Your browser does not support this video.
Certified Ethical Hacker, Part 3: Threats and System Hacking
with expert Rafiq Wayani
This course narrows in on how to identify threats both external and internal. Perhaps one of the employees of the business uses a very weak password and this is a security threat that a dictionary attack tool can rapidly find. It then covers how to gain information or "footprinting" on a target of ethical hacking. It shows how to scan and also to mitigate scans to acquire information about weak points and then explains diagramming your system from a hacking perspective. This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).Course Outline