EC-Council - Ethical Hacking Essentials (EHE)
- Offered byCoursera
Ethical Hacking Essentials (EHE) at Coursera Overview
Duration | 32 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Ethical Hacking Essentials (EHE) at Coursera Highlights
- Earn a Certificate upon completion
Ethical Hacking Essentials (EHE) at Coursera Course details
- Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity
- This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more
- This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity
- This improves their prospects for employment advancement, higher salaries, and greater job satisfaction
Ethical Hacking Essentials (EHE) at Coursera Curriculum
Module 01: Information Security Fundamentals
Course Introduction
Video 1.1: Introduction
Video 1.2: Understanding the Need for Security
Video 1.3: Understanding the Elements of Information Security
Video 1.4: Understanding the Security, Functionality, and Usability Triangle
Video 1.5: Understanding Motives, Goals, and Objectives of Information Security Attacks
Video 1.6: Overview of Classification of Attacks
Video 1.7: Overview of Information Security Attack Vectors
Video 1.8: Overview of Various Information Security Laws and Regulations
Video 1.2: Quiz
Video 1.3: Quiz
Video 1.4: Quiz
Video 1.5: Quiz
Video 1.6: Quiz
Video 1.7: Quiz
Video 1.8: Quiz
Module 01 - Quiz
Video 2.1: Introduction
Video 2.2: Understanding the Cyber Kill Chain Methodology
Video 2.3: Understanding Tactics, Techniques, and Procedures (TTPs)
Video 2.4: Overview of Indicators of Compromise (IoCs)
Video 2.5: Overview of Hacking Concepts and Hacker Classes
Video 2.6: Understanding Different Phases of Hacking Cycle
Video 2.7: Understanding Ethical Hacking Concepts and Its Scope
Video 2.8: Overview of Ethical Hacking Tools
Video 2.2: Quiz
Video 2.3: Quiz
Video 2.4: Quiz
Video 2.5: Quiz
Video 2.6: Quiz
Video 2.7: Quiz
Video 2.8: Quiz
Module 02 - Quiz
Module 03: Information Security Threats and Vulnerability Assessment
Video 3.1: Introduction
Video 3.2: Understanding the Threat and Threat Sources
Video 3.3: Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web
Video 3.4: Overview of Different Types of Malware and Malware Countermeasures
Video 3.5: Understanding Vulnerability and Vulnerability Classification
Video 3.6: Understanding Vulnerability Assessment and Vulnerability Management Life Cycle
Video 3.7: Understanding Vulnerability Assessment Tools and Vulnerability Exploitation
Video 3.2: Quiz
Video 3.3: Quiz
Video 3.4: Quiz
Video 3.5: Quiz
Video 3.6: Quiz
Video 3.7: Quiz
Module 03 - Quiz
Video 4.1: Introduction
Video 4.2: Understanding the Password Cracking and Password Complexity
Video 4.3: Understanding Microsoft Authentication
Video 4.4: Understanding Various Types of Password Attacks
Video 4.5: Overview of Password Cracking Tools
Video 4.6: Understanding Countermeasures against Password Attacks
Video 4.2: Quiz
Video 4.3: Quiz
Video 4.4: Quiz
Video 4.5: Quiz
Video 4.6: Quiz
Module 04 - Quiz
Module 05: Social Engineering Techniques and Countermeasures
Video 5.1: Introduction
Video 5.2: Understanding Social Engineering Concepts
Video 5.3: Understanding Various Social Engineering Techniques
Video 5.4: Understanding Insider Threats
Video 5.5: Understanding Identity Theft
Video 5.6: Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures
Video 5.2: Quiz
Video 5.3: Quiz
Video 5.4: Quiz
Video 5.5: Quiz
Video 5.6: Quiz
Module 05 - Quiz
Video 6.1: Introduction
Video 6.2: Understanding Packet Sniffing and Types of Sniffing
Video 6.3: Understanding Various Sniffing Techniques and Tools
Video 6.4: Understanding Different Sniffing Countermeasures
Video 6.5: Overview of Different Types of DoS and DDoS Attacks
Video 6.6: Understanding Different DoS/DDoS Attack Tools
Video 6.7: Understanding Different DoS/DDoS Attack Countermeasures and Protection Tools
Video 6.8: Overview of Session Hijacking and Types of Session Hijacking
Video 6.9: Understanding Different Session Hijacking Tools and Countermeasures
Video 6.2: Quiz
Video 6.3: Quiz
Video 6.4: Quiz
Video 6.5: Quiz
Video 6.6: Quiz
Video 6.7: Quiz
Video 6.8: Quiz
Video 6.9: Quiz
Module 06 - Quiz
Module 07: Web Application Attacks and Countermeasures
Video 7.1: Introduction
Video 7.2: Understanding Web Server Concepts and Attacks
Video 7.3: Understanding Different Web Server Attack Tools and Countermeasures
Video 7.4: Overview of Web Application Architecture and Vulnerability Stack
Video 7.5: Understanding Different Web Application Threats and Attacks
Video 7.6: Understanding Different Web Application Attack Tools and Countermeasures
Video 7.7: Overview of Different Types of SQL Injection Attacks
Video 7.8: Understanding Different SQL Injection Tools
Video 7.9: Understanding Different SQL Injection Attack Countermeasures
Video 7.2: Quiz
Video 7.3: Quiz
Video 7.4: Quiz
Video 7.5: Quiz
Video 7.6: Quiz
Video 7.7: Quiz
Video 7.8: Quiz
Video 7.9: Quiz
Module 07 - Quiz
Video 8.1: Introduction
Video 8.2: Overview of Wireless Terminology
Video 8.3: Overview of Wireless Encryption Algorithms
Video 8.4: Understanding Wireless Network-Specific Attack Techniques
Video 8.5: Overview of Different Wireless Attack Tools
Video 8.6: Understanding Bluetooth Attack Techniques
Video 8.7: Overview of Various Wireless Attack Countermeasures
Video 8.8: Overview of Different Wireless Security Tools
Video 8.2: Quiz
Video 8.3: Quiz
Video 8.4: Quiz
Video 8.5: Quiz
Video 8.6: Quiz
Video 8.7: Quiz
Video 8.8: Quiz
Module 08 - Quiz
Module 09: Mobile Attacks and Countermeasures
Video 9.1: Introduction
Video 9.2: Understanding Anatomy of a Mobile Attack
Video 9.3: Understanding Mobile Platform Attack Vectors
Video 9.4:Understanding Mobile Platform Vulnerabilities
Video 9.5: Understanding Mobile Device Management
Video 9.6: Overview of Mobile Security Guidelines and Security Tools
Video 9.2: Quiz
Video 9.3: Quiz
Video 9.4: Quiz
Video 9.5: Quiz
Video 9.6: Quiz
Module 09 - Quiz
Video 10.1: Introduction
Video 10.2: Understanding IoT Concepts
Video 10.3: Understanding IoT attacks and IoT attack Tools
Video 10.4: Overview of IoT Attack Countermeasures and Security Tools
Video 10.5: Understanding OT Concepts
Video 10.6: Understanding OT Attacks and OT Attack Tools
Video 10.7: Overview of OT Attack Countermeasures and Security Tools
Video 10.2: Quiz
Video 10.3: Quiz
Video 10.4: Quiz
Video 10.5: Quiz
Video 10.6: Quiz
Video 10.7: Quiz
Module 10 - Quiz
Module 11: Cloud Computing Threats and Countermeasures
Video 11.1: Introduction
Video 11.2: Understanding Cloud Computing Concepts
Video 11.3: Overview of Container Technology
Video 11.4: Understanding Cloud Computing Threats
Video 11.5: Overview of Cloud Attacks and Tools
Video 11.6: Understanding Cloud Attack Countermeasures
Video 11.7: Overview of Various Cloud Computing Security Tools
Video 11.2: Quiz
Video 11.3: Quiz
Video 11.4: Quiz
Video 11.5: Quiz
Video 11.6: Quiz
Video 11.7: Quiz
Module 11 - Quiz
Video 12.1: Introduction
Video 12.2: Understanding Penetration Testing and its Benefits
Video 12.3: Understanding Types of Penetration Testing
Video 12.4: Understanding Phases of Penetration Testing
Video 12.5: Overview of Penetration Testing Methodologies
Video 12.6: Overview of Guidelines and Recommendations for Penetration Testing
Video 12.7: Understanding Risks Associated with Penetration Testing
Video 12.2: Quiz
Video 12.3: Quiz
Video 12.4: Quiz
Video 12.5: Quiz
Video 12.6: Quiz
Video 12.7: Quiz
Module 12 - Quiz