Department of Cybersecurity, Faculty of Computing, University of Port Harcourt

Ethical Hacking Essentials (E|HE)

Labs w/CTF, Exam Prep, ECC EV w/RPS

Begin your Cybersecurity Journey with Hands-on, Foundational Skills in Ethical Hacking

Self Paced (Discount)

₦197,183

Tutor Led (Discount)

₦297,183

Official Price

₦508,300

EC-Council Ethical Hacking Essentials Certification

Ethical Hacking Essentials is an Introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals. It offers hands-on experience in computer and network security concepts such as threats, vulnerabilities, password cracking, web applications, and more. No IT/Cybersecurity experience required for this course.

Test your skills with CTF-based Capstone Projects and validate these newly acquired skills in proctored exams. With 15 hours of premium learning, 11 labs, and 12 modules, the E|HE provides a solid foundation and formal recognition to boost your resume and open doors for better opportunities.

Key Features
  • 15+ hours of premium self-paced video training
  • 11 lab activities in a simulated lab environment
  • 750+ pages of ecourseware
  • Capstone Projects with Real-World CTF Challenges
  • Gain a year-long access to courseware and 6-month access to labs
  • Proctored exam voucher with one-year validity
  • Gain the globally recognized EC-Council’s certification
  • Enhance your relevancy in the job market

Ethical Hacking Essentials (E|HE) Course Information

Module 01: Information Security Fundamentals
Topics Covered:
  • Information Security Fundamentals
  • Information Security Laws and Regulations
Topics Covered:
  • Cyber Kill Chain Methodology
  • Hacking Concepts and Hacker Classes
  • Different Phases of Hacking Cycle
  • Ethical Hacking Concepts, Scope, and Limitations
  • Ethical Hacking Tools
Lab Exercise:
  • Passive Footprinting to Gather Information About a Target
  • Network Scanning to Identify Live Hosts, Open Ports and Services and Target OS in the Network
  • Enumeration on a System or Network to Extract Usernames, Machine Names, Network Resources, Shares, etc
Topics Covered:
  • Threat and Threat Sources
  • Malware and its Types
  • Malware Countermeasures
  • Vulnerabilities
  • Vulnerability Assessment
Lab Exercise:
  • Vulnerability Assessment to Identify Security Vulnerabilities in the Target System or Network
Topics Covered:
  • Password Cracking Techniques
  • Password Cracking Tools
  • Password Cracking Countermeasures
Lab Exercise:
  • Perform Active Online Attack to Crack the System’s Password
  • Audit System Passwords
Topics Covered:
  • Social Engineering Concepts and its Phases
  • Social Engineering Techniques
  • Insider Threats and Identity Theft
  • Social Engineering Countermeasures
Lab Exercise:
  • Social Engineering using Various Techniques to Sniff Users’ Credentials
  • Detect a Phishing Attack
Topics Covered:
  • Packet Sniffing Concepts
  • Sniffing Techniques
  • Sniffing Countermeasures
  • DoS and DDoS Attacks
  • DoS and DDoS Attack Countermeasures
  • Session Hijacking Attacks
  • Session Hijacking Attack Countermeasures
Lab Exercise:
  • Perform MAC Flooding to Compromise the Security of Network Switches
  • Perform ARP Poisoning to Divert all Communication between Two Machines
  • Detect ARP Attacks using ARP Spoofing Detection Tools to Ensure Data Privacy
  • Perform DoS and DDoS Attacks using Various Techniques on a Target Host to Prevents Access to System Resources for Legitimate Users
  • Detect and Protect Against DDoS Attack
  • Perform Session Hijacking to Seize Control of a Valid TCP Communication Session Between Two Computers
  • Detect Session Hijacking Attempts using Manual Method
Topics Covered:
  • Web Server Attacks
  • Web Server Attack Countermeasures
  • Web Application Architecture and Vulnerability Stack
  • Web Application Threats and Attacks
  • Web Application Attack Countermeasures
  • SQL Injection Attacks
  • SQL Injection Attack Countermeasures
Lab Exercise:
  • Perform a Web Server Attack to Crack FTP Credentials
  • Perform a Web Application Attack to Compromise the Security of Web Applications to Steal Sensitive Information
  • Perform SQL Injection Attacks on a Target Web Application to Manipulate the Backend Database
  • Detect SQL Injection Vulnerabilities using SQL Injection Detection Tools
Topics Covered:
  • Wireless Terminology
  • Wireless Encryption
  • Wireless Network-Specific Attack Techniques
  • Bluetooth Attacks
  • Wireless Attack Countermeasures
Lab Exercise:
  • Perform Wi-Fi Packet Analysis
  • Perform Wireless Attacks to Crack Wireless Encryption
Topics Covered:
  • Mobile Attack Anatomy
  • Mobile Platform Attack Vectors and Vulnerabilities
  • Mobile Device Management (MDM) Concept
  • Mobile Attack Countermeasures
Lab Exercise:
  • Hack an Android Device by Creating Binary Payloads
  • Secure Android Devices using Various Android Security Tools
opics Covered:
  • IoT Concepts
  • IoT Threats and Attacks
  • IoT Attack Countermeasures
  • OT Concepts
  • OT Threats and Attacks
  • OT Attack Countermeasures
Lab Exercise:
  • Perform Footprinting using Various Footprinting Techniques
  • Capture and Analyze IoT Device Traffic
Topics Covered:
  • Cloud Computing Concepts
  • Container Technology
  • Cloud Computing Threats
  • Cloud Attack Countermeasures
Lab Exercise:
  • Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
  • Exploit S3 Buckets
Topics Covered:
  • Fundamentals of Penetration Testing and its Benefits
  • Strategies and Phases of Penetration Testing
  • Guidelines and Recommendations for Penetration Testing

What Skills You’ll Learn

  • Key issues plaguing the information security world and information security laws and standards.
  • Fundamentals of ethical hacking
  • Information security threats and vulnerabilities
  • Different types of malware
  • Different types of password-cracking techniques and countermeasures
  • Social engineering techniques, insider threats, identity theft, and countermeasures
  • Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures
  • Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures
  • Wireless encryption, wireless threats, and countermeasures
  • Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
  • IoT and OT concepts, attacks, and countermeasures
  • Cloud computing technologies, cloud computing threats, attacks, and security techniques
  • Fundamentals of pen testing
Who is it for?
  • High school students, fresh graduates, professionals, career starters and switchers, and IT, technology, or cybersecurity teams with limited or no prior work experience.
  • Professionals who want to get into the cybersecurity field but are unsure where to start their education journey.
  • Anyone who wants to start their cybersecurity career and master the fundamentals of security online.
  • Anyone who wants to prepare for a cybersecurity career and aid their IT education.

Training Details: Self-paced, in-demand lecture videos led by world-class instructors and
hands-on labs.
Pre-requisite: No prior cybersecurity knowledge or IT work experience required.

Exam Details:

  • Exam Code: 112-52
  • Number of Questions: 75
  • Duration: 2 hours
  • Test Format: Multiple Choice

Secure Your Future in Cybersecurity !!!

  • 100% Discount on Training Fees
  • Tutor-Led Training at an Affordable Rate
  • 12-Month Access to Labs & Study Materials
  • Earn Globally Recognized EC-Council Certifications