Ethical Hacking Essentials (EHE)
EC-Council Ethical Hacking Essentials (EHE) Ethical Hacking Essentials training is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security …
Overview
EC-Council Ethical Hacking Essentials (EHE) Ethical Hacking Essentials training is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more.
Learning OBJECTIVES
- Fundamentals of Ethical Hacking
- Web application threats and attacks
- Password cracking Techniques
- Insider threats and identity theft
- DoS and DDoS attacks
- Web server attacks
- Mobile attacks
- IoT & OT Attacks
- Cloud computing concepts
Prerequisites
- No eligibility criteria for this program.
Who Should Go For This Training?
- Help Desk Technician
- Technical Support Specialist
- System Specialist
- Computer Support Specialist
- Cybersecurity Specialist
Course Outline
Information Security Fundamentals
- Information security fundamentals
- Information security laws and regulations
Ethical Hacking Fundamentals
- Cyber Kill Chain methodology
- Hacking concepts, hacking cycle, and different hacker classes
- Ethical hacking concepts, scope, and limitations
Information Security Threats and Vulnerabilities
- Detect various threat sources and vulnerabilities in a network or system
- Different types of malwares
Password Cracking Techniques and Countermeasures
- Types of password cracking techniques
Social Engineering Techniques and Countermeasures
- Social engineering concepts and techniques
- Insider threats and identity theft concepts
Network-Level Attacks and Countermeasures
- Packet sniffing concepts and types
- Sniffing techniques and countermeasures
- DoS and DDoS attacks under sniffing attacks
Web Application Attacks and Countermeasures
- Web Server Attacks
- Web Application Attacks
- Web Application Architecture and Vulnerability Stack
- Web Application Threats and Attacks
- SQL Injection Attacks
- Types of SQL Injection Attacks
Wireless Attacks and Countermeasures
- Wireless Terminology
- Types of Wireless Encryption
- Wireless Network-specific Attack Techniques
- Bluetooth Attacks
- Wireless Attack Countermeasures
Mobile Attacks and Countermeasures
- Mobile Attack Anatomy
- Mobile Attack Vectors and Mobile Platform Vulnerabilities
IoT and OT Attacks and Countermeasures
- IoT Attacks
- IoT Devices, their need and Application Areas
- IoT Threats and Attacks
- OT Attacks
- Understand OT Concepts
- OT Challenges and Attacks
- OT Attacks Countermeasures
Cloud Computing Threats and Countermeasures
- Cloud Computing Concepts
- Container Technology
- Cloud Computing Threats
- Cloud Computing Countermeasures
Penetration Testing Fundamentals
- Fundamentals of Penetration Testing and its Benefits
- Various Types and Phases of Penetration Testing
- Guidelines and Recommendations for Penetration Testing
What Exam Do I Need To Get Certified?
- EHE : EC-Council Ethical Hacking Essentials Bundle (CyberQ Labs, Exam Voucher, VitalSource eBook, Exam Prep) @$100