Skip to Scheduled Dates
Course Overview
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more. EC-Council’s ethical hacking essentials course provides hands-on practical experience to learners, thus giving them the skills necessary for a future in cybersecurity. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.
Who Should Attend
- School students, fresh graduates, Professionals, Career starters and switchers, IT / Technology / Cybersecurity teams with little or no work experience.
- Anyone who wants to start their cybersecurity career and master the fundamentals of security online.
- Anyone who wants to prepare for a cybersecurity career and aid their IT education.
- Professionals who want to get into the cybersecurity field but are unsure where to start their education journey
Course Objectives
- Key issues plaguing the information security world and information security laws and standards.
- Fundamentals of ethical hacking
- Information security threats and vulnerabilities
- Different types of malware
- Different types of password-cracking techniques and countermeasures
- Social engineering techniques, insider threats, identity theft, and countermeasures
- Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures.
- Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures
- Wireless encryption, wireless threats, and countermeasures
- Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
- IoT and OT concepts, attacks, and countermeasures
- Cloud computing technologies, cloud computing threats, attacks, and security techniques
- Fundamentals of pen testing
Course Outline
Module 01: Information Security Fundamentals
- Information Security Fundamentals
- Information Security Laws and Regulations
Module 02: Ethical Hacking Fundamentals
- Cyber Kill Chain Methodology
- Hacking Concepts and Hacker Classes
- Different Phases of Hacking Cycle
- Ethical Hacking Concepts, Scope, and Limitations
- Ethical Hacking Tools
Module 03: Information Security Threats and Vulnerability Assessment
- Threat and Threat Sources
- Malware and its Types
- Malware Countermeasures
- Vulnerabilities
- Vulnerability Assessment
Module 04: Password Cracking Techniques and Countermeasures
- Password Cracking Techniques
- Password Cracking Tools
- Password Cracking Countermeasures
Module 05: Social Engineering Techniques and Countermeasures
- Social Engineering Concepts and its Phases
- Social Engineering Techniques
- Insider Threats and Identity Theft
- Social Engineering Countermeasures
Module 06: Network Level Attacks and Countermeasures
- Packet Sniffing Concepts
- Sniffing Techniques
- Sniffing Countermeasures
- DoS and DDoS Attacks
- DoS and DDoS Attack Countermeasures
- Session Hijacking Attacks
- Session Hijacking Attack Countermeasures
Module 07: Web Application Attacks and Countermeasures
- Web Server Attacks
- Web Server Attack Countermeasures
- Web Application Architecture and Vulnerability Stack
- Web Application Threats and Attacks
- Web Application Attack Countermeasures
- SQL Injection Attacks
- SQL Injection Attack Countermeasures
Module 08: Wireless Attacks and Countermeasures
- Wireless Terminology
- Wireless Encryption
- Wireless Network-Specific Attack Techniques
- Bluetooth Attacks
- Wireless Attack Countermeasures
Module 09: Mobile Attacks and Countermeasures
- Mobile Attack Anatomy
- Mobile Platform Attack Vectors and Vulnerabilities
- Mobile Device Management (MDM) Concept
- Mobile Attack Countermeasures
Module 10: IoT and OT Attacks and Countermeasures
- IoT Concepts
- IoT Threats and Attacks
- IoT Attack Countermeasures
- OT Concepts
- OT Threats and Attacks
- OT Attack Countermeasures
Module 11: Cloud Computing Threats and Countermeasures
- Cloud Computing Concepts
- Container Technology
- Cloud Computing Threats
- Cloud Attack Countermeasures
Module 12: Penetration Testing Fundamentals
- Fundamentals of Penetration Testing and its Benefits
- Strategies and Phases of Penetration Testing
- Guidelines and Recommendations for Penetration Testing