Course Overview

Ethical Hacking Essentials

Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more.

EC-Council’s ethical hacking essentials course provides hands-on practical experience to learners, thus giving them the skills necessary for a future in cybersecurity. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.

Learning Outcomes

Key issues plaguing the information security world and information security laws and standards.

Understand major cybersecurity challenges, regulatory frameworks, compliance standards, and legal requirements governing information security.

Information security threats and vulnerabilities

Identify and analyze various cybersecurity threats, vulnerabilities, and attack vectors that can compromise information security systems.

Different types of malware

Learn about various malware types including viruses, worms, trojans, ransomware, and spyware, along with their characteristics and propagation methods.

Different types of password-cracking techniques and countermeasures

Master password attack methods including brute force, dictionary attacks, rainbow tables, and implement strong password policies and multi-factor authentication.

Social engineering techniques, insider threats, identity theft, and countermeasures

Understand social engineering attacks, insider threat vectors, identity theft methods, and develop awareness training and security controls to mitigate these risks.

Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures.

Learn network-based attacks including packet sniffing, DDoS attacks, and session hijacking, and implement network security controls to defend against these threats.

Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures

Understand web application vulnerabilities including SQL injection, XSS, CSRF, and server attacks, and implement secure coding practices and application security controls.

Wireless encryption, wireless threats, and countermeasures

Master wireless security protocols, identify wireless attack vectors like rogue access points and eavesdropping, and implement wireless security controls.

Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools

Understand mobile security threats, implement mobile device management (MDM) solutions, and apply mobile security best practices and protection tools.

IoT and OT concepts, attacks, and countermeasures

Learn Internet of Things and Operational Technology security challenges, attack vectors, and implement security controls for connected and industrial systems.

Cloud computing technologies, cloud computing threats, attacks, and security technique

Understand cloud computing models, identify cloud-specific threats and attacks, and implement cloud security controls and best practices.

Fundamentals of pen testing

Learn penetration testing methodologies, ethical hacking principles, vulnerability assessment techniques, and legal considerations for security testing.

Exam Information

Exam Title : Ethical Hacking Essentials (EHE)
Exam Code : 112-52
Duration : 2 Hours
Number of Questions : 75
Test Format : Multiple Choice

Course Content & Modules

Information Security Fundamental

Module 01

Learn fundamental information security concepts, principles, and frameworks essential for understanding cybersecurity foundations.

Ethical Hacking Fundamentals

Module 02

Understand ethical hacking principles, legal frameworks, penetration testing methodologies, and responsible disclosure practices.

Information Security Threats and Vulnerability Assessment

Module 03

Identify and assess various cybersecurity threats, vulnerabilities, and attack vectors that can compromise information systems.

Password Cracking Techniques and Countermeasures

Module 04

Master password attack techniques including brute force, dictionary attacks, and rainbow tables, while implementing strong authentication defenses.

Social Engineering Techniques and Countermeasures

Module 05

Learn social engineering attack methods, psychological manipulation techniques, and develop awareness training to defend against human-based attacks.

Network Level Attacks and Countermeasures

Module 06

Understand network-based attacks including sniffing, DoS, and session hijacking, and implement network security controls and monitoring.

Web Application Attacks and Countermeasures

Module 07

Learn web application vulnerabilities including SQL injection, XSS, CSRF, and implement secure coding practices and application security controls.

Wireless Attacks and Countermeasures

Module 08

Master wireless security protocols, identify wireless attack vectors like rogue access points, and implement wireless security controls.

Mobile Attacks and Countermeasures

Module 09

Understand mobile security threats, implement mobile device management (MDM) solutions, and apply mobile security best practices.

IoT and OT Attacks and Countermeasures

Module 10

Learn Internet of Things and Operational Technology security challenges, attack vectors, and implement security controls for connected systems.

Cloud Computing Threats and Countermeasures

Module 11

Understand cloud computing models, identify cloud-specific threats and attacks, and implement cloud security controls and best practices.

Penetration Testing Fundamentals

Module 12

Learn penetration testing methodologies, ethical hacking principles, vulnerability assessment techniques, and legal considerations for security testing.

Course Information

Duration
5 Days
Level
Beginner
Certification
EC-Council
Language
English & Malay
Format
Online & Physical

Ready to Start?

Certification

Earn Your Industry-Recognized Certificate

Upon successfully passing the examination for this course, participants will be awarded a certificate, an example of which is shown below.

Globally recognized EC-Council certification
Validates ethical hacking expertise
Enhances career opportunities in cybersecurity
Cybersecurity Certificate
Certified Professional
TEC Logo
Go Back Top