Home      Signup      Courses      Sign-In
 

  Please login to Enroll or Access the course.  
  Summary Page: Certified Ethical Hacker (CEH): Hacking and Penetration Testing

Certified Ethical Hacker (CEH): Hacking and Penetration Testing






Hacking involves gaining unauthorized access to a computer system. Penetration testing is performed by ethical hackers using the same hacking techniques as an attacker would use, in order to uncover real and potential security vulnerabilities. In this course we discuss hacking concepts, methods, and penetration testing. An ethical hacker is a person who attacks an organization’s security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the first in a series of courses which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.


Network and information security professionals


1.5

Hacking

  • match types of information security threats to examples
  • put the phases of a hacking attack in order
  • put the steps for creating and implementing security policies into the correct order
  • Penetration Testing

  • identify ways to assess the effectiveness of security policies and procedures
  • determine the type of penetration test to perform in a given situation
  • identify factors to consider when outsourcing penetration testing

  • sp_ceth_a01_it_enus

     

     
    Home      Signup      Courses      Sign-In
     

      UN Global Alliance for ICT and Development ESKILLS360 IS A UN GAID FLAGSHIP INITIATIVE