Course Highlights
  • Fundamentals of information security and ethical hacking
  • Information security threats and vulnerabilities, types of malwares, and vulnerability assessments
  • Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures
  • Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures
Curriculum

17 Topics
Course Introduction
Introduction
Understanding the Need for Security
Understanding the Elements of Information Security
Understanding the Security Functionality and Usability Triangle
Understanding Motives Goals and Objectives of Information Security Attacks
Overview of Classification of Attacks
Overview of Information Security Attack Vectors
Overview of Various Information Security Laws and Regulations
Information Security Fundamentals
Understanding the Need for Security
Understanding the Elements of Information Security
Understanding the Security Functionality and Usability Triangle
Understanding Motives Goals and Objectives of Information Security Attacks
Overview of Classification of Attacks
Overview of Information Security Attack Vectors
Overview of Various Information Security Laws and Regulations

16 Topics
Introduction
Understanding the Cyber Kill Chain Methodology
Understanding Tactics Techniques and Procedures (TTPs)
Overview of Indicators of Compromise (IoCs)
Overview of Hacking Concepts and Hacker Classes
Understanding Different Phases of Hacking Cycle
Understanding Ethical Hacking Concepts and Its Scope
Overview of Ethical Hacking Tools
Ethical Hacking Fundamentals
Understanding the Cyber Kill Chain Methodology
Understanding Tactics Techniques and Procedures (TTPs)
Overview of Indicators of Compromise (IoCs)
Overview of Hacking Concepts and Hacker Classes
Understanding Different Phases of Hacking Cycle
Understanding Ethical Hacking Concepts and Its Scope
Overview of Ethical Hacking Tools

14 Topics
Introduction
Understanding the Threat and Threat Sources
Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web
Overview of Different Types of Malware and Malware Countermeasures
Understanding Vulnerability and Vulnerability Classification
Understanding Vulnerability Assessment and Vulnerability Management Life Cycle
Understanding Vulnerability Assessment Tools and Vulnerability Exploitation
Information Security Threats and Vulnerability Assessment
Understanding the Threat and Threat Sources
Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web
Overview of Different Types of Malware and Malware Countermeasures
Understanding Vulnerability and Vulnerability Classification
Understanding Vulnerability Assessment and Vulnerability Management Life Cycle
Understanding Vulnerability Assessment Tools and Vulnerability Exploitation

12 Topics
Introduction
Understanding the Password Cracking and Password Complexity
Understanding Microsoft Authentication
Understanding Various Types of Password Attacks
Video 4.5: Overview of Password Cracking Tools
Video 4.6: Understanding Countermeasures against Password Attacks
Module 04 - Quiz
Understanding the Password Cracking and Password Complexity
Understanding Microsoft Authentication
Video 4.4: Quiz
Video 4.5: Quiz
Video 4.6: Quiz

12 Topics
Video 5.1: Introduction
Video 5.2: Understanding Social Engineering Concepts
Video 5.3: Understanding Various Social Engineering Techniques
Video 5.4: Understanding Insider Threats
Video 5.5: Understanding Identity Theft
Video 5.6: Understanding Different Social Engineering Insider Threats and Identity Theft Countermeasures
Module 05 - Quiz
Video 5.2: Quiz
Video 5.3: Quiz
Video 5.4: Quiz
Video 5.5: Quiz
Video 5.6: Quiz

18 Topics
Video 6.1: Introduction
Video 6.2: Understanding Packet Sniffing and Types of Sniffing
Video 6.3: Understanding Various Sniffing Techniques and Tools
Video 6.4: Understanding Different Sniffing Countermeasures
Video 6.5: Overview of Different Types of DoS and DDoS Attacks
Video 6.6: Understanding Different DoS/DDoS Attack Tools
Video 6.7: Understanding Different DoS/DDoS Attack Countermeasures and Protection Tools
Video 6.8: Overview of Session Hijacking and Types of Session Hijacking
Video 6.9: Understanding Different Session Hijacking Tools and Countermeasures
Module 06 - Quiz
Video 6.2: Quiz
Video 6.3: Quiz
Video 6.4: Quiz
Video 6.5: Quiz
Video 6.6: Quiz
Video 6.7: Quiz
Video 6.8: Quiz
Video 6.9: Quiz

18 Topics
Video 7.1: Introduction
Video 7.2: Understanding Web Server Concepts and Attacks
Video 7.3: Understanding Different Web Server Attack Tools and Countermeasures
Video 7.4: Overview of Web Application Architecture and Vulnerability Stack
Video 7.5: Understanding Different Web Application Threats and Attacks
Video 7.6: Understanding Different Web Application Attack Tools and Countermeasures
Video 7.7: Overview of Different Types of SQL Injection Attacks
Video 7.8: Understanding Different SQL Injection Tools
Video 7.9: Understanding Different SQL Injection Attack Countermeasures
Module 07 - Quiz
Video 7.2: Quiz
Video 7.3: Quiz
Video 7.4: Quiz
Video 7.5: Quiz
Video 7.6: Quiz
Video 7.7: Quiz
Video 7.8: Quiz
Video 7.9: Quiz

16 Topics
Video 8.1: Introduction
Video 8.2: Overview of Wireless Terminology
Video 8.3: Overview of Wireless Encryption Algorithms
Video 8.4: Understanding Wireless Network-Specific Attack Techniques
Video 8.5: Overview of Different Wireless Attack Tools
Video 8.6: Understanding Bluetooth Attack Techniques
Video 8.7: Overview of Various Wireless Attack Countermeasures
Video 8.8: Overview of Different Wireless Security Tools
Module 08 - Quiz
Video 8.2: Quiz
Video 8.3: Quiz
Video 8.4: Quiz
Video 8.5: Quiz
Video 8.6: Quiz
Video 8.7: Quiz
Video 8.8: Quiz

12 Topics
Video 9.1: Introduction
Video 9.2: Understanding Anatomy of a Mobile Attack
Video 9.3: Understanding Mobile Platform Attack Vectors
Video 9.4:Understanding Mobile Platform Vulnerabilities
Video 9.5: Understanding Mobile Device Management
Video 9.6: Overview of Mobile Security Guidelines and Security Tools
Module 09 - Quiz
Video 9.2: Quiz
Video 9.3: Quiz
Video 9.4: Quiz
Video 9.5: Quiz
Video 9.6: Quiz

14 Topics
Video 10.1: Introduction
Video 10.2: Understanding IoT Concepts
Video 10.3: Understanding IoT attacks and IoT attack Tools
Video 10.4: Overview of IoT Attack Countermeasures and Security Tools
Video 10.5: Understanding OT Concepts
Video 10.6: Understanding OT Attacks and OT Attack Tools
Video 10.7: Overview of OT Attack Countermeasures and Security Tools
Module 10 - Quiz
Video 10.2: Quiz
Video 10.3: Quiz
Video 10.4: Quiz
Video 10.5: Quiz
Video 10.6: Quiz
Video 10.7: Quiz

14 Topics
Video 10.1: Introduction
Video 10.2: Understanding IoT Concepts
Video 10.3: Understanding IoT attacks and IoT attack Tools
Video 10.4: Overview of IoT Attack Countermeasures and Security Tools
Video 10.5: Understanding OT Concepts
Video 10.6: Understanding OT Attacks and OT Attack Tools
Video 10.7: Overview of OT Attack Countermeasures and Security Tools
Module 10 - Quiz
Video 10.2: Quiz
Video 10.3: Quiz
Video 10.4: Quiz
Video 10.5: Quiz
Video 10.6: Quiz
Video 10.7: Quiz

14 Topics
Video 12.1: Introduction
Video 12.2: Understanding Penetration Testing and its Benefits
Video 12.3: Understanding Types of Penetration Testing
Video 12.4: Understanding Phases of Penetration Testing
Video 12.5: Overview of Penetration Testing Methodologies
Video 12.6: Overview of Guidelines and Recommendations for Penetration Testing
Video 12.7: Understanding Risks Associated with Penetration Testing
Module 12 - Quiz
Video 12.2: Quiz
Video 12.3: Quiz
Video 12.4: Quiz
Video 12.5: Quiz
Video 12.6: Quiz
Video 12.7: Quiz

  Write a Review

Ethical Hacking Essentials (EHE)

Go to Free Course