Ethical Hacking and the Need for Penetration Testing


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Ethical hacking - this almost seems like a contradiction of words, but it isn't; it is a skill set that is increasingly in demand from year to year. This course examines the differences between hacking and ethical hacking, the stages and phases of ethical hacking, the laws that govern hacking and ethical hacking, and the penetration testing methodology that is used to perform ethical hacking. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration (hours)
2.0

Lesson Objectives

Ethical Hacking and the Need for Penetration Testing

  • recognize the basic principles of information system security
  • associate vulnerabilities with the hacking technologies that are used to exploit them
  • recognize how ethical hackers can protect themselves when performing ethical hacking
  • recognize the stages of ethical hacking
  • identify common methods ethical hackers can use to test information system security
  • analyze attacks made by a malicious hacker, for a given scenario
  • recommend a strategy ethical hackers can use to protect themselves, for a given scenario
  • recognize how Title 18 of the U.S. Code applies to ethical hackers and the legality of their actions
  • recognize situations where privacy laws or principles are breached
  • recognize the five hacking classes of attack
  • identify automated vulnerability scanning tools
  • calculate the annual loss expectancy of an organization due to hacking, for a given scenario
  • determine the applicable law where a computer crime has been committed
  • Course Number:
    sp_etih_a01_it_enus