Ethical Hacking Essentials is a first-of-its-kind complimentary MOOC certification that provides foundational knowledge and skills in ethical hacking with add-on labs for hands-on experience. The course contains 12 modules and add-on labs covering fundamental ethical hacking concepts, including emerging technologies like IoT and OT, cloud computing etc.

Complete online at your own pace (Self-paced). Portal login details to follow in separate email.


What you will learn

Information Security Fundamentals:

  • Information security fundamentals
  • Information security laws and regulations

Ethical Hacking Fundamentals:

  • Cyber Kill Chain methodology 
  • Hacking concepts, hacking cycle and different hacker classes
  • Ethical hacking concepts, scope and limitations

Information Security Threat & Vulnerabilities:

  • Detect various treat sources and vulnerabilities in a network or system
  • Different types of malwares

Password Cracking Techniques and Countermeasures:

  • Types of password cracking techniques

Social Engineering Techniques and Countermeasures:

  • Social engineering concepts 
  • Insider threats and identify threat concepts

Network- Level Attacks and Countermeasures:

  • Packet sniffing concept and types 
  • Sniffing techniques and countermeasures
  • DoS and DDoS attacks under sniffing attacks 

Web Application Attacks and Countermeasures

  • Web server attacks
  • Web application attacks
  • Web application architecture and vulnerability stack
  • Web application threats and attacks 
  • SQL injection attacks
  • Types of SQL injection attacks 

Wireless Attacks and Countermeasures: 

  • Wireless terminology 
  • Types of wireless encryption 
  • Wireless network specific attacks
  • Bluetooth attacks
  • Wireless attack countermeasures

Mobile Attacks and Countermeasures:

  • Mobile attack anatomy 
  • Mobile attack vectors and mobile platform vulnerabilities 

IoT and OT Attacks and Countermeasures:

IoT Attacks:

  • IoT devices, their need and application areas 
  • IoT threats and attacks 

OT Attacks:

  • Understand OT concepts
  • OT challenges and attacks 
  • OT attacks countermeasures

Cloud Computing Threats and Countermeasures:

  • Cloud computing concepts
  • Container technology
  • Cloud computing threats
  • Cloud computing countermeasures

Penetration Testing Fundamentals:

  • Fundamentals of penetration testing and it's benefits
  • Various types and phases of penetration testing
  • Guidelines and recommendations for Penetration testing 

Tools you will learn/use:

L0phtCrack, Netcraft, SQL Injection Detection Tool, Web Application Security Scanner, ARP Spoofing Detection Tools