-
Introduction to Required Skills for Security: This module introduces the essential prerequisites for understanding cybersecurity, laying the groundwork for further learning.
-
Introduction & Overview: Provides a high-level overview of ethical hacking concepts and principles, setting the context for subsequent modules.
-
UNIX/Linux: Focuses on essential skills for working with UNIX and Linux operating systems, which are fundamental in ethical hacking and penetration testing scenarios.
-
Introducing Linux: Further explores the Linux operating system and its role in cybersecurity and penetration testing.
-
Overview of Virtual Machines: This module introduces the use of virtualization technology and virtual labs for practicing ethical hacking techniques in a safe and controlled environment.
-
Introduction to Vulnerability Assessment: This module covers the basic concepts of vulnerability assessment, a key step in the ethical hacking process.
-
Introduction to the Hacking Process: Provides an overview of the various stages involved in ethical hacking, from reconnaissance to maintaining access.
-
Challenges of Staying Current: Discusses the importance of continuous learning and adapting to the evolving landscape of cybersecurity threats and technologies.
Learning objectives
Upon completion of the EHCS course, you should be able to understand the fundamentals of ethical hacking and its significance, identify cyber threats, use tools for penetration testing, secure networks and systems, and analyze and report on breaches. The course also aims to build skills in Unix/Linux, virtualization, vulnerability assessment, hacking methodologies, and protocol analysis.
Intended audience
This course is suitable for individuals seeking to enhance their cybersecurity skills and acquire practical knowledge in ethical hacking, including various IT security professionals.