Video: 1.4 - Understanding the Security, Functionality, and Usability Triangle

Поделиться
HTML-код
  • Опубликовано: 18 окт 2024
  • Ethical Hacking Essentials (EHE)
    by EC-Council
    About this Course
    Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity.
    ===============================================================================
    Syllabus
    Here are the sorted videos for each section with "Video: Video" removed:
    Week 1: Information Security Fundamentals
    *Videos (9):*
    1. Course Introduction
    2. Introduction
    3. Understanding the Need for Security
    4. Understanding the Elements of Information Security
    5. Understanding the Security, Functionality, and Usability Triangle
    6. Understanding Motives, Goals, and Objectives of Information Security Attacks
    7. Overview of Classification of Attacks
    8. Overview of Information Security Attack Vectors
    9. Overview of Various Information Security Laws and Regulations
    Week 2: Ethical Hacking Fundamentals
    *Videos (8):*
    1. Introduction
    2. Understanding the Cyber Kill Chain Methodology
    3. Understanding Tactics, Techniques, and Procedures (TTPs)
    4. Overview of Indicators of Compromise (IoCs)
    5. Overview of Hacking Concepts and Hacker Classes
    6. Understanding Different Phases of Hacking Cycle
    7. Understanding Ethical Hacking Concepts and Its Scope
    8. Overview of Ethical Hacking Tools
    Week 3: Social Engineering Techniques and Countermeasures
    *Videos (6):*
    1. Introduction
    2. Understanding Social Engineering Concepts
    3. Understanding Various Social Engineering Techniques
    4. Understanding Insider Threats
    5. Understanding Identity Theft
    6. Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures
    Week 4: Network Level Attacks and Countermeasures
    *Videos (9):*
    1. Introduction
    2. Understanding Packet Sniffing and Types of Sniffing
    3. Understanding Various Sniffing Techniques and Tools
    4. Understanding Different Sniffing Countermeasures
    5. Overview of Different Types of DoS and DDoS Attacks
    6. Understanding Different DoS/DDoS Attack Tools
    7. Understanding Different DoS/DDoS Attack Countermeasures and Protection Tools
    8. Overview of Session Hijacking and Types of Session Hijacking
    9. Understanding Different Session Hijacking Tools and Countermeasures
    Week 5: Web Application Attacks and Countermeasures
    *Videos (9):*
    1. Introduction
    2. Understanding Web Server Concepts and Attacks
    3. Understanding Different Web Server Attack Tools and Countermeasures
    4. Overview of Web Application Architecture and Vulnerability Stack
    5. Understanding Different Web Application Threats and Attacks
    6. Understanding Different Web Application Attack Tools and Countermeasures
    7. Overview of Different Types of SQL Injection Attacks
    8. Understanding Different SQL Injection Tools
    9. Understanding Different SQL Injection Attack Countermeasures
    Week 6: Wireless Attacks and Countermeasures
    *Videos (8):*
    1. Introduction
    2. Overview of Wireless Terminology
    3. Overview of Wireless Encryption Algorithms
    4. Understanding Wireless Network-Specific Attack Techniques
    5. Overview of Different Wireless Attack Tools
    6. Understanding Bluetooth Attack Techniques
    7. Overview of Various Wireless Attack Countermeasures
    8. Overview of Different Wireless Security Tools
    Week 7: Mobile Attacks and Countermeasures
    *Videos (6):*
    1. Introduction
    2. Understanding Anatomy of a Mobile Attack
    3. Understanding Mobile Platform Attack Vectors
    4. Understanding Mobile Platform Vulnerabilities
    5. Understanding Mobile Device Management
    6. Overview of Mobile Security Guidelines and Security Tools
    Week 8: IoT and OT Attacks and Countermeasures
    *Videos (7):*
    1. Introduction
    2. Understanding IoT Concepts
    3. Understanding IoT attacks and IoT attack Tools
    4. Overview of IoT Attack Countermeasures and Security Tools
    5. Understanding OT Concepts
    6. Understanding OT Attacks and OT Attack Tools
    7. Overview of OT Attack Countermeasures and Security Tools
    Week 9: Cloud Computing Threats and Countermeasures
    *Videos (7):*
    1. Introduction
    2. Understanding Cloud Computing Concepts
    3. Overview of Container Technology
    4. Understanding Cloud Computing Threats
    5. Overview of Cloud Attacks and Tools
    6. Understanding Cloud Attack Countermeasures
    7. Overview of Various Cloud Computing Security Tools
    Week 10: Penetration Testing Fundamentals
    *Videos (7):*
    1. Introduction
    2. Understanding Penetration Testing and its Benefits
    3. Understanding Types of Penetration Testing
    4. Understanding Phases of Penetration Testing
    5. Overview of Penetration Testing Methodologies
    6. Overview of Guidelines and Recommendations for Penetration Testing
    7. Understanding Risks Associated with Penetration Testing

Комментарии •