Coursera
Coursera Logo

EC-Council - Ethical Hacking Essentials (EHE) 

  • Offered byCoursera

Ethical Hacking Essentials (EHE)
 at 
Coursera 
Overview

Duration

32 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Ethical Hacking Essentials (EHE)
 at 
Coursera 
Highlights

  • Earn a Certificate upon completion
Details Icon

Ethical Hacking Essentials (EHE)
 at 
Coursera 
Course details

More about this course
  • Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity
  • This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more
  • This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity
  • This improves their prospects for employment advancement, higher salaries, and greater job satisfaction

Ethical Hacking Essentials (EHE)
 at 
Coursera 
Curriculum

Module 01: Information Security Fundamentals

Course Introduction

Video 1.1: Introduction

Video 1.2: Understanding the Need for Security

Video 1.3: Understanding the Elements of Information Security

Video 1.4: Understanding the Security, Functionality, and Usability Triangle

Video 1.5: Understanding Motives, Goals, and Objectives of Information Security Attacks

Video 1.6: Overview of Classification of Attacks

Video 1.7: Overview of Information Security Attack Vectors

Video 1.8: Overview of Various Information Security Laws and Regulations

Video 1.2: Quiz

Video 1.3: Quiz

Video 1.4: Quiz

Video 1.5: Quiz

Video 1.6: Quiz

Video 1.7: Quiz

Video 1.8: Quiz

Module 01 - Quiz

Video 2.1: Introduction

Video 2.2: Understanding the Cyber Kill Chain Methodology

Video 2.3: Understanding Tactics, Techniques, and Procedures (TTPs)

Video 2.4: Overview of Indicators of Compromise (IoCs)

Video 2.5: Overview of Hacking Concepts and Hacker Classes

Video 2.6: Understanding Different Phases of Hacking Cycle

Video 2.7: Understanding Ethical Hacking Concepts and Its Scope

Video 2.8: Overview of Ethical Hacking Tools

Video 2.2: Quiz

Video 2.3: Quiz

Video 2.4: Quiz

Video 2.5: Quiz

Video 2.6: Quiz

Video 2.7: Quiz

Video 2.8: Quiz

Module 02 - Quiz

Module 03: Information Security Threats and Vulnerability Assessment

Video 3.1: Introduction

Video 3.2: Understanding the Threat and Threat Sources

Video 3.3: Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web

Video 3.4: Overview of Different Types of Malware and Malware Countermeasures

Video 3.5: Understanding Vulnerability and Vulnerability Classification

Video 3.6: Understanding Vulnerability Assessment and Vulnerability Management Life Cycle

Video 3.7: Understanding Vulnerability Assessment Tools and Vulnerability Exploitation

Video 3.2: Quiz

Video 3.3: Quiz

Video 3.4: Quiz

Video 3.5: Quiz

Video 3.6: Quiz

Video 3.7: Quiz

Module 03 - Quiz

Video 4.1: Introduction

Video 4.2: Understanding the Password Cracking and Password Complexity

Video 4.3: Understanding Microsoft Authentication

Video 4.4: Understanding Various Types of Password Attacks

Video 4.5: Overview of Password Cracking Tools

Video 4.6: Understanding Countermeasures against Password Attacks

Video 4.2: Quiz

Video 4.3: Quiz

Video 4.4: Quiz

Video 4.5: Quiz

Video 4.6: Quiz

Module 04 - Quiz

Module 05: Social Engineering Techniques and Countermeasures

Video 5.1: Introduction

Video 5.2: Understanding Social Engineering Concepts

Video 5.3: Understanding Various Social Engineering Techniques

Video 5.4: Understanding Insider Threats

Video 5.5: Understanding Identity Theft

Video 5.6: Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures

Video 5.2: Quiz

Video 5.3: Quiz

Video 5.4: Quiz

Video 5.5: Quiz

Video 5.6: Quiz

Module 05 - Quiz

Video 6.1: Introduction

Video 6.2: Understanding Packet Sniffing and Types of Sniffing

Video 6.3: Understanding Various Sniffing Techniques and Tools

Video 6.4: Understanding Different Sniffing Countermeasures

Video 6.5: Overview of Different Types of DoS and DDoS Attacks

Video 6.6: Understanding Different DoS/DDoS Attack Tools

Video 6.7: Understanding Different DoS/DDoS Attack Countermeasures and Protection Tools

Video 6.8: Overview of Session Hijacking and Types of Session Hijacking

Video 6.9: Understanding Different Session Hijacking Tools and Countermeasures

Video 6.2: Quiz

Video 6.3: Quiz

Video 6.4: Quiz

Video 6.5: Quiz

Video 6.6: Quiz

Video 6.7: Quiz

Video 6.8: Quiz

Video 6.9: Quiz

Module 06 - Quiz

Module 07: Web Application Attacks and Countermeasures

Video 7.1: Introduction

Video 7.2: Understanding Web Server Concepts and Attacks

Video 7.3: Understanding Different Web Server Attack Tools and Countermeasures

Video 7.4: Overview of Web Application Architecture and Vulnerability Stack

Video 7.5: Understanding Different Web Application Threats and Attacks

Video 7.6: Understanding Different Web Application Attack Tools and Countermeasures

Video 7.7: Overview of Different Types of SQL Injection Attacks

Video 7.8: Understanding Different SQL Injection Tools

Video 7.9: Understanding Different SQL Injection Attack Countermeasures

Video 7.2: Quiz

Video 7.3: Quiz

Video 7.4: Quiz

Video 7.5: Quiz

Video 7.6: Quiz

Video 7.7: Quiz

Video 7.8: Quiz

Video 7.9: Quiz

Module 07 - Quiz

Video 8.1: Introduction

Video 8.2: Overview of Wireless Terminology

Video 8.3: Overview of Wireless Encryption Algorithms

Video 8.4: Understanding Wireless Network-Specific Attack Techniques

Video 8.5: Overview of Different Wireless Attack Tools

Video 8.6: Understanding Bluetooth Attack Techniques

Video 8.7: Overview of Various Wireless Attack Countermeasures

Video 8.8: Overview of Different Wireless Security Tools

Video 8.2: Quiz

Video 8.3: Quiz

Video 8.4: Quiz

Video 8.5: Quiz

Video 8.6: Quiz

Video 8.7: Quiz

Video 8.8: Quiz

Module 08 - Quiz

Module 09: Mobile Attacks and Countermeasures

Video 9.1: Introduction

Video 9.2: Understanding Anatomy of a Mobile Attack

Video 9.3: Understanding Mobile Platform Attack Vectors

Video 9.4:Understanding Mobile Platform Vulnerabilities

Video 9.5: Understanding Mobile Device Management

Video 9.6: Overview of Mobile Security Guidelines and Security Tools

Video 9.2: Quiz

Video 9.3: Quiz

Video 9.4: Quiz

Video 9.5: Quiz

Video 9.6: Quiz

Module 09 - Quiz

Video 10.1: Introduction

Video 10.2: Understanding IoT Concepts

Video 10.3: Understanding IoT attacks and IoT attack Tools

Video 10.4: Overview of IoT Attack Countermeasures and Security Tools

Video 10.5: Understanding OT Concepts

Video 10.6: Understanding OT Attacks and OT Attack Tools

Video 10.7: Overview of OT Attack Countermeasures and Security Tools

Video 10.2: Quiz

Video 10.3: Quiz

Video 10.4: Quiz

Video 10.5: Quiz

Video 10.6: Quiz

Video 10.7: Quiz

Module 10 - Quiz

Module 11: Cloud Computing Threats and Countermeasures

Video 11.1: Introduction

Video 11.2: Understanding Cloud Computing Concepts

Video 11.3: Overview of Container Technology

Video 11.4: Understanding Cloud Computing Threats

Video 11.5: Overview of Cloud Attacks and Tools

Video 11.6: Understanding Cloud Attack Countermeasures

Video 11.7: Overview of Various Cloud Computing Security Tools

Video 11.2: Quiz

Video 11.3: Quiz

Video 11.4: Quiz

Video 11.5: Quiz

Video 11.6: Quiz

Video 11.7: Quiz

Module 11 - Quiz

Video 12.1: Introduction

Video 12.2: Understanding Penetration Testing and its Benefits

Video 12.3: Understanding Types of Penetration Testing

Video 12.4: Understanding Phases of Penetration Testing

Video 12.5: Overview of Penetration Testing Methodologies

Video 12.6: Overview of Guidelines and Recommendations for Penetration Testing

Video 12.7: Understanding Risks Associated with Penetration Testing

Video 12.2: Quiz

Video 12.3: Quiz

Video 12.4: Quiz

Video 12.5: Quiz

Video 12.6: Quiz

Video 12.7: Quiz

Module 12 - Quiz

Ethical Hacking Essentials (EHE)
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Ethical Hacking Essentials (EHE)
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...