This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Certification Program
  • NetWitness Community
  • NetWitness Education
  • Certification Program
  • EC-Council - Ethical Hacking Essentials
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Printer Friendly Page
    • Report Inappropriate Content
No ratings

EC-Council - Ethical Hacking Essentials

kohe3
Occasional Contributor kohe3 Occasional Contributor
Occasional Contributor
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2022-06-29 08:04 AM - edited ‎2022-06-29 08:05 AM

 

 

Netwitness-Education-2C (2).png

 

Access Training
for Customers/Partners

Access Training
for NetWitness Employees

 

 

 

 

Free

 

 

 

Overview

Ethical Hacking Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in ethical. The course contains 12 modules and add-on labs covering fundamental ethical hacking concepts, including emerging technologies like IoT and OT, cloud computing, etc.

 

 

Modules
 
  • Information Security Fundamentals
    • Information security fundamentals
    • Information security laws and regulations
  • Ethical Hacking Fundamentals
    • Cyber Kill Chain methodology
    • Hacking concepts, hacking cycle, and different hacker classes
    • Ethical hacking concepts, scope, and limitations
  • Information Security Threats and Vulnerabilities
    • Detect various threat sources and vulnerabilities in a network or system
    • Different types of malwares
  • Password Cracking Techniques and Countermeasures
    • Types of password cracking techniques
  • Social Engineering Techniques and Countermeasures
    • Social engineering concepts and techniques
    • Insider threats and identity theft concepts
  • Network-Level Attacks and Countermeasures
    • Packet sniffing concepts and types
    • Sniffing techniques and countermeasures
    • DoS and DDoS attacks under sniffing attacks
  • Web Application Attacks and Countermeasures
    • Web Server Attacks
    • Web Application Attacks
    • Web Application Architecture and Vulnerability Stack
    • Web Application Threats and Attacks
    • SQL Injection Attacks
    • Types of SQL Injection Attacks
  • Wireless Attacks and Countermeasures
    • Wireless Terminology
    • Types of Wireless Encryption
    • Wireless Network-specific Attack Techniques
    • Bluetooth Attacks
    • Wireless Attack Countermeasures
  • Mobile Attacks and Countermeasures
    • Mobile Attack Anatomy
    • Mobile Attack Vectors and Mobile Platform Vulnerabilities
  • IoT and OT Attacks and Countermeasures
    • IoT Attacks
      • IoT Devices, their need and Application Areas
      • IoT Threats and Attacks
    • OT Attacks
      • Understand OT Concepts
      • OT Challenges and Attacks
      • OT Attacks Countermeasures
  • Cloud Computing Threats and Countermeasures
    • Cloud Computing Concepts
    • Container Technology
    • Cloud Computing Threats
    • Cloud Computing Countermeasures
  • Penetration Testing Fundamentals
    • Fundamentals of Penetration Testing and its Benefits
    • Various Types and Phases of Penetration Testing
    • Guidelines and Recommendations for Penetration Testing

 

Who Should Attend?
 
  • Help Desk Technician
  • Technical Support Specialist
  • Systems Specialist
  • Computer Support Specialist
  • Cybersecurity Specialist

 

Exam Information

Certification : Ethical Hacking Essentials
Exam Length : 2 Hours
Exam Format : MCQ
No. of Questions: 75

 

 

 

If you have any questions, please contact your account manager or Contact Us directly!

 

 

Labels:
  • Documentation
Was this article helpful? Yes No
1 Like
Share
Version history
Last update:
‎2022-06-29 08:05 AM
Updated by:
Occasional Contributor kohe3 Occasional Contributor
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.