CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare

CEH v12    |    Intermediate
  • 5 videos | 1h 35m 26s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Building a strong foundation of knowledge is crucial to becoming an effective cybersecurity professional. In this course, you'll build that foundational knowledge by exploring the five core elements of cybersecurity. You'll examine how classifying what motivates an attacker to attack a network or system can go a long way into figuring out how to best protect systems and networks. Next, you'll explore the many types of attacks that threat actors use to gain access to systems and sensitive data. Finally, you'll learn about information warfare, including its categories and strategies. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Outline the ceh hacking methodology and define each of the phases and goals
    Recognize the security control used to validate integrity
    identify the elements of cyber security
    Recognize the different motivations for an attacker
    identify the motivation for an attacker to plant ransomware on a system
    recognize the different types of motivations for attacks
  • Recognize the different types of attacks
    recognize the attack type that involves the attacker attacking the supplier of a company
    identify the type of attack that involves the attacker interacting with the target system
    Identify the forms of information warfare
    identify the information warfare strategies
    recognize the information warfare type that involves prevention communication between systems

IN THIS COURSE

  • Locked
    1.  CEH v12 EC-Council Certification Overview
    5m 27s
    After completing this video, you will be able to outline the EC-Council certification process for Certified Ethical Hacker v12. FREE ACCESS
  • Locked
    2.  Basic Cybersecurity Concepts
    26m 58s
    Upon completion of this video, you will be able to define the five core elements of cybersecurity. FREE ACCESS
  • Locked
    3.  Attacker Motives, Goals, and Objectives
    14m 27s
    After completing this video, you will be able to recognize the common motives, goals, and objectives of threat actors. FREE ACCESS
  • Locked
    4.  Attack Classifications
    24m 45s
    Upon completion of this video, you will be able to recognize different attack classifications and examples of each. FREE ACCESS
  • Locked
    5.  Information Warfare
    23m 48s
    After completing this video, you will be able to recognize information warfare categories and strategies. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 242 users Rating 4.6 of 242 users (242)
Rating 4.7 of 29 users Rating 4.7 of 29 users (29)
Rating 4.6 of 25 users Rating 4.6 of 25 users (25)