Ethical Hacking Essentials Ehe Brochure
Ethical Hacking Essentials Ehe Brochure
Ethical Hacking Essentials Ehe Brochure
E|HE www.eccouncil.org 01
E|HE-certified learners have an assured means of formal recognition to add to their resumes
and show off their expertise and skills to prospective employers. This improves their prospects
for employment advancement, higher salaries, and greater job satisfaction.
If you are looking to learn advance ethical hacking click here: Ethical Hacking Certification
(Certified Ethical Hacker C|EH)
Course Outline
Lab Exercise
• Passive Footprinting to Gather Information About a Target
• Network Scanning to Identify Live Hosts, Open Ports and Services and Target OS in the
Network
• Enumeration on a System or Network to Extract Usernames, Machine Names, Network
Resources, Shares, etc.
E|HE www.eccouncil.org 02
Lab Exercise
• Vulnerability Assessment to Identify Security Vulnerabilities in the Target System or
Network
Lab Exercise
• Perform Active Online Attack to Crack the System’s Password
• Audit System Passwords
Lab Exercise
• Social Engineering Using Various Techniques to Sniff Users’ Credentials
• Detect a Phishing Attack
Lab Exercise
• Perform MAC Flooding to Compromise the Security of Network Switches
• Perform ARP Poisoning to Divert all Communication between Two Machines
• Detect ARP Attacks using ARP Spoofing Detection Tools to Ensure Data
Privacy
• Perform DoS and DDoS Attacks using Various Techniques on a Target Host to
Prevents Access to System Resources for Legitimate Users
• Detect and Protect Against DDoS Attack
• Perform Session Hijacking to Seize Control of a Valid TCP Communication
Session Between Two Computers
• Detect Session Hijacking Attempts using Manual Method
E|HE www.eccouncil.org 03
Module 06: Network Level Attacks and Countermeasures
• Packet Sniffing Concepts
• Sniffing Techniques
• Sniffing Countermeasures
• DoS and DDoS Attacks
• DoS and DDoS Attack Countermeasures
• Session Hijacking Attacks
• Session Hijacking Attack Countermeasures
Lab Exercise
• Perform MAC Flooding to Compromise the Security of Network Switches
• Perform ARP Poisoning to Divert all Communication between Two Machines
• Detect ARP Attacks using ARP Spoofing Detection Tools to Ensure Data
Privacy
• Perform DoS and DDoS Attacks using Various Techniques on a Target Host to
Prevents Access to System Resources for Legitimate Users
• Detect and Protect Against DDoS Attack
• Perform Session Hijacking to Seize Control of a Valid TCP Communication
Session Between Two Computers
• Detect Session Hijacking Attempts using Manual Method
Lab Exercise
• Perform a Web Server Attack to Crack FTP Credentials
• Perform a Web Application Attack to Compromise the Security of Web
Applications to Steal Sensitive Information
• Perform SQL Injection Attacks on a Target Web Application to Manipulate the
Backend Database
• Detect SQL Injection Vulnerabilities using SQL Injection Detection Tools
E|HE www.eccouncil.org 04
Lab Exercise
• Perform Wi-Fi Packet Analysis
• Perform Wireless Attacks to Crack Wireless Encryption
Lab Exercise
• Hack an Android Device by Creating Binary Payloads
• Secure Android Devices using Various Android Security Tools
Lab Exercise
• Perform Footprinting using Various Footprinting Techniques
• Capture and Analyze IoT Device Traffic
Lab Exercise
• Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
• Exploit S3 Buckets
E|HE www.eccouncil.org 05
What Skills You’ll Learn
• Key issues plaguing the information security world and information security laws and
standards.
• Fundamentals of ethical hacking
• Information security threats and vulnerabilities
• Different types of malware
• Different types of password-cracking techniques and countermeasures
• Social engineering techniques, insider threats, identity theft, and countermeasures
• Network level attacks (sniffing, denial-of-service, and session hijacking) and
countermeasures.
• Application-level attacks (web-server attacks, web application attacks, and SQL
injection) and countermeasures
• Wireless encryption, wireless threats, and countermeasures
• Mobile platform attack vector, mobile device management, mobile security guidelines,
and security tools
• IoT and OT concepts, attacks, and countermeasures
• Cloud computing technologies, cloud computing threats, attacks, and security
techniques
• Fundamentals of pen testing
Who Is It For
• School students, fresh graduates, Professionals, Career starters and switchers, IT /
Technology / Cybersecurity teams with little or no work experience.
• Anyone who wants to start their cybersecurity career and master the
fundamentals of security online.
• Anyone who wants to prepare for a cybersecurity career and aid their IT education.
• Professionals who want to get into the cybersecurity field but are unsure where to
start their education journey.
Exam Details:
• Exam Code: 112-52
• Number of Questions: 75 • Test Format: Multiple Choice
• Duration: 2 hours • 750+ pages of ecourseware
E|HE www.eccouncil.org 06
Key Features
E|HE www.eccouncil.org 07
Why Do Professionals, Students, Career Starters
and Changers Worldwide Choose the EC-Council’s
Essentials Certification?
Gene (USA)
Strong Cybersecurity Foundation.
It has given me a solid foundation in the basics of cybersecurity. I now have a better
understanding of the different types of cyberattacks, the tools and techniques that attackers
use, and the ways to protect myself and my organization from these attacks.
This has helped me enhance my knowledge and skills in tech. I will be able to showcase my
knowledge by certifying myself as an ethical hacker and adding it to my resume, which will
give me an opportunity to advance in my career and opt for higher-paying roles.
Deeptankshu (USA)
Top Notched Cyber Investigation Skills.
It helped by teaching me how to collect data and evidence to solve crimes and prevent
wrongdoers in the Cyber realm. As a Security and Intelligence major, I want to be well-versed
in the Cyber realm as well as other realms.
After completing this course, I had the foundation I needed. It assisted me in completing my
MS Cybersecurity course in digital forensics, which expanded my knowledge even further.
This foundation is perfect for a start in Digital forensics.
Brian (USA)
Rebuilding Network Defense Knowledge.
This course helped rebuild my baseline knowledge of network defense, which I required
before progressing toward more advanced studies in the field.
E|HE www.eccouncil.org 08
Nicolas Ntibaziyaremye (USA)
Practical Learning for Career Growth.
The course is project-based. This allows me to apply what I learn in the lectures to real-world
problems. I have learned a lot from this course, and I am confident that it will help me in my career.
E|HE N|DE
Ethical Hacking Network Defense
Essentials Essentials
D|SE I|SE
DevSecOps IoT Security
Essentials Essentials
D|FE C|SE
Digital Forensic Cloud Security
Essentials Essentials
S|CE T|IE
SOC Threat Intelligence
Essentials Essentials
E|HE www.eccouncil.org 09
About
EC-Council’s sole purpose is to build and refine the cybersecurity profession globally. We
help individuals, organizations, educators, and governments address global workforce
problems by developing and curating world-class cybersecurity education programs and their
corresponding certifications. We also provide cybersecurity services to some of the largest
businesses globally. Trusted by 7 of the Fortune 10, 47 of the Fortune 100, the Department
of Defence, Intelligence Community, NATO, and over 2,000 of the best Universities, Colleges,
and Training Companies, our programs have proliferated through over 140 countries. They
have set the bar in cybersecurity education. Best known for the Certified Ethical Hacker
programs, we are dedicated to equipping over 2,30,000 information age soldiers with the
knowledge, skills, and abilities required to fight and win against the black hat adversaries.
EC-Council builds individual and team/organization cyber capabilities through the Certified
Ethical Hacker Program, followed by a variety of other cyber programs, including Certified
Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst,
Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst,
Certified Incident Handler, as well as the Certified Chief Information Security Officer.
We are an ANAB 17024 accredited organization and have earned recognition by the DoD
under Directive 8140/8570 in the UK by the GCHQ, CREST, and various other authoritative
bodies that influence the entire profession.
Founded in 2001, EC-Council employs over 400 individuals worldwide with ten global offices
in the USA, UK, Malaysia, Singapore, India, and Indonesia. Its US offices are in Albuquerque,
NM, and Tampa, FL.
E|HE www.eccouncil.org 10
Ethical Hacking Essentials
www.eccouncil.org
E|HE www.eccouncil.org 22