Course Features

  • Lectures 0
  • Quizzes 0
  • Duration 17 hour
  • Students 4
  • Assessments Yes


0 Review
User AvatarUser Avatar

Ethical Hacking Essentials (EHE)

17 hours
All levels
0 lessons
0 quizzes
4 students

EC-Council Ethical Hacking Essentials (EHE) Ethical Hacking Essentials training is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more.


  • Fundamentals of Ethical Hacking
  • Web application threats and attacks
  • Password cracking Techniques
  • Insider threats and identity theft
  • DoS and DDoS attacks
  • Web server attacks
  • Mobile attacks
  • IoT & OT Attacks
  • Cloud computing concepts


  • No eligibility criteria for this program.

Who Should Go For This Training?

  • Help Desk Technician
  • Technical Support Specialist
  • System Specialist
  • Computer Support Specialist
  • Cybersecurity Specialist

Course Outline

Information Security Fundamentals

  • Information security fundamentals
  • Information security laws and regulations

Ethical Hacking Fundamentals

  • Cyber Kill Chain methodology
  • Hacking concepts, hacking cycle, and different hacker classes
  • Ethical hacking concepts, scope, and limitations

Information Security Threats and Vulnerabilities

  • Detect various threat sources and vulnerabilities in a network or system
  • Different types of malwares

Password Cracking Techniques and Countermeasures

  • Types of password cracking techniques

Social Engineering Techniques and Countermeasures

  • Social engineering concepts and techniques
  • Insider threats and identity theft concepts

Network-Level Attacks and Countermeasures

  • Packet sniffing concepts and types
  • Sniffing techniques and countermeasures
  • DoS and DDoS attacks under sniffing attacks

Web Application Attacks and Countermeasures

  • Web Server Attacks
  • Web Application Attacks
  • Web Application Architecture and Vulnerability Stack
  • Web Application Threats and Attacks
  • SQL Injection Attacks
  • Types of SQL Injection Attacks

Wireless Attacks and Countermeasures

  • Wireless Terminology
  • Types of Wireless Encryption
  • Wireless Network-specific Attack Techniques
  • Bluetooth Attacks
  • Wireless Attack Countermeasures

Mobile Attacks and Countermeasures

  • Mobile Attack Anatomy
  • Mobile Attack Vectors and Mobile Platform Vulnerabilities

IoT and OT Attacks and Countermeasures

  1. IoT Attacks
    • IoT Devices, their need and Application Areas
    • IoT Threats and Attacks
  2. OT Attacks
    • Understand OT Concepts
    • OT Challenges and Attacks
    • OT Attacks Countermeasures

Cloud Computing Threats and Countermeasures

  • Cloud Computing Concepts
  • Container Technology
  • Cloud Computing Threats
  • Cloud Computing Countermeasures

Penetration Testing Fundamentals

  • Fundamentals of Penetration Testing and its Benefits
  • Various Types and Phases of Penetration Testing
  • Guidelines and Recommendations for Penetration Testing

What Exam Do I Need To Get Certified?

  • EHE : EC-Council Ethical Hacking Essentials Bundle (CyberQ Labs, Exam Voucher, VitalSource eBook, Exam Prep) @$100

Buy Exam Voucher

The curriculum is empty