EC-Council Ethical Hacking Essentials (EHE)

Price
$1,095.00 USD

Duration
2 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more. EC-Council’s ethical hacking essentials course provides hands-on practical experience to learners, thus giving them the skills necessary for a future in cybersecurity. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.

Course Objectives

  • Key issues plaguing the information security world and information security laws and standards.
  • Fundamentals of ethical hacking
  • Information security threats and vulnerabilities
  • Different types of malware
  • Different types of password-cracking techniques and countermeasures
  • Social engineering techniques, insider threats, identity theft, and countermeasures
  • Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures.
  • Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures
  • Wireless encryption, wireless threats, and countermeasures
  • Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
  • IoT and OT concepts, attacks, and countermeasures
  • Cloud computing technologies, cloud computing threats, attacks, and security techniques
  • Fundamentals of pen testing

Who Should Attend?

  • School students, fresh graduates, Professionals, Career starters and switchers, IT / Technology / Cybersecurity teams with little or no work experience.
  • Anyone who wants to start their cybersecurity career and master the fundamentals of security online.
  • Anyone who wants to prepare for a cybersecurity career and aid their IT education.
  • Professionals who want to get into the cybersecurity field but are unsure where to start their education journey
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with New Horizons, you may use a portion of your agreement to pay for this class.

If you have questions about Learning Credits, please contact your Account Manager.

Corporate Tech Pass: Our Corporate Tech Pass includes unlimited attendance for a single person, in the following Virtual Instructor Led course types: Microsoft Office, Microsoft Technical, CompTIA, Project Management, SharePoint, ITIL, Certified Ethical Hacker, Certified Hacking Forensics Investigator, Java, Professional Development Courses and more. The full list of eligible course titles can be found at https://www.newhorizons.com/eligible.

If you have questions about our Corporate Tech Pass, please contact your Account Manager.

Course Prerequisites

There are no prerequisites for this course.

Agenda

Module 01: Information Security Fundamentals

  • Information Security Fundamentals
  • Information Security Laws and Regulations

Module 02: Ethical Hacking Fundamentals

  • Cyber Kill Chain Methodology
  • Hacking Concepts and Hacker Classes
  • Different Phases of Hacking Cycle
  • Ethical Hacking Concepts, Scope, and Limitations
  • Ethical Hacking Tools

Module 03: Information Security Threats and Vulnerability Assessment

  • Threat and Threat Sources
  • Malware and its Types
  • Malware Countermeasures
  • Vulnerabilities
  • Vulnerability Assessment

Module 04: Password Cracking Techniques and Countermeasures

  • Password Cracking Techniques
  • Password Cracking Tools
  • Password Cracking Countermeasures

Module 05: Social Engineering Techniques and Countermeasures

  • Social Engineering Concepts and its Phases
  • Social Engineering Techniques
  • Insider Threats and Identity Theft
  • Social Engineering Countermeasures

Module 06: Network Level Attacks and Countermeasures

  • Packet Sniffing Concepts
  • Sniffing Techniques
  • Sniffing Countermeasures
  • DoS and DDoS Attacks
  • DoS and DDoS Attack Countermeasures
  • Session Hijacking Attacks
  • Session Hijacking Attack Countermeasures

Module 07: Web Application Attacks and Countermeasures

  • Web Server Attacks
  • Web Server Attack Countermeasures
  • Web Application Architecture and Vulnerability Stack
  • Web Application Threats and Attacks
  • Web Application Attack Countermeasures
  • SQL Injection Attacks
  • SQL Injection Attack Countermeasures

Module 08: Wireless Attacks and Countermeasures

  • Wireless Terminology
  • Wireless Encryption
  • Wireless Network-Specific Attack Techniques
  • Bluetooth Attacks
  • Wireless Attack Countermeasures

Module 09: Mobile Attacks and Countermeasures

  • Mobile Attack Anatomy
  • Mobile Platform Attack Vectors and Vulnerabilities
  • Mobile Device Management (MDM) Concept
  • Mobile Attack Countermeasures

Module 10: IoT and OT Attacks and Countermeasures

  • IoT Concepts
  • IoT Threats and Attacks
  • IoT Attack Countermeasures
  • OT Concepts
  • OT Threats and Attacks
  • OT Attack Countermeasures

Module 11: Cloud Computing Threats and Countermeasures

  • Cloud Computing Concepts
  • Container Technology
  • Cloud Computing Threats
  • Cloud Attack Countermeasures

Module 12: Penetration Testing Fundamentals

  • Fundamentals of Penetration Testing and its Benefits
  • Strategies and Phases of Penetration Testing
  • Guidelines and Recommendations for Penetration Testing
 

Get in touch to schedule training for your team
We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.

 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
 
Contact Us about Starting Your Business Training Strategy with New Horizons