From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Module 3: System hacking phases and attack techniques introduction

Module 3: System hacking phases and attack techniques introduction

From the course: Certified Ethical Hacker (CEH)

Module 3: System hacking phases and attack techniques introduction

- Welcome to module 3, System Hacking Phases and Attack Techniques. In this module, we will be exploring the core phases and the techniques that both malicious hackers and ethical hackers use to compromise systems. Remember that our goal here is to understand these techniques so we can better defend against them and improve, of course, the overall security of our environment. We'll focus on three critical areas: First, we will go into vulnerability analysis, and this is where we take the information gathered during reconnaissance and then use it to identify weaknesses in the target system. Then, we will explore system hacking, and this is often considered the most exciting, the more sexy part of ethical hacking, where we put our skills to the test and we will discuss, you know, many different techniques that you can actually do to demonstrate how an attacker can compromise a system. And then, we will discuss malware threats. Malware, of course, is one of the most prevalent and…

Contents