Ethical Hacking Essentials E|HE

Course Description

Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more. EC-Council’s ethical hacking essentials course provides hands-on practical experience to learners, thus giving them the skills necessary for a future in cybersecurity. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.

E|HE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction. If you are looking to learn advance ethical hacking click here: Ethical Hacking Certification (Certified Ethical Hacker C|EH)

Ethical Hacking Essentials Program Information

Why EC-Council’s Essentials Series is the Most Popular and Fastest Growing Beginner Level Training Program for Career Starters and Career Changers

213,000+

Learners
Trust EC-Council’s
Essentials Series

150+

Countries

85+

Million Minutes
Watched

4.95/5.0

Average
Ratings

96.46%

of Learners
Gave a 5* Rating

Ethical Hacking Essentials
Course Outline

Module 01: Information Security Fundamentals

  • Information Security Fundamentals
  • Information Security Laws and Regulations

Module 02: Ethical Hacking Fundamentals

  • Cyber Kill Chain Methodology
  • Hacking Concepts and Hacker Classes
  • Different Phases of Hacking Cycle
  • Ethical Hacking Concepts, Scope, and Limitations
  • Ethical Hacking Tools

Lab Exercise

  • Passive Footprinting to Gather Information About a Target
  • Network Scanning to Identify Live Hosts, Open Ports and Services and Target OS in the
    Network
  • Enumeration on a System or Network to Extract Usernames, Machine Names, Network
    Resources, Shares, etc.

Module 03: Information Security Threats and Vulnerability Assessment

Topics Covered:

  • Threat and Threat Sources
  • Malware and its Types
  • Malware Countermeasures
  • Vulnerabilities
  • Vulnerability Assessment

Lab Exercise

  • Vulnerability Assessment to Identify Security Vulnerabilities in the Target System or
    Network

Module 04: Password Cracking Techniques and Countermeasures

Topics Covered:

  • Password Cracking Techniques
  • Password Cracking Tools
  • Password Cracking Countermeasures

Lab Exercise

  • Perform Active Online Attack to Crack the System’s Password
  • Audit System Passwords

Module 05: Social Engineering Techniques and Countermeasures

  • Social Engineering Concepts and its Phases
  • Social Engineering Techniques
  • Insider Threats and Identity Theft
  • Social Engineering Countermeasures

Lab Exercise

  • Social Engineering Using Various Techniques to Sniff Users’ Credentials
  • Detect a Phishing Attack

Module 06: Network Level Attacks and Countermeasures

  • Packet Sniffing Concepts
  • Sniffing Techniques
  • Sniffing Countermeasures
  • DoS and DDoS Attacks
  • DoS and DDoS Attack Countermeasures
  • Session Hijacking Attacks
  • Session Hijacking Attack Countermeasures

Lab Exercise

  • Perform MAC Flooding to Compromise the Security of Network Switches
  • Perform ARP Poisoning to Divert all Communication between Two Machines
  • Detect ARP Attacks using ARP Spoofing Detection Tools to Ensure Data Privacy
  • Perform DoS and DDoS Attacks using Various Techniques on a Target Host to Prevents Access to System Resources for Legitimate Users
  • Detect and Protect Against DDoS Attack
  • Perform Session Hijacking to Seize Control of a Valid TCP Communication Session Between Two Computers
  • Detect Session Hijacking Attempts using Manual Method

Module 07: Web Application Attacks and Countermeasures

  • Web Server Attacks
  • Web Server Attack Countermeasures
  • Web Application Architecture and Vulnerability Stack
  • Web Application Threats and Attacks
  • Web Application Attack Countermeasures
  • SQL Injection Attacks
  • SQL Injection Attack Countermeasures

Lab Exercise

  • Perform a Web Server Attack to Crack FTP Credentials
  • Perform a Web Application Attack to Compromise the Security of Web Applications to Steal Sensitive Information
  • Perform SQL Injection Attacks on a Target Web Application to Manipulate the Backend Database
  • Detect SQL Injection Vulnerabilities using SQL Injection Detection Tools

Module 08: Wireless Attacks and Countermeasures

  • Wireless Terminology
  • Wireless Encryption
  • Wireless Network-Specific Attack Techniques
  • Bluetooth Attacks
  • Wireless Attack Countermeasures

Lab Exercise

  • Perform Wi-Fi Packet Analysis
  • Perform Wireless Attacks to Crack Wireless Encryption

Module 09: Mobile Attacks and Countermeasures

  • Mobile Attack Anatomy
  • Mobile Platform Attack Vectors and Vulnerabilities
  • Mobile Device Management (MDM) Concept
  • Mobile Attack Countermeasures

Lab Exercise

  • Hack an Android Device by Creating Binary Payloads
  • Secure Android Devices using Various Android Security Tools

Module 10: IoT and OT Attacks and Countermeasures

  • IoT Concepts
  • IoT Threats and Attacks
  • IoT Attack Countermeasures
  • OT Concepts
  • OT Threats and Attacks
  • OT Attack Countermeasures

Lab Exercise

  • Perform Footprinting using Various Footprinting Techniques
  • Capture and Analyze IoT Device Traffic

Module 11: Cloud Computing Threats and Countermeasures

  • Cloud Computing Concepts
  • Container Technology
  • Cloud Computing Threats
  • Cloud Attack Countermeasures

Lab Exercise

  • Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
  • Exploit S3 Buckets

Module 12: Penetration Testing Fundamentals

  • Fundamentals of Penetration Testing and its Benefits
  • Strategies and Phases of Penetration Testing
  • Guidelines and Recommendations for Penetration Testing