Ec-council | Learning
The Bases of Hacking Ethics

Learn about ethical hacking: threats, vulnerabilities, IoT, network attacks, and 29 practical laboratories to develop your cybersecurity skills.
About Ethical Hacking Essentials Racing
Course outline
Course outline:
- Fundamentals of information security
- Fundamentals of ethical hacking
- Information security threats and vulnerabilities
- Password decryption techniques and countermeasures
- Social engineering techniques and countermeasures
- Network attacks and countermeasures
- Attacks on web applications and countermeasures
- Wireless attacks and countermeasures
- Mobile attacks and countermeasures
- IoT and OT attacks (operational technologies) and countermeasures
- Threats related to cloud computing and countermeasures
- Fundamentals of intrusion tests
Objectives of the course
Objectives of the course
This training program addresses key information security threats, ethical hacking methodologies, network attacks, countermeasures, and the fundamentals of intrusion tests to prepare participants to understand and counter modern cyber threats.
Information security issues +
- Discuss key issues affecting information security.
- Review information security laws and regulations.
Ethical hacking methodology +
- Understand the Cyber Kill Chain methodology.
- Discuss concepts of ethical hacking and hacking.
- Identify the hacker categories and phases of a hacking cycle.
- Evaluate the essential tools of ethical hacking.
Threats and vulnerabilities +
- Examine various information security threats and vulnerabilities.
- Identify different types of malware.
- Conduct vulnerability assessments.
Password attacks and social engineering +
- Explain and use different password decryption techniques.
- Understand attacks on social engineering, internal threats and identity theft.
- Discuss associated countermeasures.
Network attacks and countermeasures +
- Examine network attacks: sniffing, denial of service (DoS) attacks, and session hijacking.
- Discuss countermeasures to protect networks.
Attacks on applications +
- Review the operation of web servers and the top 10 OWASP attacks.
- Understand SQL injections and discuss countermeasures to apply.
Wireless threats and attacks +
- Discuss different types of wireless encryption.
- Examine wireless threats and attacks.
- Propose appropriate countermeasures.
Security of mobile platforms +
- Describe attack vectors on mobile platforms.
- Understand mobile device management and mobile security guidelines.
- Identify essential mobile security tools.
IoT and OT threats +
- Discuss concepts related to the Internet of Things (IoT) and operational technologies (OT).
- Examine threats and attacks related to IoT and OT.
- Propose appropriate countermeasures.
Cloud computing security +
- Describe the various cloud computing technologies.
- Examine cloud-related threats and attacks.
- Identify safety techniques and measures.
Intrusion tests +
- Discuss the fundamentals of intrusion tests and their advantages.
- Understand the strategies and phases of intrusion tests.
- Review guidelines for effective intrusion testing.
Review
Success Score
In order to maintain the high integrity of our certification exams, EC-Cuncil exams are offered in several forms (i.e., different sets of questions). Each version is carefully analysed by beta tests with an appropriate sample under the supervision of a committee of experts in this field, ensuring that each of our examinations has not only academic rigour, but also applicability in the « real world ». We also have a process to determine the degree of difficulty of each issue. This individual rating then contributes to a « pass score » overall for each version of the exam. To ensure that each version meets equal evaluation standards, pass scores are defined for each form of examination. Depending on the version of the previous exam, pass scores may vary from 60% to 78%.
Details of the examination
Duration of examination 2 hours
Format of the review : Multiple choices
Review platform : ECC Review Centre
Number of questions : 75
Certification : Essentials of Hacking Ethics
Roles
- Computer Support Technician
- Technical Support Officer
- Office Support Technician
- Cybercrime Analyst
- Cybersecurity Specialist
- Cyber Security Technician
- Office support
- Office Support Technician
- Network administrator
- Incident and intrusion analyst
- Information Security Officer
- Technical Network Specialist
- Cybercriminalist Specialist
- Intelligence Operations Officer
- Cyber Operations Technician


