A 20-course Learning Path from LinkedIn Learning

Save For Later

Become an Ethical Hacker

Save For Later

About this Learning Path

Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.

  • Learn about common and emerging threats to systems.
  • Practice using tools to test networks and identify risks.
  • Implement countermeasures to prevent cybersecurity attacks.

LinkedIn Learning

From LinkedIn Learning
Hours 33
Instructors Lisa Bock, James Williamson, Scott Simpson, Malcolm Shore
Language English
Subjects IT & Networking Programming
Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).

Ethical cost accountant $64k

Ethical cost accountant $64k

Ethical Hacker or Pen Tester $67k

Ethical Hacker or Pen Tester $67k

Courses in this Learning Path

Listed in the order in which they should be taken

Starts Course Information

On Demand

Ethical Hacking: Overview

What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Introduction to Web Design and Development

New to web design? Start here first. In these tutorials, James Williamson introduces the fundamental concepts, tools, and learning paths for web design. He explains what it means...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Learning Cryptography and Network Security

Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Troubleshooting Your Network with Wireshark

Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Learning Bash Scripting

Bash, or the Bourne Again Shell, is a widely popular command-line interpreter for administration and programming tasks. It's also the default option on Mac OS X and Linux. But...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Learning Kali Linux

Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Footprinting and Reconnaissance

If you watched our

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Denial of Service

Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there....

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: System Hacking

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks....

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Scanning Networks

After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Enumeration

Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Social Engineering

Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Sniffers

Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Session Hijacking

One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid interactions of unsuspecting users—in order...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Viruses and Worms

Malware is often one of the first ways hackers will target a system or network. Ethical hackers can combat malware such as viruses and worms by understanding exactly how they are...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Wireless Networks

Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Trojans and Backdoors (You were viewing this course)

It is crucial to maintain a network secure enough to prevent sophisticated attacks, especially if you are part of an enterprise organization. Some of the more dangerous threats to...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Website and Web Application Testing

Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyber attacks. Knowing how to detect and prevent web attacks is a...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Perimeter Defenses

Ethical hacking—testing to see if an organization's network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity...

LinkedIn Learning

Take just this course
For $29
Save

On Demand

Ethical Hacking: Penetration Testing

You've done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to

LinkedIn Learning

Take just this course
For $29
Save

LinkedIn Learning

From LinkedIn Learning
Hours 33
Instructors Lisa Bock, James Williamson, Scott Simpson, Malcolm Shore
Language English
Subjects IT & Networking Programming
Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).

Ethical cost accountant $64k

Ethical cost accountant $64k

Ethical Hacker or Pen Tester $67k

Ethical Hacker or Pen Tester $67k