basics, kind of like knocking on all the doors to... Pluralsight |
Save
|
On Demand |
Pluralsight is not an official partner or accredited training center of EC-Council. Enumeration is the first official attack at your target. Enumeration is the process of... Pluralsight |
Save
|
On Demand |
Ethical Hacking: Social Engineering Pluralsight is not an official partner or accredited training center of EC-Council. Security defenses within information systems focus primarily on technology controls, that is,... Pluralsight |
Save
|
On Demand |
Ethical Hacking: Evading IDS, Firewalls, and Honeypots Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity... LinkedIn Learning |
Save
|
On Demand |
Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Hacking Web Servers and Web Applications Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyberattacks. Knowing how to detect and prevent web attacks is a... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Session Hijacking Pluralsight is not an official partner or accredited training center of EC-Council. Session persistence is a fundamental concept in information systems. On the web, for example,... Pluralsight |
Save
|
On Demand |
Ethical Hacking: Mobile Devices and Platforms Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Viruses and Worms Malware is often one of the first ways hackers will target a system or network. Ethical hackers can combat malware such as viruses and worms by understanding exactly how they are... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Hacking Wireless Networks Pluralsight is not an official partner or accredited training center of EC-Council. Great! You have just finished setting up your wireless network. You did everything you were... Pluralsight |
Save
|
On Demand |
Ethical Hacking: Hacking IoT Devices The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Trojans and Backdoors It is crucial to maintain a network secure enough to prevent sophisticated attacks, especially if you are part of an enterprise organization. Some of the more dangerous threats to... LinkedIn Learning |
Save
|
On Demand |
While the science of cryptography—in which data is mathematically scrambled—has roots in the protection of top-secret military communications, modern cryptography helps secure... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Website and Web Application Testing Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyber attacks. Knowing how to detect and prevent web attacks is a... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Cloud Computing Pluralsight is not an official partner or accredited training center of EC-Council. "The Cloud" is revolutionizing how we run software and services by providing low cost,... Pluralsight |
Save
|
On Demand |
Ethical Hacking: Perimeter Defenses Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity... LinkedIn Learning |
Save
|
On Demand |
Ethical Hacking: Penetration Testing Pluralsight is not an official partner or accredited training center of EC-Council. What's penetration testing? Well it's simple, as security professionals our job is to make it... Pluralsight |
Save
|
From | LinkedIn Learning |
---|---|
Hours | 66 |
Instructors | Lisa Bock, James Williamson, Scott Simpson, Malcolm Shore, Dale Meredith, Troy Hunt, Luciano Ferrari, Jason Helmick, Stephanie Domas, Daniel Lachance |
Language | English |
Subjects | IT & Networking Programming |
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).
Ethical cost accountant $64k
Ethical cost accountant $64k
Ethical Hacker or Pen Tester $67k
Ethical Hacker or Pen Tester $67k
Similar Courses
Sorted by relevance