Access Training
for Customers/Partners
Access Training
for NetWitness Employees
Free
Overview
Ethical Hacking Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in ethical. The course contains 12 modules and add-on labs covering fundamental ethical hacking concepts, including emerging technologies like IoT and OT, cloud computing, etc.
- Information Security Fundamentals
- Information security fundamentals
- Information security laws and regulations
- Ethical Hacking Fundamentals
- Cyber Kill Chain methodology
- Hacking concepts, hacking cycle, and different hacker classes
- Ethical hacking concepts, scope, and limitations
- Information Security Threats and Vulnerabilities
- Detect various threat sources and vulnerabilities in a network or system
- Different types of malwares
- Password Cracking Techniques and Countermeasures
- Types of password cracking techniques
- Social Engineering Techniques and Countermeasures
- Social engineering concepts and techniques
- Insider threats and identity theft concepts
- Network-Level Attacks and Countermeasures
- Packet sniffing concepts and types
- Sniffing techniques and countermeasures
- DoS and DDoS attacks under sniffing attacks
- Web Application Attacks and Countermeasures
- Web Server Attacks
- Web Application Attacks
- Web Application Architecture and Vulnerability Stack
- Web Application Threats and Attacks
- SQL Injection Attacks
- Types of SQL Injection Attacks
- Wireless Attacks and Countermeasures
- Wireless Terminology
- Types of Wireless Encryption
- Wireless Network-specific Attack Techniques
- Bluetooth Attacks
- Wireless Attack Countermeasures
- Mobile Attacks and Countermeasures
- Mobile Attack Anatomy
- Mobile Attack Vectors and Mobile Platform Vulnerabilities
- IoT and OT Attacks and Countermeasures
- IoT Attacks
• IoT Devices, their need and Application Areas
• IoT Threats and Attacks
- OT Attacks
• Understand OT Concepts
• OT Challenges and Attacks
• OT Attacks Countermeasures
- Cloud Computing Threats and Countermeasures
- Cloud Computing Concepts
- Container Technology
- Cloud Computing Threats
- Cloud Computing Countermeasures
- Penetration Testing Fundamentals
- Fundamentals of Penetration Testing and its Benefits
- Various Types and Phases of Penetration Testing
- Guidelines and Recommendations for Penetration Testing
- Help Desk Technician
- Technical Support Specialist
- Systems Specialist
- Computer Support Specialist
- Cybersecurity Specialist
Exam Information
Certification : Ethical Hacking Essentials
Exam Length : 2 Hours
Exam Format : MCQ
No. of Questions: 75
If you have any questions, please contact your account manager or
Contact Us directly!