04/2016
1:12 hours
Introduction
2m 13s
Welcome
57s
What you should know
25s
Hacking ethically
51s
1. Ethical Hacking Overview
13m 45s
Information security
5m 12s
Threats and attack vectors
4m 16s
Compare attack types
4m 17s
2. Information Security Controls
26m 31s
Ethical hacking principles
4m 53s
Defense in depth
4m 59s
Managing incidents
5m 40s
Exploring security policies
4m 59s
Creating security policies
6m 0s
3. Supporting Ethical Hacking
29m 1s
Understand vulnerabilities
2m 50s
Common vulnerabilities
7m 18s
Protecting data
4m 58s
Penetration testing methodology
3m 14s
Hacking concepts
6m 50s
Hacking phases
3m 51s
Conclusion
48s
Next steps
48s