Cyber Security Category

EC-Council Ethical Hacking Essentials - Self-paced

  • Length 365 days access
  • Inclusions Exam voucher
Course overview
Book now

Why study this course

Begin Your Cybersecurity Journey with Hands-On, Technical Foundational Skills in Ethical Hacking. 

Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more. EC-Council’s ethical hacking essentials course provides hands-on practical experience to learners, thus giving them the skills necessary for a future in cybersecurity. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.  

  • 15+ hours of premium self-paced video training  

  • 11 lab activities in a simulated lab environment  

  • 750+ pages of ecourseware  

  • Capstone Projects with Real-World CTF Challenges  

  • Year-long access to courseware and 6-month access to labs  

  • Proctored exam voucher with 1-year validity  

  • Increase your value in the job market to advance your career  

  • Get globally recognised certification by EC-Council

Request Course Information


What you’ll learn

  • Key issues plaguing the information security world and information security laws and standards

  • Fundamentals of ethical hacking

  • Information security threats and vulnerabilities

  • Different types of malware

  • Different types of password-cracking techniques and countermeasures

  • Social engineering techniques, insider threats, identity theft, and countermeasures

  • Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures

  • Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures

  • Wireless encryption, wireless threats, and countermeasures

  • Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools

  • IoT and OT concepts, attacks, and countermeasures

  • Cloud computing technologies, cloud computing threats, attacks, and security techniques

  • Fundamentals of pen testing


EC-Council ATC Shield Logo

EC-Council at Lumify Work

The International Council of E-Commerce Consultants (EC-Council) is a member-based organisation that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), EC-Council Certified Security Analyst (ECSA) and Licensed Penetration Tester (LPT) certifications and cyber security courses. Lumify Work is the partner of choice for EC-Council in Australia.


Who is the course for?

  • School students, fresh graduates, Professionals, Career starters and switchers, IT / Technology / Cybersecurity teams with little or no work experience. 

  • Anyone who wants to start their cybersecurity career and master the fundamentals of security online.  

  • Anyone who wants to prepare for a cybersecurity career and aid their IT education.  

  • Professionals who want to get into the cybersecurity field but are unsure where to start their education journey. 


Course subjects

  • Information Security Fundamentals

  • Ethical Hacking Fundamentals 

  • Information Security Threats and Vulnerability Assessment 

  • Password Cracking Techniques and Countermeasures 

  • Social Engineering Techniques and Countermeasures 

  • Network Level Attacks and Countermeasures 

  • Web Application Attacks and Countermeasures 

  • Wireless Attacks and Countermeasures 

  • Mobile Attacks and Countermeasures 

  • IoT and OT Attacks and Countermeasures 

  • Cloud Computing Threats and Countermeasures 

  • Penetration Testing Fundamentals

Refer to the E|HE Outline for a deeper dive into the E|HE curriculum.


Prerequisites

No IT / Cybersecurity Experience Required.


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Select and book a course

Options

Can't find a date you like?

Contact sales