Ethical Hacking: Introduction to Ethical Hacking

Ethical Hacking: Introduction to Ethical Hacking

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 6h 41m | 341 MB

If you know even a little bit about programming languages, you know there are a plethora of options to choose from. If your priority is a language focused on reliability, speed, memory, safety, and parallelism, then Rust may be the one for you. In this course, instructor Barron Stone covers the key components of Rust, starting with basic programming concepts including variables, data types, functions, and control loops. He then moves on to some of the core concepts that are unique to Rust, including ownership, borrowing references, and crates. While Rust is great for low-level systems programming, it’s also being used for web apps, network services, and embedded programs. As Barron shows, the features of Rust, along with great tools, documentation, and a welcoming community, have made Rust a language that developers love.

Table of Contents

1 Locking down the organization
2 Solution- The Cyber Kill Chain
3 Defining ethical hacking
4 Defense in depth
5 Managing incidents
6 Exploring security policies
7 Creating security policies
8 Components of a security policy
9 Protecting the data
10 Standards and regulations
11 The COBIT framework
12 What you should know
13 Exploring the security plan
14 Creating security policies 2
15 Recognizing components of a security policy
16 Challenge- Create a security policy
17 Solution- Create a security policy
18 Understanding vulnerabilities
19 Penetration testing methodology
20 Hacking concepts
21 The human factor in ethical hacking
22 Stepping through the hacking phases
23 Hacking ethically
24 Next steps
25 Information security overview
26 Today’s threat landscape
27 Navigating attack vectors
28 Comparing attack types
29 Understanding the Cyber Kill Chain
30 Challenge- The Cyber Kill Chain

Homepage