CEH, Part 3: Threats and System Hacking

with expert Rafiq Wayani

This course narrows in on how to identify threats both external and internal. Perhaps one of the employees of the business uses a very weak password and this is a security threat that a dictionary attack tool can rapidly find. It then covers how to gain information or "footprinting" on a target of ethical hacking. It shows how to scan and also to mitigate scans to acquire information about weak points and then explains diagramming your system from a hacking perspective.

Course Outline