Ethical Hacking: Introduction To Ethical Hacking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Ethical Hacking: Introduction to Ethical Hacking

with Lisa Bock

Introduction
00_01. Locking down the organization
• For a summary of the objectives for the Certified Ethical Hacker (CEH), visit:
https://cert.eccouncil.org/announcements.html

00_02. Comparing network attacks


• No links

00_03. Hacking ethically


• No links

Chapter 1. Ethical Hacking Overview


01_01. Information security overview
• To see a graphic of the different types of cybercrime, visit:
https://cdn.pcwdld.com/wp-content/uploads/common-types-of-cyber-attacks-1024x700.jpg

01_02. Today’s threat landscape


• A graphic of a zombie communicating with a command and control (C&C) server:
https://thecustomizewindows.com/wp-content/uploads/2013/11/Command-and-Control-Server.jpg
• See FireEye’s 2021 cybersecurity predictions:
https://content.fireeye.com/predictions/rpt-security-predictions-2021

01_03. Navigating threats and attack vectors


• No links

01_05. Comparing attack types


• An article by Malwarebytes on the future of undetected malware:
https://resources.malwarebytes.com/resource/under-the-radar-the-future-of-undetected-mal-
ware/?utm_source=blog&utm_medium=post&utm_campaign=q4fy19

01_06. Understanding the Cyber Kill Chain


• A discussion on the Cyber Kill Chain:
https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

Ethical Hacking: Introduction to Ethical Hacking with Lisa Bock 1 of 4


Ethical Hacking: Introduction to Ethical Hacking
with Lisa Bock

01_07. Challenge: Utilizing Cyber Kill Chain for analysis


• Visit the link: https://us-cert.cisa.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analy-
sis_of_GRIZZLY_STEPPE_Activity.pdf
• Answer the following questions:
◦ What is the Cyber Kill Chain? List the main steps.
◦ What two website vulnerabilities were the malicious actors looking to exploit?
◦ What was one of the main methods the malicious actors used to deliver the malicious payloads?
◦ What is an advanced persistent threat?
◦ What are some mitigation methods?
◦ Any thoughts on this report?

01_08. Response: Utilizing Cyber Kill Chain for analysis


• Same as above

Chapter 2. Using Email and Websites


02_01. Defining ethical hacking
• No links

02_02. Defending in depth


• No links

02_03. Layering defenses


• No links

02_04. Reviewing incidents


• No links

02_05. Managing security incidents


• No links

Chapter 3. Data Protection in a Digital World


03_01. Protecting the data
• Detailed Mind Map for Internet Infrastructure Assets:
https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-themat-
ic-landscapes/threat-landscape-of-the-internet-infrastructure/detailed-mind-map-for-internet-infra-
structure-assets

Ethical Hacking: Introduction to Ethical Hacking with Lisa Bock 2 of 4


Ethical Hacking: Introduction to Ethical Hacking
with Lisa Bock

03_02. Defining standards and regulations


• To see a list of the 10 worst accounting scandals, visit: http://www.accounting-degree.org/scandals/

03_03. Outlining the COBIT framework


• No links

03_04. Exploring the security plan


• For a guide on best practices when developing a security plan, visit:
https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final

03_05. Creating security policies


• No links

03_06. Recognizing components of a security policy


• For guidelines on creating a security policy, visit: https://www.sans.org/information-security-policy/

03_07. Challenge: Create a security policy


• For guidelines on creating a security policy, visit: https://www.sans.org/information-security-policy/
• Challenge questions:
◦ Download and open the acceptable use policy
◦ Scroll through to see the many elements of the policy
◦ What other policies would be helpful?
◦ What is a clean desk policy?
◦ What is a remote access policy?
◦ Knowing the templates are available, is there any reason why an
organization wouldn’t create general policies?

03_08. Response: Create a security policy


• Same as above

Chapter 4. Supporting Ethical Hacking


04_01. Understanding vulnerabilities
• To view current cyberactivity and alerts of the US National Cyber Awareness System, visit:
www.us-cert.gov
• To see a list of OWASP top 10 vulnerabilities, visit: https://owasp.org/www-project-top-ten/

Ethical Hacking: Introduction to Ethical Hacking with Lisa Bock 3 of 4


Ethical Hacking: Introduction to Ethical Hacking
with Lisa Bock

04_02. Penetration testing methodology


• No links

04_03. Exploring the concept of hacking


• Take a look at this visual of data flow in the TOR (The Onion Router) network, where much of the dark
web resides: https://torflow.uncharted.software/
• To try out Nessus, a powerful scanner, visit: https://www.tenable.com/
• Qualys free scan can check out SSL issues: https://www.qualys.com/forms/freescan/

04_04. Recognizing the human factor in ethical hacking


• No links

04_05. Stepping through the hacking phases


• No links

Conclusion
05_01. Next steps
• To see a list of courses on my homepage, visit:
https://www.linkedin.com/learning/instructors/lisa-bock?u=2125562

Ethical Hacking: Introduction to Ethical Hacking with Lisa Bock 4 of 4

You might also like