This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
IT Security Gumbo-Penetration Testing Series - The Basics Part 1
IT Security Gumbo-Penetration Testing Series
1. Introduction-The Basics (1:04)
2.Course Objectives (0:37)
3.Section 1 Overview (0:37)
4.Section 2 Overview (0:43)
5.Section 3 Overview (0:59)
6.Understanding Ethical Hacker Terminology (2:42)
7.Identifying Different Types of Hacking Technologies (3:13)
8.Different Hacker Classes (6:46)
9.What Do Hackers Do (1:50)
10.What Do Hackers Do Part 2 (1:50)
12.Vulnerability Research (5:50)
11.Become an Ethical Hacker (1:05)
13.Vulnerability Research Part 2 (2:18)
14.Legal Implications of Hacking (2:39)
15.Section 1 Wrap-Up (2:53)
14.Legal Implications of Hacking
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock