We may earn an affiliate commission when you visit our partners.
Course image
Kevin King

Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect the confidentiality, integrity, and availability of digital information.

Read more

Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect the confidentiality, integrity, and availability of digital information.

Information security plays a vital role in all organizations. It is a state of affairs where information, information processing, and communication are protected against confidentiality, integrity, and availability of the information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.

Ethical Hacking Essentials (EHE) is a security program covering the fundamental concepts of information security and ethical hacking. It equips students with the skills required to identify the increasing information security threats which reflect on the security posture of the organization and implement general security controls.

This program gives a holistic overview of the key components of information security. It provides a solid fundamental knowledge required for a career in information security.

Why is EHE Important?

  • It facilitates your entry into the world of information security
  • It provides a professional understanding of the concepts of information security
  • It provides best practices to improve organizational security posture
  • It enhances your skills as a Security Specialist and increases your employability

Three deals to help you save

What's inside

Learning objectives

  • Students going through ehe training will learn:
  • § key issues plaguing the information security world and information security laws and standards
  • § fundamentals of ethical hacking
  • § information security threats and vulnerabilities
  • § different types of malware
  • § different types of password-cracking techniques and countermeasures
  • § social engineering techniques, insider threats, identity theft, and countermeasures
  • § network-level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures
  • § application level attacks (webserver attacks, web application attacks, and sql injection) and countermeasures
  • § wireless encryption, wireless threats, and countermeasures
  • § mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
  • § iot and ot concepts, attacks, and countermeasures
  • § cloud computing technologies, cloud computing threats, attacks, and security techniques
  • § fundamentals of pen testing

Syllabus

Module 01: Information Security Fundamentals
This module provides an insight into the different elements of information security.
Module 02: Ethical Hacking Fundamentals
Read more
This module provides an insight into cyber kill chain methodology, hacking concepts, and hacker classes.
Module 03: Information Security Threats and Vulnerability Assessment
This module provides an insight into cyber security threats and vulnerability assessment.
Module 04: Password Cracking Techniques and Countermeasures
This module provides an in-depth understanding of password cracking techniques and the corresponding defensive measures that can help individuals and organizations create strong password policies and protect personal or corporate information.
Module 05: Social Engineering Techniques and Countermeasures
This module provides an insight into human-based, computer-based, and mobile-based social engineering techniques.
Module 06: Network Level Attacks and Countermeasures
This module provides insight into various network-level attacks, such as sniffing, DoS attacks, session hijacking, etc. This module also familiarizes students with various network security countermeasures.
Module 07: Web Application Attacks and Countermeasures
This module familiarizes students with web-server attacks and countermeasures. This module also familiarizes students with various web-application threats, attacks, and countermeasures.
Module 08: Wireless Attacks and Countermeasures
This module describes wireless networks, wireless network standards, wireless encryption algorithms, wireless-network attack techniques, and countermeasures to protect wireless networks.
Module 09: Mobile Attacks and Countermeasures
This module explains the potential threats to mobile platforms and provides guidelines for using mobile devices securely.
Module 10: IoT and OT Attacks and Countermeasures
The main objective of this module is to explain the potential threats to IoT and OT platforms and to provide guidelines for securing IoT devices and OT infrastructure.
Module 11: Cloud Computing Threats and Countermeasures
This module provides insight into cloud computing concepts, container technology, cloud computing threats, and cloud computing security to meet the security requirements.
Module 12: Penetration Testing Fundamentals
This module discusses the importance of penetration testing in an organization and explains the crucial role that a tester plays in identifying vulnerabilities.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores cybersecurity threats and countermeasures in websites and web servers
Suitable for those seeking foundational knowledge in ethical hacking and information security concepts
Covers diverse facets of information security, including social engineering and IoT threats
Provides hands-on skills for ethical hacking and security testing
Taught by an experienced instructor in ethical hacking and information security
Aligned with current industry practices and standards in information security

Save this course

Save Ethical Hacking Essentials (EHE) to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Ethical Hacking Essentials (EHE) with these activities:
Review cryptography basics
Solidify your knowledge of core cryptographic principles and techniques before diving into the complexities of ethical hacking.
Browse courses on Cryptography
Show steps
  • Revisit concepts of encryption and decryption
  • Review common cryptographic algorithms like AES and RSA
  • Brush up on public key infrastructure (PKI)
  • Explore basic cryptanalysis techniques
Review Cloud Security Concepts
As more organizations move their data and applications to the cloud, it is important to have a solid understanding of cloud security concepts.
Browse courses on Cloud Security
Show steps
  • Review the AWS Security Whitepapers.
  • Read blog posts and articles on cloud security best practices.
Practice Ethical Hacking Concepts
Explores key concepts that are building blocks in ethical hacking, refreshes or expands on prior knowledge.
Browse courses on Cyber Security
Show steps
  • Review the fundamentals of ethical hacking, including its principles and methodologies.
  • Practice using different types of hacking tools and techniques.
  • Test your skills by participating in online hacking challenges or competitions.
12 other activities
Expand to see all activities and additional details
Show all 15 activities
Review the Fundamentals of Secure Coding and Cyber Security
Secure coding is an important part of information security. Review key concepts in order to have a better foundation for this course.
Browse courses on Secure Coding
Show steps
  • Review the Open Web Application Security Project (OWASP) Top 10.
  • Check out the SANS Institute's resources on secure coding.
  • Read white papers and blog posts on recent cyber security trends and best practices.
Form a Study Group with Classmates
Forming a study group with classmates can provide a supportive environment for learning, sharing knowledge, and working through challenging concepts.
Show steps
  • Find classmates who are interested in forming a study group.
  • Set up regular meeting times and a communication platform.
  • Prepare questions, share notes, and discuss course materials during study sessions.
  • Collaborate on projects and assignments to gain diverse perspectives.
Practice Password Cracking Techniques
This pre-course activity can help bring you up to speed on the art of password cracking. Password cracking techniques are the foundation of ethical hacking.
Browse courses on Password Cracking
Show steps
  • Review common password cracking techniques such as brute-force attacks and dictionary attacks
  • Familiarize yourself with password cracking tools like John the Ripper and Hashcat
  • Set up a lab environment where you can practice password cracking techniques without endangering any real-world systems.
Research and Follow Online Tutorials on Information Security
Review the fundamentals of information security and ethical hacking by watching tutorials online, which can help reinforce your understanding of the concepts covered in the course.
Show steps
  • Identify reputable sources for online tutorials on information security topics.
  • Watch video tutorials and take notes on key concepts, techniques, and tools.
  • Practice applying the techniques and tools you learn from the tutorials.
  • Share your understanding and findings with classmates or colleagues for feedback.
Compile a List of Information Security Resources
Having a curated list of information security resources, such as articles, tools, and online communities, can serve as a valuable reference for future learning and staying up-to-date.
Show steps
  • Search for high-quality articles, websites, and other resources on information security.
  • Organize and categorize the resources based on specific topics or categories.
  • Create a document or spreadsheet to store the compiled resources.
  • Share the compilation with classmates or colleagues for their benefit.
Build a Virtual Pentesting Lab
Setting up a virtual pentesting lab allows you to practice and refine your ethical hacking skills in a realistic and controlled environment.
Show steps
  • Install and configure a virtual machine environment.
  • Create a target operating system for testing and set up vulnerable services.
  • Install and configure pentesting tools on the attacking machine.
  • Test the vulnerability and use pentesting tools to identify and exploit security flaws.
Attend Information Security Conferences
Attending conferences can help you stay up-to-date on the latest trends in information security.
Show steps
  • Identify information security conferences that are relevant to your interests.
  • Register for the conference and make travel arrangements.
  • Attend the conference and participate in sessions.
  • Network with other professionals in the information security field.
Write a Blog Post on a Specific Information Security Topic
Writing a blog post on a specific aspect of information security encourages you to synthesize your understanding and share your knowledge, deepening your grasp of the subject.
Show steps
  • Choose a specific information security topic that interests you or that you feel confident in.
  • Research the topic thoroughly, gathering information from credible sources.
  • Write a draft that outlines the key points and your insights.
  • Revise and edit the blog post to ensure clarity, accuracy, and flow.
Practice Penetration Testing with Bug Bounty Platforms
Penetration testing is a key component of information security. Try practicing on a number of platforms in order to solidify these skills.
Browse courses on Penetration Testing
Show steps
  • Create an account on a bug bounty platform.
  • Identify a target application or website.
  • Perform penetration testing and identify vulnerabilities.
  • Submit a vulnerability report to the platform and receive a reward.
Build a Simple Malware Analysis Lab
This project will provide you with hands-on experience in malware analysis.
Browse courses on Malware Analysis
Show steps
  • Set up a virtual machine for malware analysis.
  • Install and configure malware analysis tools.
  • Collect malware samples.
  • Analyze malware samples and identify their behavior.
Create a Threat Hunting Dashboard
This project will provide you with experience in threat hunting and dashboard development.
Browse courses on Threat Hunting
Show steps
  • Identify the data sources that you want to use for your dashboard.
  • Collect and analyze the data.
  • Create a dashboard that visualizes the data and identifies potential threats.
  • Use the dashboard to monitor your network for threats.
Participate in a Capture the Flag (CTF) Competition
CTF competitions provide a challenging and engaging way to test and enhance your ethical hacking skills against other participants.
Show steps
  • Find and register for a reputable CTF competition that aligns with your skill level.
  • Set up your environment and tools.
  • Collaborate with team members (optional) to solve challenges and capture flags.
  • Submit flags and track your progress on the scoreboard.

Career center

Learners who complete Ethical Hacking Essentials (EHE) will develop knowledge and skills that may be useful to these careers:
Ethical Hacker
Ethical Hackers are computer security professionals who are hired to penetrate an organization's computer networks and systems to identify security vulnerabilities. They use the same techniques as malicious hackers, but with the permission of the organization. Ethical Hacking Essentials (EHE) is a great course for Ethical Hackers because it provides a comprehensive overview of ethical hacking techniques and methodologies. This knowledge can help Ethical Hackers better understand the threats facing organizations and develop more effective security measures.
Penetration Tester
Penetration Testers are computer security professionals who are hired to penetrate an organization's computer networks and systems to identify security vulnerabilities. They use the same techniques as malicious hackers, but with the permission of the organization. Ethical Hacking Essentials (EHE) is a great course for Penetration Testers because it provides a comprehensive overview of penetration testing techniques and methodologies. This knowledge can help Penetration Testers better understand the threats facing organizations and develop more effective security measures.
Information Security Manager
Information Security Managers are responsible for developing and implementing an organization's information security program. They also oversee the organization's information security staff and ensure that the program is aligned with the organization's business goals. Ethical Hacking Essentials (EHE) may be useful for Information Security Managers because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, social engineering techniques, and network-level attacks. This knowledge can help Information Security Managers better understand the threats facing their organizations and develop more effective security measures.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for developing and implementing an organization's information security strategy. They also oversee the organization's information security program and ensure that it is aligned with the organization's business goals. Ethical Hacking Essentials (EHE) may be useful for CISOs because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, social engineering techniques, and network-level attacks. This knowledge can help CISOs better understand the threats facing their organizations and develop more effective security measures.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Ethical Hacking Essentials (EHE) may be useful for Network Security Engineers because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, network-level attacks, and wireless attacks. This knowledge can help Network Security Engineers better understand the threats facing their organizations and develop more effective security measures.
Security Architect
Security Architects design and implement security measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Ethical Hacking Essentials (EHE) may be useful for Security Architects because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, network-level attacks, and wireless attacks. This knowledge can help Security Architects better understand the threats facing their organizations and develop more effective security measures.
Cybersecurity Analyst
Cybersecurity Analysts identify and assess security risks to an organization's computer networks and systems. They also develop and implement security measures to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information. Ethical Hacking Essentials (EHE) may be useful for Cybersecurity Analysts because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, social engineering techniques, and network-level attacks. This knowledge can help Cybersecurity Analysts better understand the threats facing their organizations and develop more effective security measures.
Security Consultant
Security Consultants help organizations assess their security risks and develop and implement security measures to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information. Ethical Hacking Essentials (EHE) may be useful for Security Consultants because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, social engineering techniques, and network-level attacks. This knowledge can help Security Consultants better understand the threats facing their clients and develop more effective security measures.
Information Security Analyst
Information Security Analysts identify and assess security risks to an organization's computer networks and systems. By developing and implementing security measures to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information, they help organizations maintain the confidentiality, integrity, and availability of their information assets. Ethical Hacking Essentials (EHE) may be useful for Information Security Analysts because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, social engineering techniques, and network-level attacks. This knowledge can help Information Security Analysts better understand the threats facing their organizations and develop more effective security measures.
Security Analyst
Security Analysts identify and assess security risks to an organization's computer networks and systems. They also develop and implement security measures to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information. Ethical Hacking Essentials (EHE) may be useful for Security Analysts because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, social engineering techniques, and network-level attacks. This knowledge can help Security Analysts better understand the threats facing their organizations and develop more effective security measures.
Incident Responder
Incident Responders are responsible for responding to and investigating security incidents. They also develop and implement security measures to prevent and mitigate security incidents. Ethical Hacking Essentials (EHE) may be useful for Incident Responders because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, social engineering techniques, and network-level attacks. This knowledge can help Incident Responders better understand the threats facing their organizations and develop more effective security measures.
Malware Analyst
Malware Analysts investigate and analyze malware to identify its capabilities and develop countermeasures. They also develop and implement security measures to prevent and mitigate malware infections. Ethical Hacking Essentials (EHE) may be useful for Malware Analysts because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, malware, and social engineering techniques. This knowledge can help Malware Analysts better understand the threats facing their organizations and develop more effective security measures.
Risk Analyst
Risk Analysts identify and assess risks to an organization's assets. They also develop and implement security measures to mitigate these risks. Ethical Hacking Essentials (EHE) may be useful for Risk Analysts because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, and social engineering techniques. This knowledge can help Risk Analysts better understand the threats facing their organizations and develop more effective security measures.
Threat Intelligence Analyst
Threat Intelligence Analysts collect and analyze information about threats to an organization's assets. They also develop and implement security measures to mitigate these threats. Ethical Hacking Essentials (EHE) may be useful for Threat Intelligence Analysts because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, and social engineering techniques. This knowledge can help Threat Intelligence Analysts better understand the threats facing their organizations and develop more effective security measures.
Forensic Computer Analyst
Forensic Computer Analysts investigate computer crimes and provide expert testimony in court. They also develop and implement security measures to prevent computer crimes. Ethical Hacking Essentials (EHE) may be useful for Forensic Computer Analysts because it provides a holistic overview of information security, including topics such as ethical hacking, information security threats and vulnerabilities, social engineering techniques, and network-level attacks. This knowledge can help Forensic Computer Analysts better understand the techniques used by criminals and develop more effective security measures.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking Essentials (EHE).
Offers hands-on exercises and practical guidance for penetration testing. It covers topics like reconnaissance, scanning, exploitation, and post-exploitation.
This updated edition provides an in-depth understanding of the techniques and methodologies used by attackers. It covers topics like buffer overflows, web application vulnerabilities, and malware analysis.
Focuses on social engineering techniques and provides strategies to protect against them. It covers topics like phishing, pretexting, and identity theft.
Provides a comprehensive overview of network security assessment techniques. It covers topics like network scanning, vulnerability assessment, and penetration testing.
Provides a practical guide to finding and exploiting security flaws in web applications. It covers topics like web application security assessment, vulnerability analysis, and exploitation techniques.
Provides a comprehensive overview of computer security principles and practices. It covers topics like cryptography, network security, and operating system security.
Provides a comprehensive overview of cloud security. It covers topics like cloud security architecture, cloud security controls, and cloud security compliance.
Provides a comprehensive overview of information systems security. It covers topics like information security principles, information security threats, and information security controls.
Provides a comprehensive overview of network security. It covers topics like network security assessment, network security defenses, and network security monitoring.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking Essentials (EHE).
Certified Professional Ethical Hacking C)PEH Certification
Most relevant
Data Security
Most relevant
Security Controls: CIS Controls
Most relevant
Fundamentals of Information System Security Architecture
Most relevant
Ethical Hacking Fundamentals
Most relevant
Ethical Hacking using Kali Linux from A to Z
Most relevant
Hacking in Practice: Intensive Ethical Hacking MEGA Course
Most relevant
Data Privacy and Protection Standards
Most relevant
Information Governance: HIPAA
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser