Ir al contenido principalSkip to Xpert Chatbot

EC-Council: Ethical Hacking Essentials (EHE)

4.6 stars
50 ratings

Ethical Hacking Essentials (EHE) is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in ethical hacking with add-on labs for hands-on experience.

Ethical Hacking Essentials (EHE)
1 semanas
16–24 horas por semana
A tu ritmo
Avanza a tu ritmo
Gratis
Verificación opcional disponible

Hay una sesión disponible:

¡Ya se inscribieron 19,568! Una vez finalizada la sesión del curso, será archivadoAbre en una pestaña nueva.
Comienza el 15 nov

Sobre este curso

Omitir Sobre este curso

Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect the confidentiality, integrity, and availability of digital information.

Information security plays a vital role in all organizations. It is a state of affairs where information, information processing, and communication are protected against confidentiality, integrity, and availability of the information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.

Ethical Hacking Essentials (EHE) is a security program covering the fundamental concepts of information security and ethical hacking. It equips students with the skills required to identify the increasing information security threats which reflect on the security posture of the organization and implement general security controls.

This program gives a holistic overview of the key components of information security. It provides a solid fundamental knowledge required for a career in information security.

Why is EHE Important?

  • It facilitates your entry into the world of information security
  • It provides a professional understanding of the concepts of information security
  • It provides best practices to improve organizational security posture
  • It enhances your skills as a Security Specialist and increases your employability

De un vistazo

  • Institution EC-Council
  • Subject Informática
  • Level Intermediate
  • Prerequisites

    This program is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.

Lo que aprenderás

Omitir Lo que aprenderás

Students going through EHE training will learn:

§ Key issues plaguing the information security world and information security laws and standards

§ Fundamentals of ethical hacking

§ Information security threats and vulnerabilities

§ Different types of malware

§ Different types of password-cracking techniques and countermeasures

§ Social engineering techniques, insider threats, identity theft, and countermeasures

§ Network-level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures

§ Application level attacks (webserver attacks, web application attacks, and SQL injection) and countermeasures

§ Wireless encryption, wireless threats, and countermeasures

§ Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools

§ IoT and OT concepts, attacks, and countermeasures

§ Cloud computing technologies, cloud computing threats, attacks, and security techniques

§ Fundamentals of pen testing

Plan de estudios

Omitir Plan de estudios

Module 01: Information Security Fundamentals

This module provides an insight into the different elements of information security.

Module 02: Ethical Hacking Fundamentals

This module provides an insight into cyber kill chain methodology, hacking concepts, and hacker classes.

Module 03: Information Security Threats and Vulnerability Assessment

This module provides an insight into cyber security threats and vulnerability assessment.

Module 04: Password Cracking Techniques and Countermeasures

This module provides an in-depth understanding of password cracking techniques and the corresponding defensive measures that can help individuals and organizations create strong password policies and protect personal or corporate information.

Module 05: Social Engineering Techniques and Countermeasures

This module provides an insight into human-based, computer-based, and mobile-based social engineering techniques.

Module 06: Network Level Attacks and Countermeasures

This module provides insight into various network-level attacks, such as sniffing, DoS attacks, session hijacking, etc. This module also familiarizes students with various network security countermeasures.

Module 07: Web Application Attacks and Countermeasures

This module familiarizes students with web-server attacks and countermeasures. This module also familiarizes students with various web-application threats, attacks, and countermeasures.

Module 08: Wireless Attacks and Countermeasures

This module describes wireless networks, wireless network standards, wireless encryption algorithms, wireless-network attack techniques, and countermeasures to protect wireless networks.

Module 09: Mobile Attacks and Countermeasures

This module explains the potential threats to mobile platforms and provides guidelines for using mobile devices securely.

Module 10: IoT and OT Attacks and Countermeasures

The main objective of this module is to explain the potential threats to IoT and OT platforms and to provide guidelines for securing IoT devices and OT infrastructure.

Module 11: Cloud Computing Threats and Countermeasures

This module provides insight into cloud computing concepts, container technology, cloud computing threats, and cloud computing security to meet the security requirements.

Module 12: Penetration Testing Fundamentals

This module discusses the importance of penetration testing in an organization and explains the crucial role that a tester plays in identifying vulnerabilities.

¿Quién puede hacer este curso?

Lamentablemente, las personas residentes en uno o más de los siguientes países o regiones no podrán registrarse para este curso: Irán, Cuba y la región de Crimea en Ucrania. Si bien edX consiguió licencias de la Oficina de Control de Activos Extranjeros de los EE. UU. (U.S. Office of Foreign Assets Control, OFAC) para ofrecer nuestros cursos a personas en estos países y regiones, las licencias que hemos recibido no son lo suficientemente amplias como para permitirnos dictar este curso en todas las ubicaciones. edX lamenta profundamente que las sanciones estadounidenses impidan que ofrezcamos todos nuestros cursos a cualquier persona, sin importar dónde viva.

Este curso es parte del programa Cybersecurity Essentials Professional Certificate

Más información 
Instrucción por expertos
3 cursos de capacitación
A tu ritmo
Avanza a tu ritmo
1 mes
16 - 24 horas semanales

¿Te interesa este curso para tu negocio o equipo?

Capacita a tus empleados en los temas más solicitados con edX para Negocios.