EC-Council Ethical Hacking Essentials (EHE)
- Module 01: Introduction to Information Security
– Understanding Information Security Fundamentals
– Overview of Information Security Laws and Regulations
Module 02: Ethical Hacking Basics
– Exploring the Cyber Kill Chain Methodology
– Understanding Hacking Concepts and Hacker Classes
– Exploring Ethical Hacking Concepts, Scope, and Limitations
– Introduction to Ethical Hacking Tools
Module 03: Identifying Security Threats and Vulnerabilities
– Understanding Threat Sources and Types
– Exploring Malware and Countermeasures
– Introduction to Vulnerabilities and Vulnerability Assessment
Module 04: Password Security
– Overview of Password Cracking Techniques
– Introduction to Password Cracking Tools
– Implementing Password Cracking Countermeasures
Module 05: Social Engineering Awareness
– Understanding Social Engineering Concepts and Phases
– Exploring Social Engineering Techniques
– Identifying Insider Threats and Identity Theft
– Implementing Social Engineering Countermeasures
Module 06: Network Security
– Understanding Packet Sniffing Concepts and Techniques
– Implementing Packet Sniffing Countermeasures
– Exploring DoS and DDoS Attacks and Countermeasures
– Understanding Session Hijacking Attacks and Countermeasures
Module 07: Web Application Security
– Identifying Web Server Attacks and Countermeasures
– Understanding Web Application Architecture and Vulnerabilities
– Exploring Web Application Threats and Attack Countermeasures
– Introduction to SQL Injection Attacks and Countermeasures
Module 08: Wireless Security
– Overview of Wireless Terminology and Encryption
– Understanding Wireless Network-Specific Attack Techniques
– Exploring Bluetooth Attacks and Wireless Attack Countermeasures
Module 09: Mobile Device Security
– Understanding Mobile Attack Anatomy and Vectors
– Identifying Mobile Platform Vulnerabilities
– Exploring Mobile Device Management (MDM) Concept
– Implementing Mobile Attack Countermeasures
Module 10: IoT and OT Security
– Understanding IoT Concepts, Threats, and Attack Countermeasures
– Exploring OT Concepts, Threats, and Attack Countermeasures
Module 11: Cloud Computing Security
– Exploring Cloud Computing Concepts and Threats
– Understanding Container Technology and Cloud Attack Countermeasures
Module 12: Introduction to Penetration Testing
– Understanding the Fundamentals and Benefits of Penetration Testing
– Exploring Strategies and Phases of Penetration Testing
– Guidelines and Recommendations for Penetration Testing
Incident Handling Training