Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Introduction to Ethical Hacking to your Wishlist.

Add to Wishlist

Introduction to Ethical Hacking

Receive an introduction to Ethical Hacking and its various concepts.
3.9 (5 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
269 students enrolled
Created by LearnSmart LLC
Last updated 2/2015
$10 $25 60% off
3 days left at this price!
30-Day Money-Back Guarantee
  • 1 hour on-demand video
  • 1 Article
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Dive deep into the diverse challenges of ethical hacking.
Explore vulnerabilities and defense-in-depth.
Learn about penetration testing, as well as the methodology for pentesting/ethical hacking.
Gain understanding of vulnerability management, incident management, and creating and implementing a security policy.
View Curriculum
  • No prerequisites for this course - A computer with Internet

The phrase “ethical hacking” may seem counterintuitive, but it is an invaluable tool for the betterment of technology. Ethical hacking involves the testing of IT resources to ensure their security. Gain an in-depth introduction to related concepts from defense strategy to incident management in this comprehensive course.

Master Effective and Ethical Hacking with This Comprehensive Guide

  • Dive deep into unique hacking challenges like defense-in-depth and incident management.
  • Apply penetration testing techniques.
  • Learn to create and implement security policy for your company.

In “Introduction to Ethical Hacking”, you will be introduced to various concepts including vulnerabilities, exploits, penetration testing, pentest types and methodology. Further, we will explore vulnerability management and security policy development.

At the end of this course you will have a basic understanding of the various concepts involved in ethical hacking.

Who is the target audience?
  • This course is intended for individuals looking to expand their knowledge of different IT Security principals. This course is considered beginner to intermediate.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 14 Lectures Collapse All 14 Lectures 52:59
0 Lectures 00:00
7 questions
Intro to Ethical Hacking
9 Lectures 46:12



Penetration Testing

Pentesting Demo 1

Pentesting Demo 2

Pentesting Demo 3

Pentesting Demo 4

Methodology for Penetration Testing/Ethical Hacking

Chapter 1 Quiz
7 questions
Security Management
4 Lectures 06:41
Vulnerability Management

Incident Management

Security Policy

1 Lecture 00:04
24 questions

Supplemental Materials
About the Instructor
4.1 Average rating
7,675 Reviews
70,999 Students
67 Courses
Smarter Training. Never Open a Textbook Again.

LearnSmart has served the learning community with high-quality professional skills and IT certification training since 1997. In that time, the company has helped thousands earn career-related certifications from respected vendors, such as Project Management Institute (PMI)®, Cisco, Microsoft, CompTIA, Oracle, and EC-Council. LearnSmart offers over 1,000 courses covering IT, project management, administrative, HR, and workplace safety topics. With a rapidly growing clientele of individuals and corporations, LearnSmart serves a broad range of Fortune 500 companies to universities, as well as government institutions and the armed forces.

LearnSmart is able to meet diverse career and learning needs through its extensive selection of training. LearnSmart uses industry experts to give learners the most up-to-date content in a video format as well as training resources including; reference tools, pretests, study guides and labs. For more information about how we can help pinpoint and solve your individual or multi-user training challenges.

PMI is a registered trademark of the Project Management Institute, Inc.

Report Abuse