Ethical Hacking Essentials

Ethical Hacking Essentials (EHE)

divider

Course Description

Every good cybersecurity journey needs to start with the same philosophy – start with the fundamentals!

The newly minted Ethical Hacking Essentials (EHE) course from EC-Council is an entry-level security program covering important fundamental concepts of information security, ethical hacking, and penetration testing. It equips students with the knowledge on information security threats which impacts the security posture of IT systems and general security controls. This program will provide students essential fundamental knowledge and skills required to kick start their careers in the information security domain as part of the future cybersecurity workforce.

Students will gain essential insight into various information security attack vectors, including password cracking, malware, social engineering, sniffing, web app attacks, SQL injection and learn the basic methodologies in auditing information systems against these threats.

The ECE program prepares learners with important foundational knowledge and skills required to kickstart your career in the world of cybersecurity. This program is a great way for any enthusiast or professional to learn the essentials of ethical hacking from the world leader – EC-Council, the developer of the world’s biggest and most trusted Certified Ethical Hacking (CEH) program and credential.

With the number of cyberthreats escalating, more and more are asking the all-important question,

why is cybersecurity important?

The massive escalation of cyberattacks are causing increasing losses to governments, military, law enforcement, organizations and individuals globally.

Every entity needs to respond to these threats by adopting strict security measures. That can only be a possibility when you have trained cybersecurity professional onboard.

Losses from cybersecurity continues to hit record highs annually. Last year, Cybersecurity Ventures predicted that cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015.

Cybercrime costs include damages resulting from breaches and destruction of critical data stored by organizations, money stolen from online accounts, loss of morale and productivity, loss of competitive advantage, theft of intellectual property, theft of sensitive and confidential personal and financial data, and reputational harm.

Target Audience

  • System Administrators
  • Network Administrators and Engineers
  • Web Developers and Managers
  • Database Administrators
  • IT Technicians
  • Professionals looking for a career transition into information security and ethical hacking

Suggested Duration

  • 2 days (minimum of 16 hours)

Certification

Upon completion of the EHE training, students will receive a Certification of Completion from EC-Council. This certification prepares students for entry to the Certified Ethical Hacker (CEH) program and credential.

Course Outline

Course Outline

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Web Applications Hacking
  • SQL Injection
  • Wireless Networks Hacking

View Our Cyber Range:


Brochure Course Outline REGISTER NOW

What Will You Learn?

Students going through Ethical Hacking Essentials training will learn:

  • Key issues plaguing the information security world, ethical hacking, and information security laws.
  • Various types and phases of penetration testing.
  • How to use different footprinting techniques such as open source information gathering, Whois Lookup, DNS Information gathering, etc. to collect important valuable information about a target organization.
  • Footprinting a target using Path Analyzer Pro and Maltego.
  • Basic network scanning and enumeration techniques and tools.
  • UDP and TCP Packet Crafting Techniques using tools such as HPING3.
  • Network Scanning using Nmap to identify live hosts in a target network, open ports and services on the target hosts.
  • Techniques such as Time-to-Live (TTL) and TCP Window Sizes to identify a target system’s OS using Wireshark.
  • How to perform network enumeration using NetBIOS Enumerator.
  • Various vulnerability assessment types and tools to identify security loopholes.
  • Scanning for network vulnerabilities using the GFI LanGuard and Nikto.
  • System hacking methodology, steganography, and covering tracks.
  • Active online attack and system password auditing using tools such as Responder and L0phtCrack.
  • Exploiting client-side vulnerabilities and establishing a VNC Session.
  • Escalating privileges by exploiting client-side vulnerabilities.
  • Viewing, enabling, and clearing audit policies using Auditpol.
  • Distinct types of malware (trojans, viruses, worms, etc.) and their working.
  • Gaining control over a target machine using trojans such as njRAT.
  • Creating trojans and viruses using different malware kits available in the wild such as ProRat and JPS Virus Maker.
  • Various packet sniffing techniques and tools to discover network vulnerabilities.
  • Sniffing passwords using Wireshark and analyzing a network using the Capsa Network Analyzer.
  • Various social engineering techniques, insider threats, and identify theft.
  • Sniffing credentials using Social Engineering Toolkit (SET).
  • Different types of web application attacks and web application hacking methodology.
  • Exploiting remote command execution vulnerability to compromise a target web server.
  • Exploiting file upload vulnerability at different security levels.
  • SQL injection attacks techniques, hacking methodology, and tools.
  • Performing SQL injection attack against MSSQL to extract databases and WebShell using SQLMAP.
  • Wireless standards, wireless encryption, wireless threats, and wireless hacking tools.
  • Cracking a WEP network with aircrack-ng.

Why EHE Is Important

  • Prepares you with cyber security knowledge, concepts and principles and introduction to important fundamentals
  • Understand complicated technical jargon and begin to unravel the complex maze of cybersecurity challenges
  • It introduces you to basic threats, malware and security methodologies to improve organizational security posture.
  • It enhances your skills as an Information Security Specialist and increases your employability.

RELATED COURSES

about-us-section-divider