Overview
Ethical Hacking Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in ethical hacking with add-on labs for hands-on experience. The course contains 12 modules and add-on labs covering fundamental ethical hacking concepts, including emerging technologies like IoT and OT, cloud computing, etc.
Who should attend
EC-Council’s Essentials Series programs and certifications build and validate candidates’ skills for their cybersecurity future. It is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.
Course Objectives
EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity. The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.
Outline
Information Security Fundamentals
- Information security fundamentals
- Information security laws and regulations
Ethical Hacking Fundamentals
- Cyber Kill Chain methodology
- Hacking concepts, hacking cycle, and different hacker classes
- Ethical hacking concepts, scope, and limitations
Information Security Threats and Vulnerabilities
- Detect various threat sources and vulnerabilities in a network or system
- Different types of malwares
Password Cracking Techniques and Countermeasures
- Types of password cracking techniques
Social Engineering Techniques and Countermeasures
- Social engineering concepts and techniques
- Insider threats and identity theft concepts
Network-Level Attacks and Countermeasures
- Packet sniffing concepts and types
- Sniffing techniques and countermeasures
- DoS and DDoS attacks under sniffing attacks
Web Application Attacks and Countermeasures
- Web Server Attacks
- Web Application Attacks
- Web Application Architecture and Vulnerability Stack
- Web Application Threats and Attacks
- SQL Injection Attacks
- Types of SQL Injection Attacks
Wireless Attacks and Countermeasures
- Wireless Terminology
- Types of Wireless Encryption
- Wireless Network-specific Attack Techniques
- Bluetooth Attacks
- Wireless Attack Countermeasures
Mobile Attacks and Countermeasures
- Mobile Attack Anatomy
- Mobile Attack Vectors and Mobile Platform Vulnerabilities
IoT and OT Attacks and Countermeasures
- IoT Devices, their need and Application Areas
- IoT Threats and Attacks
- Understand OT Concepts
- OT Challenges and Attacks
- OT Attacks Countermeasures
Cloud Computing Threats and Countermeasures
- Cloud Computing Concepts
- Container Technology
- Cloud Computing Threats
- Cloud Computing Countermeasures
Penetration Testing Fundamentals
- Fundamentals of Penetration Testing and its Benefits
- Various Types and Phases of Penetration Testing
- Guidelines and Recommendations for Penetration Testing