CEH v11: Cybersecurity Basics, Attacks & Information Warfare

Ethical Hacker v11    |    Intermediate
  • 5 videos | 1h 9m 27s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 242 users Rating 4.6 of 242 users (242)
Building a strong foundation of knowledge is crucial to becoming an effective cybersecurity professional. In this course, you'll build that foundational knowledge by exploring the five core elements of cybersecurity. You'll examine how classifying what motivates an attacker to attack a network or system can go a long way into figuring out how to best protect systems and networks. Next, you'll explore the many types of attacks that threat actors use to gain access to systems and sensitive data. Finally, you'll learn about information warfare, including its categories and strategies. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the ec-council certification process for certified ethical hacker v11
    Recognize the security control used to validate integrity
    identify the elements of cyber security
    Identify the motivation for an attacker to plant ransomware on a system
    recognize the different types of motivations for attacks
    recognize the different motivations for an attacker
  • Recognize the attack type that involves the attacker attacking the supplier of a company
    recognize the different types of attacks
    identify the type of attack that involves the attacker interacting with the target system
    Identify the information warfare strategies
    recognize the information warfare type that involves prevention communication between systems
    identify the forms of information warfare

IN THIS COURSE

  • 7m 13s
    Upon completion of this video, you will be able to recognize the EC-Council certification process for the Certified Ethical Hacker v11. FREE ACCESS
  • 10m 35s
    Upon completion of this video, you will be able to recognize the security control used to validate integrity. FREE ACCESS
  • Locked
    3.  Attacker Motives, Goals, and Objectives
    16m 20s
    After completing this video, you will be able to recognize the different motivations for an attacker. FREE ACCESS
  • Locked
    4.  Attack Classifications
    17m 15s
    After completing this video, you will be able to recognize the attack type that involves the attacker attacking the supplier of a company. FREE ACCESS
  • Locked
    5.  Information Warfare
    18m 4s
    In this video, you will learn how to identify the forms of information warfare. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 28 users Rating 4.5 of 28 users (28)
Rating 4.7 of 60 users Rating 4.7 of 60 users (60)
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 26 users Rating 4.8 of 26 users (26)
Rating 4.6 of 153 users Rating 4.6 of 153 users (153)
Rating 4.7 of 29 users Rating 4.7 of 29 users (29)