Select a different country or region to see content specific to your location and make online purchases.
x
GB
/
GBP
Image
Filter Events

EC-Council Ethical Hacking Essentials

WGAC-ECC-EHE

Ec Council Training Courses Certification

Schedule

See all Courses

Description

Information Security Fundamentals

  • Information security fundamentals
  • Information security laws and regulations

Ethical Hacking Fundamentals

  • Cyber Kill Chain methodology
  • Hacking concepts, hacking cycle, and different hacker classes
  • Ethical hacking concepts, scope, and limitations

Information Security Threats and Vulnerabilities

  • Detect various threat sources and vulnerabilities in a network or system
  • Different types of malwares

Password Cracking Techniques and Countermeasures

  • Types of password cracking techniques

Social Engineering Techniques and Countermeasures

  • Social engineering concepts and techniques
  • Insider threats and identity theft concepts

Network-Level Attacks and Countermeasures

  • Packet sniffing concepts and types
  • Sniffing techniques and countermeasures
  • DoS and DDoS attacks under sniffing attacks

Web Application Attacks and Countermeasures

  • Web Server Attacks
  • Web Application Attacks
  • Web Application Architecture and Vulnerability Stack
  • Web Application Threats and Attacks
  • SQL Injection Attacks
  • Types of SQL Injection Attacks

Wireless Attacks and Countermeasures

  • Wireless Terminology
  • Types of Wireless Encryption
  • Wireless Network-specific Attack Techniques
  • Bluetooth Attacks
  • Wireless Attack Countermeasures

Mobile Attacks and Countermeasures

  • Mobile Attack Anatomy
  • Mobile Attack Vectors and Mobile Platform Vulnerabilities

IoT and OT Attacks and Countermeasures

  • IoT Devices, their need and Application Areas
  • IoT Threats and Attacks
  • Understand OT Concepts
  • OT Challenges and Attacks
  • OT Attacks Countermeasures

Cloud Computing Threats and Countermeasures

  • Cloud Computing Concepts
  • Container Technology
  • Cloud Computing Threats
  • Cloud Computing Countermeasures

Penetration Testing Fundamentals

  • Fundamentals of Penetration Testing and its Benefits
  • Various Types and Phases of Penetration Testing
  • Guidelines and Recommendations for Penetration Testing

The description for this course is currently being updated.

EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity. The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.

The description for this course is currently being updated.
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.