0% found this document useful (0 votes)
3 views

EHEv1 Module 00 Student Introduction

The Ethical Hacking Essentials (EHE) program is designed to teach fundamental concepts of information security and ethical hacking, equipping students with skills to identify and mitigate security threats. The course covers various topics including information security fundamentals, ethical hacking techniques, and countermeasures for different types of attacks. Students will also gain practical experience in a lab environment using various operating systems.

Uploaded by

MAJID ABDULLAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

EHEv1 Module 00 Student Introduction

The Ethical Hacking Essentials (EHE) program is designed to teach fundamental concepts of information security and ethical hacking, equipping students with skills to identify and mitigate security threats. The course covers various topics including information security fundamentals, ethical hacking techniques, and countermeasures for different types of attacks. Students will also gain practical experience in a lab environment using various operating systems.

Uploaded by

MAJID ABDULLAH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Module 00

Welcome to Ethical Hacking Essentials Class!


- Student Introduction

Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.


Introduction

Instructor Introduction Student Introduction

Name Name

Qualification Expectations

Industry Experience

Teaching Experience

Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.


What is EHE
Program?

 Ethical Hacking Essentials (EHE) is a security program covering the


fundamental concepts of information security and ethical hacking

 It equips students with the skills required to identify the increasing


information security threats which reflect on the security posture
of the organization and implement general security controls

Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.


EHE Course Outline
Web Application Attacks and
01 Information Security Fundamentals 07 Countermeasures

Wireless Attacks and


02 Ethical Hacking Fundamentals 08 Countermeasures

Information Security Threats and


03 Vulnerability Assessment 09 Mobile Attacks and Countermeasures

Password Cracking Techniques and IoT and OT Attacks and


04 Countermeasures 10 Countermeasures

Social Engineering Techniques and Cloud Computing Threats and


05 Countermeasures 11 Countermeasures

Network Level Attacks and


06 Countermeasures 12 Penetration Testing Fundamentals

Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.


What will you
Learn?
Students going through EHE training will learn:
Key issues plaguing the information security world and information security
1 laws and standards

2 Fundamentals of ethical hacking

3 Information security threats and vulnerabilities

4 Different types of malware

5 Different types of password cracking techniques and countermeasures

6 Social engineering techniques, insider threats, identity theft, and countermeasures

Network level attacks (sniffing, denial-of-service, and session hijacking) and


7 countermeasures
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
What will you
Learn?
Students going through EHE training will learn:
Application level attacks (web server attacks, web application
8
attacks, and SQL injection) and countermeasures

9 Wireless encryption, wireless threats, and countermeasures

Mobile platform attack vector, mobile device management,


10
mobile security guidelines, and security tools

11 IoT and OT concepts, attacks, and countermeasures

Cloud computing technologies, cloud computing threats, attacks,


12
and security techniques

13 Fundamentals of pen testing

Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.


Lab Environment

Windows 10 Windows Server Windows Server Parrot Security Android Ubuntu Linux
2019 2016 Linux

Instructor Machine Student Machines


Instructor and Student Machine Operating System: Any Operating System Capable of Running VMware (Fully Patched)
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Welcome
Welcome to
to EHE
EHE Class!
Class!

Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like