- Level Foundation
- المدة 32 ساعات hours
- الطبع بواسطة EC-Council
-
Offered by
عن
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more. This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity. EHE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.الوحدات
Course Introduction
1
Videos
- Course Introduction
Module Introduction
1
Videos
- Introduction
Understanding the Need for Security
1
Assignment
- Understanding the Need for Security
1
Videos
- Understanding the Need for Security
Understanding the Elements of Information Security
1
Assignment
- Understanding the Elements of Information Security
1
Videos
- Understanding the Elements of Information Security
Understanding the Security, Functionality, and Usability Triangle
1
Assignment
- Understanding the Security, Functionality, and Usability Triangle
1
Videos
- Understanding the Security, Functionality, and Usability Triangle
Understanding Motives, Goals, and Objectives of Information Security Attacks
1
Assignment
- Understanding Motives, Goals, and Objectives of Information Security Attacks
1
Videos
- Understanding Motives, Goals, and Objectives of Information Security Attacks
Overview of Classification of Attacks
1
Assignment
- Overview of Classification of Attacks
1
Videos
- Overview of Classification of Attacks
Overview of Information Security Attack Vectors
1
Assignment
- Overview of Information Security Attack Vectors
1
Videos
- Overview of Information Security Attack Vectors
Overview of Various Information Security Laws and Regulations
2
Assignment
- Overview of Various Information Security Laws and Regulations
- Information Security Fundamentals
1
Videos
- Overview of Various Information Security Laws and Regulations
Module Introduction
1
Videos
- Introduction
Understanding the Cyber Kill Chain Methodology
1
Assignment
- Understanding the Cyber Kill Chain Methodology
1
Videos
- Understanding the Cyber Kill Chain Methodology
Understanding Tactics, Techniques, and Procedures (TTPs)
1
Assignment
- Understanding Tactics, Techniques, and Procedures (TTPs)
1
Videos
- Understanding Tactics, Techniques, and Procedures (TTPs)
Overview of Indicators of Compromise (IoCs)
1
Assignment
- Overview of Indicators of Compromise (IoCs)
1
Videos
- Overview of Indicators of Compromise (IoCs)
Overview of Hacking Concepts and Hacker Classes
1
Assignment
- Overview of Hacking Concepts and Hacker Classes
1
Videos
- Overview of Hacking Concepts and Hacker Classes
Understanding Different Phases of Hacking Cycle
1
Assignment
- Understanding Different Phases of Hacking Cycle
1
Videos
- Understanding Different Phases of Hacking Cycle
Understanding Ethical Hacking Concepts and Its Scope
1
Assignment
- Understanding Ethical Hacking Concepts and Its Scope
1
Videos
- Understanding Ethical Hacking Concepts and Its Scope
Overview of Ethical Hacking Tools
2
Assignment
- Overview of Ethical Hacking Tools
- Ethical Hacking Fundamentals
1
Videos
- Overview of Ethical Hacking Tools
Module Introduction
1
Videos
- Introduction
Understanding the Threat and Threat Sources
1
Assignment
- Understanding the Threat and Threat Sources
1
Videos
- Understanding the Threat and Threat Sources
Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web
1
Assignment
- Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web
1
Videos
- Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web
Overview of Different Types of Malware and Malware Countermeasures
1
Assignment
- Overview of Different Types of Malware and Malware Countermeasures
1
Videos
- Overview of Different Types of Malware and Malware Countermeasures
Understanding Vulnerability and Vulnerability Classification
1
Assignment
- Understanding Vulnerability and Vulnerability Classification
1
Videos
- Understanding Vulnerability and Vulnerability Classification
Understanding Vulnerability Assessment and Vulnerability Management Life Cycle
1
Assignment
- Understanding Vulnerability Assessment and Vulnerability Management Life Cycle
1
Videos
- Understanding Vulnerability Assessment and Vulnerability Management Life Cycle
Understanding Vulnerability Assessment Tools and Vulnerability Exploitation
2
Assignment
- Understanding Vulnerability Assessment Tools and Vulnerability Exploitation
- Information Security Threats and Vulnerability Assessment
1
Videos
- Understanding Vulnerability Assessment Tools and Vulnerability Exploitation
Module Introduction
1
Videos
- Introduction
Understanding the Password Cracking and Password Complexity
1
Assignment
- Understanding the Password Cracking and Password Complexity
1
Videos
- Understanding the Password Cracking and Password Complexity
Understanding Microsoft Authentication
1
Assignment
- Understanding Microsoft Authentication
1
Videos
- Understanding Microsoft Authentication
Understanding Various Types of Password Attacks
1
Assignment
- Video 4.4: Quiz
1
Videos
- Understanding Various Types of Password Attacks
Overview of Password Cracking Tools
1
Assignment
- Video 4.5: Quiz
1
Videos
- Video 4.5: Overview of Password Cracking Tools
Understanding Countermeasures against Password Attacks
2
Assignment
- Video 4.6: Quiz
- Module 04 - Quiz
1
Videos
- Video 4.6: Understanding Countermeasures against Password Attacks
Module Introduction
1
Videos
- Video 5.1: Introduction
Understanding Social Engineering Concepts
1
Assignment
- Video 5.2: Quiz
1
Videos
- Video 5.2: Understanding Social Engineering Concepts
Understanding Various Social Engineering Techniques
1
Assignment
- Video 5.3: Quiz
1
Videos
- Video 5.3: Understanding Various Social Engineering Techniques
Understanding Insider Threats
1
Assignment
- Video 5.4: Quiz
1
Videos
- Video 5.4: Understanding Insider Threats
Understanding Identity Theft
1
Assignment
- Video 5.5: Quiz
1
Videos
- Video 5.5: Understanding Identity Theft
Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures
2
Assignment
- Video 5.6: Quiz
- Module 05 - Quiz
1
Videos
- Video 5.6: Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures
Module Introduction
1
Videos
- Video 6.1: Introduction
Understanding Packet Sniffing and Types of Sniffing
1
Assignment
- Video 6.2: Quiz
1
Videos
- Video 6.2: Understanding Packet Sniffing and Types of Sniffing
Understanding Various Sniffing Techniques and Tools
1
Assignment
- Video 6.3: Quiz
1
Videos
- Video 6.3: Understanding Various Sniffing Techniques and Tools
Understanding Different Sniffing Countermeasures
1
Assignment
- Video 6.4: Quiz
1
Videos
- Video 6.4: Understanding Different Sniffing Countermeasures
Overview of Different Types of DoS and DDoS Attacks
1
Assignment
- Video 6.5: Quiz
1
Videos
- Video 6.5: Overview of Different Types of DoS and DDoS Attacks
Understanding Different DoS/DDoS Attack Tools
1
Assignment
- Video 6.6: Quiz
1
Videos
- Video 6.6: Understanding Different DoS/DDoS Attack Tools
Understanding Different DoS/DDoS Attack Countermeasures and Protection Tools
1
Assignment
- Video 6.7: Quiz
1
Videos
- Video 6.7: Understanding Different DoS/DDoS Attack Countermeasures and Protection Tools
Overview of Session Hijacking and Types of Session Hijacking
1
Assignment
- Video 6.8: Quiz
1
Videos
- Video 6.8: Overview of Session Hijacking and Types of Session Hijacking
Understanding Different Session Hijacking Tools and Countermeasures
2
Assignment
- Video 6.9: Quiz
- Module 06 - Quiz
1
Videos
- Video 6.9: Understanding Different Session Hijacking Tools and Countermeasures
Module Introduction
1
Videos
- Video 7.1: Introduction
Understanding Web Server Concepts and Attacks
1
Assignment
- Video 7.2: Quiz
1
Videos
- Video 7.2: Understanding Web Server Concepts and Attacks
Understanding Different Web Server Attack Tools and Countermeasures
1
Assignment
- Video 7.3: Quiz
1
Videos
- Video 7.3: Understanding Different Web Server Attack Tools and Countermeasures
Overview of Web Application Architecture and Vulnerability Stack
1
Assignment
- Video 7.4: Quiz
1
Videos
- Video 7.4: Overview of Web Application Architecture and Vulnerability Stack
Understanding Different Web Application Threats and Attacks
1
Assignment
- Video 7.5: Quiz
1
Videos
- Video 7.5: Understanding Different Web Application Threats and Attacks
Understanding Different Web Application Attack Tools and Countermeasures
1
Assignment
- Video 7.6: Quiz
1
Videos
- Video 7.6: Understanding Different Web Application Attack Tools and Countermeasures
Overview of Different Types of SQL Injection Attacks
1
Assignment
- Video 7.7: Quiz
1
Videos
- Video 7.7: Overview of Different Types of SQL Injection Attacks
Understanding Different SQL Injection Tools
1
Assignment
- Video 7.8: Quiz
1
Videos
- Video 7.8: Understanding Different SQL Injection Tools
Understanding Different SQL Injection Attack Countermeasures
2
Assignment
- Video 7.9: Quiz
- Module 07 - Quiz
1
Videos
- Video 7.9: Understanding Different SQL Injection Attack Countermeasures
Module Introduction
1
Videos
- Video 8.1: Introduction
Overview of Wireless Terminology
1
Assignment
- Video 8.2: Quiz
1
Videos
- Video 8.2: Overview of Wireless Terminology
Overview of Wireless Encryption Algorithms
1
Assignment
- Video 8.3: Quiz
1
Videos
- Video 8.3: Overview of Wireless Encryption Algorithms
Understanding Wireless Network-Specific Attack Techniques
1
Assignment
- Video 8.4: Quiz
1
Videos
- Video 8.4: Understanding Wireless Network-Specific Attack Techniques
Overview of Different Wireless Attack Tools
1
Assignment
- Video 8.5: Quiz
1
Videos
- Video 8.5: Overview of Different Wireless Attack Tools
Understanding Bluetooth Attack Techniques
1
Assignment
- Video 8.6: Quiz
1
Videos
- Video 8.6: Understanding Bluetooth Attack Techniques
Overview of Various Wireless Attack Countermeasures
1
Assignment
- Video 8.7: Quiz
1
Videos
- Video 8.7: Overview of Various Wireless Attack Countermeasures
Overview of Different Wireless Security Tools
2
Assignment
- Video 8.8: Quiz
- Module 08 - Quiz
1
Videos
- Video 8.8: Overview of Different Wireless Security Tools
Module Introduction
1
Videos
- Video 9.1: Introduction
Understanding Anatomy of a Mobile Attack
1
Assignment
- Video 9.2: Quiz
1
Videos
- Video 9.2: Understanding Anatomy of a Mobile Attack
Understanding Mobile Platform Attack Vectors
1
Assignment
- Video 9.3: Quiz
1
Videos
- Video 9.3: Understanding Mobile Platform Attack Vectors
Understanding Mobile Platform Vulnerabilities
1
Assignment
- Video 9.4: Quiz
1
Videos
- Video 9.4:Understanding Mobile Platform Vulnerabilities
Understanding Mobile Device Management
1
Assignment
- Video 9.5: Quiz
1
Videos
- Video 9.5: Understanding Mobile Device Management
Overview of Mobile Security Guidelines and Security Tools
2
Assignment
- Video 9.6: Quiz
- Module 09 - Quiz
1
Videos
- Video 9.6: Overview of Mobile Security Guidelines and Security Tools
Module Introduction
1
Videos
- Video 10.1: Introduction
Understanding IoT Concepts
1
Assignment
- Video 10.2: Quiz
1
Videos
- Video 10.2: Understanding IoT Concepts
Understanding IoT attacks and IoT attack Tools
1
Assignment
- Video 10.3: Quiz
1
Videos
- Video 10.3: Understanding IoT attacks and IoT attack Tools
Overview of IoT Attack Countermeasures and Security Tools
1
Assignment
- Video 10.4: Quiz
1
Videos
- Video 10.4: Overview of IoT Attack Countermeasures and Security Tools
Understanding OT Concepts
1
Assignment
- Video 10.5: Quiz
1
Videos
- Video 10.5: Understanding OT Concepts
Understanding OT Attacks and OT Attack Tools
1
Assignment
- Video 10.6: Quiz
1
Videos
- Video 10.6: Understanding OT Attacks and OT Attack Tools
Overview of OT Attack Countermeasures and Security Tools
2
Assignment
- Video 10.7: Quiz
- Module 10 - Quiz
1
Videos
- Video 10.7: Overview of OT Attack Countermeasures and Security Tools
Module Introduction
1
Videos
- Video 11.1: Introduction
Understanding Cloud Computing Concepts
1
Assignment
- Video 11.2: Quiz
1
Videos
- Video 11.2: Understanding Cloud Computing Concepts
Overview of Container Technology
1
Assignment
- Video 11.3: Quiz
1
Videos
- Video 11.3: Overview of Container Technology
Understanding Cloud Computing Threats
1
Assignment
- Video 11.4: Quiz
1
Videos
- Video 11.4: Understanding Cloud Computing Threats
Overview of Cloud Attacks and Tools
1
Assignment
- Video 11.5: Quiz
1
Videos
- Video 11.5: Overview of Cloud Attacks and Tools
Understanding Cloud Attack Countermeasures
1
Assignment
- Video 11.6: Quiz
1
Videos
- Video 11.6: Understanding Cloud Attack Countermeasures
Overview of Various Cloud Computing Security Tools
2
Assignment
- Video 11.7: Quiz
- Module 11 - Quiz
1
Videos
- Video 11.7: Overview of Various Cloud Computing Security Tools
Module Introduction
1
Videos
- Video 12.1: Introduction
Understanding Penetration Testing and its Benefits
1
Assignment
- Video 12.2: Quiz
1
Videos
- Video 12.2: Understanding Penetration Testing and its Benefits
Understanding Types of Penetration Testing
1
Assignment
- Video 12.3: Quiz
1
Videos
- Video 12.3: Understanding Types of Penetration Testing
Understanding Phases of Penetration Testing
1
Assignment
- Video 12.4: Quiz
1
Videos
- Video 12.4: Understanding Phases of Penetration Testing
Overview of Penetration Testing Methodologies
1
Assignment
- Video 12.5: Quiz
1
Videos
- Video 12.5: Overview of Penetration Testing Methodologies
Overview of Guidelines and Recommendations for Penetration Testing
1
Assignment
- Video 12.6: Quiz
1
Videos
- Video 12.6: Overview of Guidelines and Recommendations for Penetration Testing
Understanding Risks Associated with Penetration Testing
2
Assignment
- Video 12.7: Quiz
- Module 12 - Quiz
1
Videos
- Video 12.7: Understanding Risks Associated with Penetration Testing
Auto Summary
Embark on your cybersecurity journey with "Ethical Hacking Essentials (EHE)," a foundational course in IT & Computer Science offered by Coursera. This introductory program dives into the core aspects of ethical hacking and penetration testing, equipping you with the skills necessary for a thriving career in cybersecurity. Throughout the course, you will explore crucial topics such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, and pentesting fundamentals. Gain hands-on practical experience and develop a robust understanding of computer and network security concepts. Completing this course will earn you the EHE certification, a valuable credential that enhances your resume and showcases your expertise to potential employers, paving the way for career advancement, higher salaries, and job satisfaction. With a duration of 1920 minutes, this course offers flexible subscription options, including Starter and Professional plans, catering to different learning needs. Whether you're a beginner looking to break into cybersecurity or an IT professional aiming to expand your knowledge, Ethical Hacking Essentials is designed to set you on the path to success.

EC-Council