455715 637242270759507803 16x9 1

Learning Kali Linux

Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations’ behalves, to see if they’re vulnerable Read more…

479404 637199540857686692 16x9 1

Ethical Hacking: Session Hijacking

One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid interactions of unsuspecting users—in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent Read more…

540350 637199727845527366 16x9 1

Ethical Hacking: Perimeter Defenses

Ethical hacking—testing to see if an organization’s network is vulnerable to outside attacks—is a desired skill for many IT security professionals. In this course, cybersecurity expert Malcolm Shore prepares you to take your first steps into testing client defenses. Malcolm provides you with an overview of firewall technology, and demonstrates Read more…

512724 637242270177930277 16x9 1

Ethical Hacking: Exploits

In addition to damaging and disabling computers, malware (malicious software) can compromise the security of stored data and can spread to other machines. To protect the integrity of networks and systems, penetration testers benefit from learning how malware works. In this course, cybersecurity expert Malcolm Shore discusses how to avoid Read more…

479403 637199540833532599 16x9 2

Ethical Hacking: Enumeration

Ethical hacking is one of the most desired stills for any IT security professional. White hat hackers can detect, prevent, and mitigate network intrusions and data theft: a critical liability for any company that does business online or in the cloud. This course introduces to the concept of enumeration—identifying the Read more…

5028660 1553018742023 16x9 1

Ethical Hacking: Denial of Service

Ethical hacking involves testing to see if an organization’s network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there. Being able to mitigate DoS attacks is one of the most desired skills for any IT security professional—and a key topic on the Certified Read more…