The Ethical Hacking Essentials (EHE): Hands-On Edition course delves into the principles and practices of ethical hacking.

Ethical Hacking Essentials: Hands-On Edition
本课程是 Information Security Analyst 专业证书 的一部分

位教师:EC-Council
访问权限由 Coursera Learning Team 提供
您将学到什么
Fundamentals of information security and ethical hacking
Information security threats and vulnerabilities, types of malwares, and vulnerability assessments
Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures
Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures
您将获得的技能
- Vulnerability Scanning
- Exploitation techniques
- Application Security
- Penetration Testing
- Cyber Attacks
- Cloud Security
- Wireless Networks
- Cybersecurity
- Security Awareness
- Vulnerability Assessments
- Infrastructure Security
- Internet Of Things
- Encryption
- Threat Modeling
- Threat Detection
- Network Security
- Brute-force attacks
要了解的详细信息

添加到您的领英档案
88 项作业
了解顶级公司的员工如何掌握热门技能

积累 Security 领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 通过 EC-Council 获得可共享的职业证书

该课程共有12个模块
Attackers break into systems for various reasons. Therefore, it is important to understand how, and why, malicious hackers attack and exploit systems. This module provides an insight into the different elements of information security.
涵盖的内容
9个视频8个作业
9个视频• 总计55分钟
- Course Introduction• 7分钟
- Introduction• 1分钟
- Understanding the Need for Security• 3分钟
- Understanding the Elements of Information Security• 2分钟
- Understanding the Security, Functionality, and Usability Triangle• 4分钟
- Understanding Motives, Goals, and Objectives of Information Security Attacks• 3分钟
- Overview of Classification of Attacks• 6分钟
- Overview of Information Security Attack Vectors• 8分钟
- Overview of Various Information Security Laws and Regulations• 21分钟
8个作业• 总计90分钟
- Information Security Fundamentals• 20分钟
- Understanding the Need for Security• 10分钟
- Understanding the Elements of Information Security• 10分钟
- Understanding the Security, Functionality, and Usability Triangle• 10分钟
- Understanding Motives, Goals, and Objectives of Information Security Attacks• 10分钟
- Overview of Classification of Attacks• 10分钟
- Overview of Information Security Attack Vectors• 10分钟
- Overview of Various Information Security Laws and Regulations• 10分钟
Ethical hacking allows organizations to objectively analyze their current security posture. Nowadays, the role of an ethical hacker is gaining prominence. An ethical hacker intentionally penetrates the security infrastructure to identify and fix security loopholes. It provides an insight into cyber kill chain methodology, hacking concepts, and hacker classes.
涵盖的内容
8个视频8个作业1个应用程序项目
8个视频• 总计58分钟
- Introduction• 2分钟
- Understanding the Cyber Kill Chain Methodology• 4分钟
- Understanding Tactics, Techniques, and Procedures (TTPs)• 5分钟
- Overview of Indicators of Compromise (IoCs)• 4分钟
- Overview of Hacking Concepts and Hacker Classes• 10分钟
- Understanding Different Phases of Hacking Cycle• 5分钟
- Understanding Ethical Hacking Concepts and Its Scope• 20分钟
- Overview of Ethical Hacking Tools• 8分钟
8个作业• 总计90分钟
- Ethical Hacking Fundamentals• 20分钟
- Understanding the Cyber Kill Chain Methodology• 10分钟
- Understanding Tactics, Techniques, and Procedures (TTPs)• 10分钟
- Overview of Indicators of Compromise (IoCs)• 10分钟
- Overview of Hacking Concepts and Hacker Classes• 10分钟
- Understanding Different Phases of Hacking Cycle• 10分钟
- Understanding Ethical Hacking Concepts and Its Scope• 10分钟
- Overview of Ethical Hacking Tools• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Recent trends in cyber security breaches illustrate that no system or network is immune to attacks. It is important to understand the difference between a security threat and a vulnerability. Security threats are incidents that negatively impact the organization’s IT infrastructure, whereas vulnerabilities are security gapsor flaws in a system or network that make threats possible, tempting hackers to exploit them. This module provides an insight into cyber security threats and vulnerability assessment.
涵盖的内容
7个视频7个作业1个应用程序项目
7个视频• 总计152分钟
- Introduction• 2分钟
- Understanding the Threat and Threat Sources• 9分钟
- Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web• 18分钟
- Overview of Different Types of Malware and Malware Countermeasures• 77分钟
- Understanding Vulnerability and Vulnerability Classification• 17分钟
- Understanding Vulnerability Assessment and Vulnerability Management Life Cycle• 21分钟
- Understanding Vulnerability Assessment Tools and Vulnerability Exploitation• 8分钟
7个作业• 总计80分钟
- Information Security Threats and Vulnerability Assessment• 20分钟
- Understanding the Threat and Threat Sources• 10分钟
- Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web• 10分钟
- Overview of Different Types of Malware and Malware Countermeasures• 10分钟
- Understanding Vulnerability and Vulnerability Classification• 10分钟
- Understanding Vulnerability Assessment and Vulnerability Management Life Cycle • 10分钟
- Understanding Vulnerability Assessment Tools and Vulnerability Exploitation• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Weak password selection has been the most common security weakness faced by organizations and individuals in recent times. Attackers use many sophisticated techniques and tools to crack passwords and gain access to critical systems and networks. This module provides an in-depth understanding of password cracking techniques and the corresponding defensive measures that can help individuals and organizations create strong password policies and protect personal or corporate information.
涵盖的内容
6个视频6个作业1个应用程序项目
6个视频• 总计40分钟
- Introduction• 2分钟
- Understanding the Password Cracking and Password Complexity• 4分钟
- Understanding Microsoft Authentication• 3分钟
- Understanding Various Types of Password Attacks• 20分钟
- Overview of Password Cracking Tools• 2分钟
- Understanding Countermeasures against Password Attacks• 10分钟
6个作业• 总计70分钟
- Password Cracking Techniques and Countermeasures• 20分钟
- Understanding the Password Cracking and Password Complexity• 10分钟
- Understanding Microsoft Authentication• 10分钟
- Understanding Various Types of Password Attacks• 10分钟
- Overview of Password Cracking Tools• 10分钟
- Understanding Countermeasures against Password Attacks• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
This module provides an overview of social engineering. Although it focuses on fallacies and advocates effective countermeasures, the possible methods of extracting information from another human being rely on attackers’ ingenuity. The features of these techniques make them an art, but the psychological nature of some of them makes them a science. The bottom line is that there is no ready defense against social engineering; only constant vigilance can circumvent the social engineering techniques used by attackers. This module provides an insight into human-based, computer-based, and mobile-based social engineering techniques.
涵盖的内容
6个视频6个作业1个应用程序项目
6个视频• 总计71分钟
- Introduction• 1分钟
- Understanding Social Engineering Concepts• 20分钟
- Understanding Various Social Engineering Techniques• 18分钟
- Understanding Insider Threats• 11分钟
- Understanding Identity Theft• 5分钟
- Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures• 16分钟
6个作业• 总计70分钟
- Social Engineering Techniques and Countermeasures• 20分钟
- Understanding Social Engineering Concepts• 10分钟
- Understanding Various Social Engineering Techniques• 10分钟
- Understanding Insider Threats• 10分钟
- Understanding Identity Theft• 10分钟
- Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Attackers use various attack strategies to compromise the security of a network, potentially causing disruption, damage, and loss to organizations and individuals. Therefore, it is important for security professionals to have an understanding of these attack strategies because such an understanding is essential for protecting the network from various attacks. It provides insight into various network-level attacks, such as sniffing, DoS attacks, session hijacking, etc. This module also familiarizes students with various network security countermeasures.
涵盖的内容
9个视频9个作业1个应用程序项目
9个视频• 总计62分钟
- Introduction• 2分钟
- Understanding Packet Sniffing and Types of Sniffing• 13分钟
- Understanding Various Sniffing Techniques and Tools• 12分钟
- Understanding Different Sniffing Countermeasures • 7分钟
- Overview of Different Types of DoS and DDoS Attacks• 11分钟
- Understanding Different DoS/DDoS Attack Tools• 3分钟
- Understanding Different DoS/DDoS Attack Countermeasures and Protection Tools• 3分钟
- Overview of Session Hijacking and Types of Session Hijacking• 7分钟
- Understanding Different Session Hijacking Tools and Countermeasures• 5分钟
9个作业• 总计100分钟
- Network Level Attacks and Countermeasures• 20分钟
- Understanding Packet Sniffing and Types of Sniffing• 10分钟
- Understanding Various Sniffing Techniques and Tools• 10分钟
- Understanding Different Sniffing Countermeasures • 10分钟
- Overview of Different Types of DoS and DDoS Attacks• 10分钟
- Understanding Different DoS/DDoS Attack Tools• 10分钟
- Understanding Different DoS/DDoS Attack Countermeasures and Protection Tools• 10分钟
- Overview of Session Hijacking and Types of Session Hijacking• 10分钟
- Understanding Different Session Hijacking Tools and Countermeasures• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Web applications are becoming increasingly vulnerable to sophisticated threats and attack vectors. This module familiarizes students with web-server attacks and countermeasures. It discusses the web-application architecture and vulnerability stack. This module also familiarizes students with various web-application threats, attacks, and countermeasures. In addition, it discusses different types of structured query language (SQL) injection attacks and countermeasures.
涵盖的内容
9个视频9个作业1个应用程序项目
9个视频• 总计105分钟
- Introduction• 2分钟
- Understanding Web Server Concepts and Attacks• 34分钟
- Understanding Different Web Server Attack Tools and Countermeasures• 4分钟
- Overview of Web Application Architecture and Vulnerability Stack• 13分钟
- Understanding Different Web Application Threats and Attacks• 13分钟
- Understanding Different Web Application Attack Tools and Countermeasures• 7分钟
- Overview of Different Types of SQL Injection Attacks• 24分钟
- Understanding Different SQL Injection Tools• 3分钟
- Understanding Different SQL Injection Attack Countermeasures• 4分钟
9个作业• 总计100分钟
- Web Application Attacks and Countermeasures• 20分钟
- Understanding Web Server Concepts and Attacks• 10分钟
- Understanding Different Web Server Attack Tools and Countermeasures• 10分钟
- Overview of Web Application Architecture and Vulnerability Stack• 10分钟
- Understanding Different Web Application Threats and Attacks• 10分钟
- Understanding Different Web Application Attack Tools and Countermeasures• 10分钟
- Overview of Different Types of SQL Injection Attacks• 10分钟
- Understanding Different SQL Injection Tools• 10分钟
- Understanding Different SQL Injection Attack Countermeasures• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Wireless networks are cheaper and easier to maintain than wired networks. An attacker can easily compromise a wireless network without proper security measures or an appropriate network configuration. Because high-security mechanisms for wireless networks may be expensive. This module describes wireless networks, wireless network standards, wireless encryption algorithms, wireless-network attack techniques, and countermeasures to protect wireless networks.
涵盖的内容
8个视频8个作业1个应用程序项目
8个视频• 总计64分钟
- Introduction• 1分钟
- Overview of Wireless Terminology • 6分钟
- Overview of Wireless Encryption Algorithms• 10分钟
- Understanding Wireless Network-Specific Attack Techniques• 20分钟
- Overview of Different Wireless Attack Tools• 7分钟
- Understanding Bluetooth Attack Techniques• 13分钟
- Overview of Various Wireless Attack Countermeasures• 4分钟
- Overview of Different Wireless Security Tools• 2分钟
8个作业• 总计85分钟
- Wireless Attacks and Countermeasures• 20分钟
- Overview of Wireless Terminology • 10分钟
- Overview of Wireless Encryption Algorithms• 10分钟
- Understanding Wireless Network-Specific Attack Techniques• 10分钟
- Overview of Different Wireless Attack Tools• 10分钟
- Understanding Bluetooth Attack Techniques• 10分钟
- Overview of Various Wireless Attack Countermeasures• 10分钟
- Overview of Different Wireless Security Tools• 5分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Believing that surfing the Internet on mobile devices is safe, many users fail to enable their existing security software. The popularity of smartphones and their moderately strong security mechanisms have made them attractive targets for attackers. This module explains the potential threats to mobile platforms and provides guidelines for using mobile devices securely.
涵盖的内容
6个视频6个作业1个应用程序项目
6个视频• 总计50分钟
- Introduction• 2分钟
- Understanding Anatomy of a Mobile Attack• 10分钟
- Understanding Mobile Platform Attack Vectors• 4分钟
- Understanding Mobile Platform Vulnerabilities• 20分钟
- Understanding Mobile Device Management• 7分钟
- Overview of Mobile Security Guidelines and Security Tools• 6分钟
6个作业• 总计70分钟
- Mobile Attacks and Countermeasures• 20分钟
- Understanding Anatomy of a Mobile Attack• 10分钟
- Understanding Mobile Platform Attack Vectors• 10分钟
- Understanding Mobile Platform Vulnerabilities• 10分钟
- Understanding Mobile Device Management• 10分钟
- Overview of Mobile Security Guidelines and Security Tools• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
The Internet of Things (IoT) has evolved from the convergence of wireless technology, microelectromechanical systems, micro-services, and the Internet. IoT has introduced a range of new technologies with associated capabilities into our daily lives. The main objective of this module is to explain the potential threats to IoT and OT platforms and to provide guidelines for securing IoT devices and OT infrastructure from evolving threats and attacks.
涵盖的内容
7个视频7个作业1个应用程序项目
7个视频• 总计97分钟
- Introduction• 2分钟
- Understanding IoT Concepts• 10分钟
- Understanding IoT attacks and IoT attack Tools• 33分钟
- Overview of IoT Attack Countermeasures and Security Tools• 5分钟
- Understanding OT Concepts• 18分钟
- Understanding OT Attacks and OT Attack Tools• 24分钟
- Overview of OT Attack Countermeasures and Security Tools• 5分钟
7个作业• 总计80分钟
- IoT and OT Attacks and Countermeasures• 20分钟
- Understanding IoT Concepts• 10分钟
- Understanding IoT attacks and IoT attack Tools• 10分钟
- Overview of IoT Attack Countermeasures and Security Tools • 10分钟
- Understanding OT Concepts• 10分钟
- Understanding OT Attacks and OT Attack Tools• 10分钟
- Overview of OT Attack Countermeasures and Security Tools• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Cloud computing is an emerging technology that delivers computing services, such as online business applications, online data storage, and webmail over the Internet. Cloud implementation enables a distributed workforce, reduces organization expenses, provides data security, etc. This module provides insight into cloud computing concepts, container technology, cloud computing threats, and cloud computing security to meet the security requirements.
涵盖的内容
7个视频7个作业1个应用程序项目
7个视频• 总计85分钟
- Introduction• 1分钟
- Understanding Cloud Computing Concepts• 23分钟
- Overview of Container Technology• 23分钟
- Understanding Cloud Computing Threats• 18分钟
- Overview of Cloud Attacks and Tools• 9分钟
- Understanding Cloud Attack Countermeasures• 9分钟
- Overview of Various Cloud Computing Security Tools• 2分钟
7个作业• 总计80分钟
- Cloud Computing Threats and Countermeasures• 20分钟
- Understanding Cloud Computing Concepts• 10分钟
- Overview of Container Technology• 10分钟
- Understanding Cloud Computing Threats• 10分钟
- Overview of Cloud Attacks and Tools• 10分钟
- Understanding Cloud Attack Countermeasures• 10分钟
- Overview of Various Cloud Computing Security Tools• 10分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
With the drastic increase in cyberattacks, it is important for organizations to conduct regular penetration tests to reveal hidden vulnerabilities and weaknesses in their IT infrastructure and to ensure the effectiveness of current cybersecurity controls. Penetration testing helps organizations in developing and implementing proactive security measures beforehand and in thwarting evolving threats. This module discusses the importance of penetration testing in an organization and explains the crucial role that a tester plays in identifying vulnerabilities.
涵盖的内容
7个视频7个作业2个应用程序项目
7个视频• 总计92分钟
- Introduction• 2分钟
- Understanding Penetration Testing and its Benefits• 9分钟
- Understanding Types of Penetration Testing• 7分钟
- Understanding Phases of Penetration Testing• 6分钟
- Overview of Penetration Testing Methodologies• 2分钟
- Overview of Guidelines and Recommendations for Penetration Testing• 59分钟
- Understanding Risks Associated with Penetration Testing• 8分钟
7个作业• 总计80分钟
- Penetration Testing Fundamentals• 20分钟
- Understanding Penetration Testing and its Benefits• 10分钟
- Understanding Types of Penetration Testing• 10分钟
- Understanding Phases of Penetration Testing• 10分钟
- Overview of Penetration Testing Methodologies• 10分钟
- Overview of Guidelines and Recommendations for Penetration Testing• 10分钟
- Understanding Risks Associated with Penetration Testing• 10分钟
2个应用程序项目• 总计120分钟
- Ethical Hacking Lab• 60分钟
- Capstone• 60分钟
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方

提供方

Best known for the Certified Ethical Hacker program, EC-Council builds individual and team/organization cyber capabilities through the Certified Ethical Hacker Program and other programs including Certified Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst, Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst, Certified Incident Handler, as well as the Certified Chief Information Security Officer.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.





