From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Next steps

Next steps

- [Instructor] Thank you for watching. In this course, I introduced you to ethical hacking, one of the most effective ways to test the strength of an organization's defenses. I began by stressing the importance of providing confidentiality, integrity, and availability. I described the value of layering defenses and outlined the power of using adaptive security controls. We then discovered the importance of maintaining a vigilant posture and summarized hacking frameworks, such as MITRE ATT&CK and the Diamond Model of Intrusion Analysis. I compared US and global security laws and standards that drive best-practice behavior and described some of the attack types along with some of the motives and goals. I then summarized by reviewing the importance of ethical hacking along with the main phases and what happens during each phase. If you're interested in learning more, please check out the library where new courses are added…

Contents