Original course: https://www.eccouncil.org/train-certify/ethical-hacking-essentials-ehe/ or https://www.coursera.org/learn/ethical-hacking-essentials-ehe
Course Overview:
Ethical Hacking Essentials
is an introductory course that covers cybersecurity fundamentals and ethical hacking. This hands-on program provides 15+ hours of video lessons, 11 labs, 12 modules, and real-world CTF challenges to give you a solid foundation in computer and network security.
What You'll Learn: - Security Fundamentals: Learn key concepts like password cracking, vulnerabilities, and threats. - Ethical Hacking Techniques: Master social engineering, network attacks, and countermeasures. - Web, Mobile, & IoT Attacks: Understand web, mobile, cloud, and IoT vulnerabilities and how to secure them. - Proctored Exam Certification: Get certified in cybersecurity essentials with a globally recognized certification. - Capstone Projects & CTF Challenges: Test your knowledge with real-world scenarios in capture-the-flag tasks. - Advanced Learning: Develop skills in penetration testing, cloud computing security, and mobile threats.
Your Certification: Earn a certification approved by multiple state Departments of Education , including Florida, Virginia, Ohio, and Arkansas, to boost your resume and gain job market value
Module 1/3. Understanding the Need for Security/3. Understanding the Need for Security.mp4
6.6 MB
Module 1/3. Understanding the Need for Security/subtitle.txt
2 KB
Module 1/3. Understanding the Need for Security/subtitles-en.vtt
3.7 KB
Module 1/4. Understanding the Security, Functionality, and Usability Triangle/4. Understanding the Security, Functionality, and Usability Triangle.mp4
9.1 MB
Module 1/4. Understanding the Security, Functionality, and Usability Triangle/subtitle.txt
3.1 KB
Module 1/4. Understanding the Security, Functionality, and Usability Triangle/subtitles-en.vtt
5.9 KB
Module 1/5. Understanding Motives, Goals, and Objectives of Information Security Attacks/5. Understanding Motives, Goals, and Objectives of Information Security Attacks.mp4
6.1 MB
Module 1/5. Understanding Motives, Goals, and Objectives of Information Security Attacks/subtitle.txt
1.9 KB
Module 1/5. Understanding Motives, Goals, and Objectives of Information Security Attacks/subtitles-en.vtt
3.2 KB
Module 1/6. Overview of Classification of Attacks/6. Overview of Classification of Attacks.mp4
13.7 MB
Module 1/6. Overview of Classification of Attacks/subtitle.txt
4.4 KB
Module 1/6. Overview of Classification of Attacks/subtitles-en.vtt
8.6 KB
Module 1/7. Overview of Information Security Attack Vectors/7. Overview of Information Security Attack Vectors.mp4
21.4 MB
Module 1/7. Overview of Information Security Attack Vectors/subtitle.txt
6.1 KB
Module 1/7. Overview of Information Security Attack Vectors/subtitles-en(1).vtt
12 KB
Module 1/8. Overview of Various Information Security Laws and Regulations/8. Overview of Various Information Security Laws and Regulations.mp4
48.2 MB
Module 1/8. Overview of Various Information Security Laws and Regulations/subtitle.txt
15.2 KB
Module 1/8. Overview of Various Information Security Laws and Regulations/subtitles-en(1).vtt