Ethical Hacking Essentials (EHE)
Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect the confidentiality, integrity, and availability of digital information.
Information security plays a vital role in all organizations. It is a state of affairs where information, information processing, and communication are protected against confidentiality, integrity, and availability of the information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.
Ethical Hacking Essentials (EHE) is a security program covering the fundamental concepts of information security and ethical hacking. It equips students with the skills required to identify the increasing information security threats which reflect on the security posture of the organization and implement general security controls.
This program gives a holistic overview of the key components of information security. It provides a solid fundamental knowledge required for a career in information security.
Why is EHE Important?
It facilitates your entry into the world of information security
It provides a professional understanding of the concepts of information security
It provides best practices to improve organizational security posture
It enhances your skills as a Security Specialist and increases your employability
What you'll learn
- Students going through EHE training will learn:
- § Key issues plaguing the information security world and information security laws and standards
- § Fundamentals of ethical hacking
- § Information security threats and vulnerabilities
- § Different types of malware
- § Different types of password-cracking techniques and countermeasures
- § Social engineering techniques, insider threats, identity theft, and countermeasures
- § Network-level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures
- § Application level attacks (webserver attacks, web application attacks, and SQL injection) and countermeasures
- § Wireless encryption, wireless threats, and countermeasures
- § Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
- § IoT and OT concepts, attacks, and countermeasures
- § Cloud computing technologies, cloud computing threats, attacks, and security techniques
- § Fundamentals of pen testing
Get a Reminder
Rating | Not enough ratings |
---|---|
Length | 1 weeks |
Effort | 1 weeks, 16–24 hours per week |
Starts | On Demand (Start anytime) |
Cost | $149 |
From | EC-Council via edX |
Instructor | Kevin King |
Download Videos | On all desktop and mobile devices |
Language | English |
Subjects | Programming |
Tags | Computer Science |
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
INFORMATION SECURITY DEVELOPER_INDENT - IT Security $47k
Information Security Office $71k
Information Security 1 $72k
Head, Information Security $72k
Information Security Analyst 2 3 $81k
Information Security Apprentice $84k
Engineer, Information Security $89k
Security Information Analyst $91k
Information Security Administration $108k
Information Technology/ Security $113k
Information Security - IT Specialist $121k
Information Security Expert $130k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | Not enough ratings |
---|---|
Length | 1 weeks |
Effort | 1 weeks, 16–24 hours per week |
Starts | On Demand (Start anytime) |
Cost | $149 |
From | EC-Council via edX |
Instructor | Kevin King |
Download Videos | On all desktop and mobile devices |
Language | English |
Subjects | Programming |
Tags | Computer Science |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course