EC-Council

Ethical Hacking Essentials (EHE)

This course is part of Cybersecurity Attack and Defense Fundamentals Specialization

Taught in English

Some content may not be translated

EC-Council

Instructor: EC-Council

34,596 already enrolled

Included with Coursera Plus

Course

Gain insight into a topic and learn the fundamentals

4.6

(289 reviews)

|

97%

Beginner level
No prior experience required
32 hours (approximately)
Flexible schedule
Learn at your own pace

What you'll learn

  • Fundamentals of information security and ethical hacking

  • Information security threats and vulnerabilities, types of malwares, and vulnerability assessments

  • Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures

  • Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures

Skills you'll gain

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

88 quizzes

Course

Gain insight into a topic and learn the fundamentals

4.6

(289 reviews)

|

97%

Beginner level
No prior experience required
32 hours (approximately)
Flexible schedule
Learn at your own pace

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Cybersecurity Attack and Defense Fundamentals Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 12 modules in this course

Attackers break into systems for various reasons. Therefore, it is important to understand how, and why, malicious hackers attack and exploit systems. This module provides an insight into the different elements of information security.

What's included

9 videos8 quizzes

Ethical hacking allows organizations to objectively analyze their current security posture. Nowadays, the role of an ethical hacker is gaining prominence. An ethical hacker intentionally penetrates the security infrastructure to identify and fix security loopholes. It provides an insight into cyber kill chain methodology, hacking concepts, and hacker classes.

What's included

8 videos8 quizzes

Recent trends in cyber security breaches illustrate that no system or network is immune to attacks. It is important to understand the difference between a security threat and a vulnerability. Security threats are incidents that negatively impact the organization’s IT infrastructure, whereas vulnerabilities are security gapsor flaws in a system or network that make threats possible, tempting hackers to exploit them. This module provides an insight into cyber security threats and vulnerability assessment.

What's included

7 videos7 quizzes

Weak password selection has been the most common security weakness faced by organizations and individuals in recent times. Attackers use many sophisticated techniques and tools to crack passwords and gain access to critical systems and networks. This module provides an in-depth understanding of password cracking techniques and the corresponding defensive measures that can help individuals and organizations create strong password policies and protect personal or corporate information.

What's included

6 videos6 quizzes

This module provides an overview of social engineering. Although it focuses on fallacies and advocates effective countermeasures, the possible methods of extracting information from another human being rely on attackers’ ingenuity. The features of these techniques make them an art, but the psychological nature of some of them makes them a science. The bottom line is that there is no ready defense against social engineering; only constant vigilance can circumvent the social engineering techniques used by attackers. This module provides an insight into human-based, computer-based, and mobile-based social engineering techniques.

What's included

6 videos6 quizzes

Attackers use various attack strategies to compromise the security of a network, potentially causing disruption, damage, and loss to organizations and individuals. Therefore, it is important for security professionals to have an understanding of these attack strategies because such an understanding is essential for protecting the network from various attacks. It provides insight into various network-level attacks, such as sniffing, DoS attacks, session hijacking, etc. This module also familiarizes students with various network security countermeasures.

What's included

9 videos9 quizzes

Web applications are becoming increasingly vulnerable to sophisticated threats and attack vectors. This module familiarizes students with web-server attacks and countermeasures. It discusses the web-application architecture and vulnerability stack. This module also familiarizes students with various web-application threats, attacks, and countermeasures. In addition, it discusses different types of structured query language (SQL) injection attacks and countermeasures.

What's included

9 videos9 quizzes

Wireless networks are cheaper and easier to maintain than wired networks. An attacker can easily compromise a wireless network without proper security measures or an appropriate network configuration. Because high-security mechanisms for wireless networks may be expensive. This module describes wireless networks, wireless network standards, wireless encryption algorithms, wireless-network attack techniques, and countermeasures to protect wireless networks.

What's included

8 videos8 quizzes

Believing that surfing the Internet on mobile devices is safe, many users fail to enable their existing security software. The popularity of smartphones and their moderately strong security mechanisms have made them attractive targets for attackers. This module explains the potential threats to mobile platforms and provides guidelines for using mobile devices securely.

What's included

6 videos6 quizzes

The Internet of Things (IoT) has evolved from the convergence of wireless technology, microelectromechanical systems, micro-services, and the Internet. IoT has introduced a range of new technologies with associated capabilities into our daily lives. The main objective of this module is to explain the potential threats to IoT and OT platforms and to provide guidelines for securing IoT devices and OT infrastructure from evolving threats and attacks.

What's included

7 videos7 quizzes

Cloud computing is an emerging technology that delivers computing services, such as online business applications, online data storage, and webmail over the Internet. Cloud implementation enables a distributed workforce, reduces organization expenses, provides data security, etc. This module provides insight into cloud computing concepts, container technology, cloud computing threats, and cloud computing security to meet the security requirements.

What's included

7 videos7 quizzes

With the drastic increase in cyberattacks, it is important for organizations to conduct regular penetration tests to reveal hidden vulnerabilities and weaknesses in their IT infrastructure and to ensure the effectiveness of current cybersecurity controls. Penetration testing helps organizations in developing and implementing proactive security measures beforehand and in thwarting evolving threats. This module discusses the importance of penetration testing in an organization and explains the crucial role that a tester plays in identifying vulnerabilities.

What's included

7 videos7 quizzes

Instructor

Instructor ratings
4.7 (95 ratings)
EC-Council
EC-Council
5 Courses46,046 learners

Offered by

EC-Council

Recommended if you're interested in Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

Showing 3 of 289

4.6

289 reviews

  • 5 stars

    75.25%

  • 4 stars

    15.25%

  • 3 stars

    4.74%

  • 2 stars

    1.69%

  • 1 star

    3.05%

MB
5

Reviewed on Mar 30, 2023

MH
5

Reviewed on Apr 24, 2023

SD
4

Reviewed on Aug 13, 2023

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions