Ethical Hacking Essentials (E|HE)
Begin your Cybersecurity Journey with Hands-on, Foundational Skills in Ethical Hacking
Self Paced (Discount)
₦197,183
Tutor Led (Discount)
₦297,183
Official Price
₦508,300
EC-Council Ethical Hacking Essentials Certification
Ethical Hacking Essentials is an Introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals. It offers hands-on experience in computer and network security concepts such as threats, vulnerabilities, password cracking, web applications, and more. No IT/Cybersecurity experience required for this course.
Test your skills with CTF-based Capstone Projects and validate these newly acquired skills in proctored exams. With 15 hours of premium learning, 11 labs, and 12 modules, the E|HE provides a solid foundation and formal recognition to boost your resume and open doors for better opportunities.
Key Features
Ethical Hacking Essentials (E|HE) Course Information
Module 01: Information Security Fundamentals
- Information Security Fundamentals
- Information Security Laws and Regulations
Module 02: Ethical Hacking Fundamentals
- Cyber Kill Chain Methodology
- Hacking Concepts and Hacker Classes
- Different Phases of Hacking Cycle
- Ethical Hacking Concepts, Scope, and Limitations
- Ethical Hacking Tools
- Passive Footprinting to Gather Information About a Target
- Network Scanning to Identify Live Hosts, Open Ports and Services and Target OS in the Network
- Enumeration on a System or Network to Extract Usernames, Machine Names, Network Resources, Shares, etc
Module 03: Information Security Threats and Vulnerability Assessment
- Threat and Threat Sources
- Malware and its Types
- Malware Countermeasures
- Vulnerabilities
- Vulnerability Assessment
- Vulnerability Assessment to Identify Security Vulnerabilities in the Target System or Network
Module 04: Password Cracking Techniques and Countermeasures
- Password Cracking Techniques
- Password Cracking Tools
- Password Cracking Countermeasures
- Perform Active Online Attack to Crack the System’s Password
- Audit System Passwords
Module 05: Social Engineering Techniques and Countermeasures
- Social Engineering Concepts and its Phases
- Social Engineering Techniques
- Insider Threats and Identity Theft
- Social Engineering Countermeasures
- Social Engineering using Various Techniques to Sniff Users’ Credentials
- Detect a Phishing Attack
Module 06: Network Level Attacks and Countermeasures
- Packet Sniffing Concepts
- Sniffing Techniques
- Sniffing Countermeasures
- DoS and DDoS Attacks
- DoS and DDoS Attack Countermeasures
- Session Hijacking Attacks
- Session Hijacking Attack Countermeasures
- Perform MAC Flooding to Compromise the Security of Network Switches
- Perform ARP Poisoning to Divert all Communication between Two Machines
- Detect ARP Attacks using ARP Spoofing Detection Tools to Ensure Data Privacy
- Perform DoS and DDoS Attacks using Various Techniques on a Target Host to Prevents Access to System Resources for Legitimate Users
- Detect and Protect Against DDoS Attack
- Perform Session Hijacking to Seize Control of a Valid TCP Communication Session Between Two Computers
- Detect Session Hijacking Attempts using Manual Method
Module 07: Web Application Attacks and Countermeasures
- Web Server Attacks
- Web Server Attack Countermeasures
- Web Application Architecture and Vulnerability Stack
- Web Application Threats and Attacks
- Web Application Attack Countermeasures
- SQL Injection Attacks
- SQL Injection Attack Countermeasures
- Perform a Web Server Attack to Crack FTP Credentials
- Perform a Web Application Attack to Compromise the Security of Web Applications to Steal Sensitive Information
- Perform SQL Injection Attacks on a Target Web Application to Manipulate the Backend Database
- Detect SQL Injection Vulnerabilities using SQL Injection Detection Tools
Module 08: Wireless Attacks and Countermeasures
- Wireless Terminology
- Wireless Encryption
- Wireless Network-Specific Attack Techniques
- Bluetooth Attacks
- Wireless Attack Countermeasures
- Perform Wi-Fi Packet Analysis
- Perform Wireless Attacks to Crack Wireless Encryption
Module 09: Mobile Attacks and Countermeasures
- Mobile Attack Anatomy
- Mobile Platform Attack Vectors and Vulnerabilities
- Mobile Device Management (MDM) Concept
- Mobile Attack Countermeasures
- Hack an Android Device by Creating Binary Payloads
- Secure Android Devices using Various Android Security Tools
Module 10: IoT and OT Attacks and Countermeasures
- IoT Concepts
- IoT Threats and Attacks
- IoT Attack Countermeasures
- OT Concepts
- OT Threats and Attacks
- OT Attack Countermeasures
- Perform Footprinting using Various Footprinting Techniques
- Capture and Analyze IoT Device Traffic
Module 11: Cloud Computing Threats and Countermeasures
- Cloud Computing Concepts
- Container Technology
- Cloud Computing Threats
- Cloud Attack Countermeasures
- Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
- Exploit S3 Buckets
Module 12: Penetration Testing Fundamentals
- Fundamentals of Penetration Testing and its Benefits
- Strategies and Phases of Penetration Testing
- Guidelines and Recommendations for Penetration Testing
What Skills You’ll Learn
- Key issues plaguing the information security world and information security laws and standards.
- Fundamentals of ethical hacking
- Information security threats and vulnerabilities
- Different types of malware
- Different types of password-cracking techniques and countermeasures
- Social engineering techniques, insider threats, identity theft, and countermeasures
- Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures
- Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures
- Wireless encryption, wireless threats, and countermeasures
- Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
- IoT and OT concepts, attacks, and countermeasures
- Cloud computing technologies, cloud computing threats, attacks, and security techniques
- Fundamentals of pen testing
Who is it for?
- High school students, fresh graduates, professionals, career starters and switchers, and IT, technology, or cybersecurity teams with limited or no prior work experience.
- Professionals who want to get into the cybersecurity field but are unsure where to start their education journey.
- Anyone who wants to start their cybersecurity career and master the fundamentals of security online.
- Anyone who wants to prepare for a cybersecurity career and aid their IT education.
Training Details: Self-paced, in-demand lecture videos led by world-class instructors and
hands-on labs.
Pre-requisite: No prior cybersecurity knowledge or IT work experience required.
Exam Details:
- Exam Code: 112-52
- Number of Questions: 75
- Duration: 2 hours
- Test Format: Multiple Choice