CEH v11: CEH Hacking Methodology & Windows Authentication

Ethical Hacker v11    |    Intermediate
  • 2 videos | 33m 38s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 38 users Rating 4.7 of 38 users (38)
When it comes to ethical hacking, repeatable successful tactics and processes are the name of the game. In this course, you'll explore the CEH Hacking Methodology to understand each of its phases and goals. You'll also learn about Windows authentication methods and the process behind them. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Describe the ceh hacking methodology
    describe the goals of the ceh hacking methodology
    Work with the windows sam authentication method
  • identify the windows authentication methods
    describe the windows authentication process

IN THIS COURSE

  • Locked
    1.  CEH Hacking Methodology and Goals
    12m 55s
    After completing this video, you will be able to describe the goals of the CEH Hacking Methodology. FREE ACCESS
  • Locked
    2.  Windows Authentication
    20m 44s
    Upon completion of this video, you will be able to describe the Windows authentication process. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
Rating 4.6 of 242 users Rating 4.6 of 242 users (242)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 20 users Rating 4.7 of 20 users (20)
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)