Ethical Hacking Essentials

Discover Offensive Security
Level I - Cyber Novice

cover

Course Description

Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more. EC-Council’s ethical hacking essentials course provides hands-on practical experience to learners, thus giving them the skills necessary for a future in cybersecurity. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.

Who Should Attend

  • School students, fresh graduates, Professionals, Career starters and switchers, IT / Technology / Cybersecurity teams with little or no work experience.
  • Anyone who wants to start their cybersecurity career and master the fundamentals of security online.
  • Anyone who wants to prepare for a cybersecurity career and aid their IT education.
  • Professionals who want to get into the cybersecurity field but are unsure where to start their education journey.

EHE Course – Ethical Hacking Essentials

  • Module 01: Information Security Fundamentals
  • Module 02: Ethical Hacking Fundamentals
  • Module 03: Information Security Threats and Vulnerability Assessment
  • Module 04: Password Cracking Techniques and Countermeasures
  • Module 05: Social Engineering Techniques and Countermeasures
  • Module 06: Network Level Attacks and Countermeasures
  • Module 06: Network Level Attacks and Countermeasures
  • Module 07: Web Application Attacks and Countermeasures
  • Module 08: Wireless Attacks and Countermeasures
  • Module 09: Mobile Attacks and Countermeasures
  • Module 10: IoT and OT Attacks and Countermeasures
  • Module 11: Cloud Computing Threats and Countermeasures
  • Module 12: Penetration Testing Fundamentals