Ethical Hacking Essentials (EHE) v1 - iLabs + Exam Prep w/ ECC Exam Voucher w/ RPS

Ethical Hacking Essentials (EHE) v1 - iLabs + Exam Prep w/ ECC Exam Voucher w/ RPS

  • $149.99
    Unit price per 


 

Product Details:

iLabs Access Term:  6 Months
Exam Prep Access Term:  12 Months
Exam Voucher: (Expires 12 months post distribution)


Access the authorized lab resources for Ethical Hacking Essentials (EHE), developed and authored by EC-Council! (www.eccouncil.org)

This license will provide you with 6 months access to EC-Council's exclusive iLabs portal. Practice your skills, refine your skills, follow the instructions, or go outside of the instructions. These are NOT simulations and this is one range you will never break!

(Average Time for Course Completion: 18 Hours, 10 Minutes)

 

EHEv1 Course Outline:

1. Information Security Fundamentals *NO LAB OFFERED

2. Ethical Hacking Fundamentals

3. Information Security Threats and Vulnerabilities

4. Password Cracking Techniques and Countermeasures

5. Social Engineering Techniques and Countermeasures

6. Network Level Attacks and Countermeasures

7. Web Application Attacks and Countermeasures

8. Wireless Attacks and Countermeasures

9. Mobile Attacks and Countermeasures

10. IoT and OT Attacks and Countermeasures

11. Cloud Computing Threats and Countermeasures

12. Penetration Testing Fundamentals *NO LAB OFFERED

 

The Official EC-Council Ethical Hacking Essentials (EHE) Version 1 Exam Prep offering.

 

Purchase the official Ethical Hacking Essentials (EHE) certification exam voucher with Remote Proctor Services (RPS), developed and authored by EC-Council! No exam eligibility application required!

This exam voucher will provide you with 1 exam attempt towards the EHE certification credential.

 

EHEv1 Exam Format:

Exam Length: 2 Hours

Exam Format: Multiple Choice

Exam Platform: ECC Exam Center

# of Questions: 75

Passing Score: 70%


About Ethical Hacking Essentials (EHE)v1:

Information security refers to securing data and information systems from unauthorized access, unauthorized use, misuse, destruction, or alteration. The goal of information security is to protect the confidentiality, integrity, and availability of digital information. 

 

Information security plays a vital role in all organizations. It is a state of affairs where information, information processing, and communication are protected against confidentiality, integrity, and availability of the information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data. 

 

Information security is one of the required elements constituting the quality of information and information systems. Precaution to information security risks and taking adequate and sufficient information security measures are part of the good information processing practice required in particular by the data protection laws and more broadly, part of the good information management practice. 

 

The Ethical Hacking Essentials (EHE) program covers the fundamental concepts of information security and ethical hacking. It equips students with the skills required to identify the increasing information security threats which reflect on the security posture of the organization and implement general security controls. 

 

This program gives a holistic overview of the key components of information security. The course is designed for those interested in learning the various fundamentals of information security and ethical hacking and aspire to pursue a career in information security. 

 

Target Job Roles:

  • Help Desk Technician 
  • Technical Support Specialist 
  • Desktop Support Technician 
  • Cyber Crime Analyst 
  • Cybersecurity Specialist 
  • Cybersecurity Technician 
  • Desktop Support 
  • IT Support Specialist 
  • Network Administrator 
  • Incident & Intrusion Analyst 
  • IT Security Specialist 
  • Network Technical Specialist 
  • Cyber Forensic Specialist 
  • Intelligence Operations Specialist 
  • Cyber Operations Technician