Lynda.com is no longer available for individual subscribers. Please go to LinkedIn Learning to access your account if you moved or to sign up for a new account. For additional support, reach out to firstname.lastname@example.org.
Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.
Learn about common and emerging threats to systems.
Practice using tools to test networks and identify risks.
Implement countermeasures to prevent cybersecurity attacks.
Ethical Hacking: Introduction to Ethical Hacking with Lisa Bock
What is ethical hacking? Get an overview of the principles of ethical hacking and the techniques and tools used by the white hat hacker.
1h 44m • COURSE
Ethical Hacking: Footprinting and Reconnaissance with Lisa Bock
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
1h 42m • COURSE
Ethical Hacking: Scanning Networks with Lisa Bock
Become an ethical hacker. Learn how to detect network vulnerabilities through scanning, and use tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.
2h 6m • COURSE
Ethical Hacking: Enumeration with Malcolm Shore
Learn how to enumerate protocols, processes, and services on Windows and Linux machines, and study for the Certified Ethical Hacker exam.
1h 57m • COURSE
Ethical Hacking: Vulnerability Analysis with Lisa Bock
Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.
1h 26m • COURSE
Ethical Hacking: System Hacking with Lisa Bock
Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.
1h 28m • COURSE
Ethical Hacking: The Complete Malware Analysis Process with Malcolm Shore
Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.
1h 48m • COURSE
Ethical Hacking: Sniffers with Lisa Bock
Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.
1h 20m • COURSE
Ethical Hacking: Social Engineering with Lisa Bock
Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.
1h 25m • COURSE
Ethical Hacking: Denial of Service with Malcolm Shore
Prepare for the Certified Ethical Hacker exam. Learn about the most common types of denial-of-service (DoS) attacks and discover strategies to mitigate them.
1h 39m • COURSE
Ethical Hacking: Session Hijacking with Malcolm Shore
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
1h 13m • COURSE
Ethical Hacking: Evading IDS, Firewalls, and Honeypots with Malcolm Shore
Take your first steps into testing client defenses. Learn about firewalls, network simulation using GNS3, special-purpose perimeter devices, and intrusion response techniques.
2h 12m • COURSE
Ethical Hacking: Hacking Web Servers and Web Applications with Malcolm Shore
Find out how to test websites and web applications and prevent cyberattacks like SQL injections and cross-site scripting exploits.
1h 25m • COURSE
Ethical Hacking: Wireless Networks with Malcolm Shore
IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.
1h 41m • COURSE
Ethical Hacking: Mobile Devices and Platforms with Malcolm Shore
Learn how to secure your organization's mobile devices and test iOS and Android applications for security flaws—key topics on the Certified Ethical Hacker exam.
1h 52m • COURSE
Ethical Hacking: Hacking IoT Devices with Luciano Ferrari
Find out how to make IoT devices more secure by learning about the technologies and protocols used and how to implement countermeasures to address vulnerabilities.
35m 22s • COURSE
Ethical Hacking: Cryptography with Stephanie Domas
Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.
1h 1m • COURSE
Ethical Hacking: Cloud Computing with Daniel Lachance
Learn how to evaluate and harden cloud-deployed resources as you study for version 10 of the Certified Ethical Hacker (CEH) exam.
1h 52m • COURSE
You'll learn ethical hacking skills with these experts
Lisa Bock is an experienced author with a demonstrated history of working in the elearning industry.
Lisa is a security ambassador with a broad range of IT skills and knowledge, including networking, Wireshark, biometrics, and IoT. Lisa is an award-winning speaker, who has presented at several national IT conferences. She holds a master's degree in computer information systems/information assurance from the University of Maryland University College. Lisa was an associate professor in the IT department at Pennsylvania College of Technology (Williamsport, Pennsylvania) from 2003 until her retirement in 2020. She is involved with various volunteer activities, and she and her husband, Mike, enjoy bike riding, watching movies, and traveling.
Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB.
Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security.
Luciano Ferrari is an information security leader and IoT hacking expert.
Luciano holds multiple security certifications, including CISSP, CRISC, and PCIP, and has worked at Fortune 500 companies in both technical and leadership roles. He drives progress at his own company, LufSec, where he works on security-related issues and projects.
Luciano has conducted hundreds of IT security audits and penetration tests, including audits and tests on IoT devices for cable companies. He has also leveraged his IT security expertise in manufacturing, semiconductor, financial, and educational institutions. With his background in electronics and microelectronics, his distinct specialization is definitely on hardware hacking. Luciano is passionate about sharing his knowledge with others and teaching.
His other areas of expertise include IT infrastructure, networking, penetration testing, risk, vulnerability, and threat management. In private, he enjoys researching new technologies and participating at security conferences and in bug bounty programs.
Stephanie Domas is the vice president of research and development at MedSec.
Stephanie is a seasoned leader and respected industry authority. In her current role at MedSec, she leads business strategy and helps global engineering and research teams deliver service and product offerings that meet the unique needs of cybersecurity in medical devices. She oversees aggressive goal setting to drive business value, growth, and recruitment. Stephanie also serves as the chief product security officer for various customers, leading the development and execution of their product cybersecurity strategy. She has been a presenter at Black Hat (2018 and 2019), DEF CON (2016 and 2017) and DerbyCon (2016 and 2018).
Daniel Lachance is a consultant, trainer, author, and editor at Lachance IT Consulting Inc.
A highly motivated and passionate IT evangelist, Daniel has over 20 years of experience implementing and supporting a wide variety of hardware and software. His skills include system administration, technical IT training, and planning and implementing technology solutions related to networking.