Course catalog

Categories

Showing 3,001-3,020 of 8,871 items.

Ethical Hacking: Mobile Devices and Platforms

Learn how to secure your organization's mobile devices and test iOS and Android applications for security flaws—key topics on the Certified Ethical Hacker exam.

Ethical Hacking: Penetration Testing

The only way to know your systems are secure is to test them. Learn how to use penetration testing to check for vulnerabilities in computers, networks, applications, email, and people.

Ethical Hacking: Scanning Networks

Become an ethical hacker. Learn how to detect network vulnerabilities through scanning, and use tools and techniques for evading IDS detection, concealing, spoofing, and tunneling.

Ethical Hacking: Session Hijacking

Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.

Ethical Hacking: Sniffers

Hackers use sniffing to intercept network traffic. Learn about how ethical hackers prevent these types of attacks in this course from our Certified Ethical Hacker exam series.

Ethical Hacking: Social Engineering

Prevent identity theft and network intrusion by hackers. Learn what social engineering is, who is being targeted, and how attacks are orchestrated.

Ethical Hacking: System Hacking (91389)

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.

These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh.

Ethical Hacking: The Complete Malware Analysis Process

Learn how to detect, analyze, and defeat different types of malware, from viruses and worms to Trojans and backdoors.

Ethical Hacking: Vulnerability Analysis

Manage risk by assessing vulnerabilities. Learn about the processes, methodologies, and tools you need to find and address weaknesses that attackers might exploit.

Ethical Hacking: Wireless Networks

IT security professionals: Learn how to identify and repair vulnerabilities in your wireless networks. This course is part of our Certified Ethical Hacker test prep series.

Ethics and Law in Data Analytics

Analytics and AI are powerful tools that have real-word outcomes. Learn how to the practical, ethical, and legal frameworks to be an effective analytics professional.

Evaluating and Evolving Your Business Model

Learn how to rethink and evolve your business model to ensure that it remains vital in an unpredictable, fast-changing market.

Evaluating Business Investment Decisions

Learn how to fairly evaluate business investment decisions and minimize the financial risks for your organization.

Evaluating College as an Investment

Get tips for finding your dream career, getting your college paid for (without loans!), and looking at higher education with an investor's mindset.

Evan Cheng Character Designer

Evan Cheng, character designer for Sesame Workshop, explains how a daily drawing practice and an alter ego helped him evolve his artwork and his career.

Event Planning Foundations

Turn your passion for event planning into a career. Learn the techniques professional event planners use to select venues, plan budgets, manage the schedule, and more.

Evernote for Students

Learn how to leverage Evernote, a productivity app, to organize class notes, find assignment info, share notes, and share task lists. Explore the different Evernote versions.

Everyday Statistics, with Eddie Davila

Learn how to decode the statistics that pop up on a daily basis—from political polls to football scores. Eddie Davila explores a different real-world topic each week.

Everything as a Service (XaaS) is the Future of Business

Learn how everything as a service (XaaS) is transforming and enabling businesses to compete in a rapidly evolving global marketplace.

Evil by Design 2: The Power of Self-Image (209726)

Self-image is a powerful driving force for consumers. The desire to be seen and admired is, in part, what makes influencers with aspirational lifestyles effective marketing tools and compels people to keep up with the latest trends. In this installment of the Evil by Design series, learn how to use this knowledge to your advantage. Instructor Chris Nodder discusses the impact of envy and differences in status, why cognitive dissonance and managing the gap between truth and fiction can be a challenge for designers, and how people can be unconsciously ignorant of their own ignorance (and how this impacts the language of persuasive design). Chris also digs into the grey areas of this design strategy, helping you discern how far you should take these dark patterns.