The benefits of the CEH certificationIs the CEH certification right for you?The requirements and the skills you need to become a CEHEthical hacking What is information security?An overview of information securityThe CIA triadTypes of cyberattacksThe technology triangleTypes of hackersHacking phasesThe purpose/goal of cyberattacksThe Cyber Kill Chain – understanding attackers and their methodsTactics, techniques, and proceduresAdversary behavior identificationIndicators of compromiseInformation security controlsEnter ethical hackingThe importance of ethical hackingUnderstanding defense-in-depth strategiesInformation security laws and standardsPayment Card Industry Data Security StandardISO, IEC 2701 2013 Health Insurance Portability and Accountability Act Privacy rulesSecurity rule National identifierEnforcement rule The Sarbanes-Oxley (SOX) Act The Digital Millennium Copyright ActFederal Information Security Management ActGeneral Data Protection RegulationThe Data Protection Act 2018 SummaryQuestions