ESSENTIALS SERIES
The Essentials Series’ Massive Open Online Courses (MOOCs) contain eCourseware and video instruction, which is being offered free, with optional paid upgrades to course labs, exam prep, course assessments, and exam vouchers leading to certifications across each of the three Essentials Series courses.
​
EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics.
The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity.
The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity.
These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.
Gain foundational knowledge in cybersecurity.
Practice essentials skills such as how to defend networks and investigate them.
Challenge industry recognized exams and earn cybersecurity credentials to build and further your career.
​Exam & Certification
There are no eligibility criteria for the Essentials Series.
The certification is valid for three years from the date the certificate is issued.
The recertification window is at the end of
3-years, and EC-Council members may recertify by passing the exam again.
​
There are no annual fees or EC-Council Continuing Education Credits (ECE’s) required to maintain the certification credential during the three-year term.
Exam Length: 2 Hours
Exam Format: MCQ
Exam Platform: ECC Exam Centre
No. of Questions: 75
Certification: Course Specific (NDE, EHE, DFE)
Digital Forensics Essentials
Digital Forensics Essentials is a first-of-its-kind MOOC certification that offers foundational knowledge and skills on digital forensics with add-on labs for hands-on experience.
Twelve modules cover the fundamental concepts of digital forensics, such as dark web forensics, investigating web application attacks, and more.
MODULES YOU WILL LEARN:
Computer Forensics Fundamentals
Fundamentals of computer forensics and digital evidence.
​
Objectives of forensic readiness to reduce the cost of investigation.
​
Roles and responsibilities of a forensic investigator.
​
Legal compliance in computer forensics.
​
Computer Forensics Investigation Process
Forensic investigation process and its importance.
Forensic investigation phases.
Understanding Hard Disks and File Systems
Types of disk drives and their characteristics.
​
Booting process of Windows, Linux, and Mac operating systems.
​
Examine file system records during an investigation.
​
Data Acquisition and Duplication
Data acquisition fundamentals, methodologies, and their different types.
​
Determine the data acquisition formats.
​
Defeating Anti-forensics Techniques
Anti-forensics techniques and their countermeasures.
Windows Forensics
How to gather volatile and non-volatile information.
​
Perform Windows memory and registry analysis.
​
Analyze the cache, cookie, and history recorded in web browsers.
​
Examine Windows files and metadata.
​
Linux and Mac Forensics
Volatile and non-volatile data in Linux.
​
Analyze filesystem images using the sleuth kit.
​
Demonstrate memory forensics.
Mac forensics concepts.
​
Network Forensics
Event correlation concepts and types.
​
Identify indicators of compromise (IoCs) from network logs.
​
Investigate network traffic for suspicious activity.
​
Investigating Web Attacks
Web application forensics and web attacks.
​
Understand IIS and Apache web server logs.
​
Detect and investigate various attacks on web applications.
​
Dark Web Forensics
Dark web forensics investigation and how it works.
​
Tor browser forensics.
Investigating Email Crime
Email basics and how it can be used as evidence.
​
Techniques and steps used in email crime investigation.
​
Malware Forensics
Malware, its components, and distribution methods.
​
Malware forensics fundamentals and types of malware analysis.
​
Perform static malware analysis and dynamic malware analysis.
​
Conduct system and network behavior analysis
​
Tools You Will learn and Use
Linux, Windows, Sleuth Kit, Wireshark, Splunk, TOR browser, ESE Database View​
​
e-Learning resources including eBook and videos are available to all learners, free of charge.
Unlock powerful add-ons, including cloud labs that provide intensive skills training and practice, official EC-Council certification exams, exam preps, and certification of completion.
Ethical Hacking Essentials
Ethical Hacking Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in ethical hacking with add-on labs for hands-on experience.
The course contains 12 modules and add-on labs covering fundamental ethical hacking concepts, including emerging technologies like IoT and OT, cloud computing, etc.
MODULES YOU WILL LEARN:
Information Security Fundamentals
Information security fundamentals.
​
Information security laws and regulations.
​
​Ethical Hacking Fundamentals
Cyber Kill Chain methodology.
​
Hacking concepts, hacking cycle, and different hacker classes.
​
Ethical hacking concepts, scope, and limitations.
​
Information Security Threats and Vulnerabilities
Detect various threat sources and vulnerabilities in a network or system.
Different types of malwares.
​
Password Cracking Techniques and Countermeasures
Types of password cracking techniques.
​
Social Engineering Techniques and Countermeasures
Social engineering concepts and techniques.
​
Insider threats and identity theft concepts.
Network-Level Attacks and Countermeasures
Packet sniffing concepts and types.
​
Sniffing techniques and countermeasures.
​
DoS and DDoS attacks under sniffing attacks.
​
​Web Application Attacks and Countermeasures
Web Server Attacks.
​
Web Application Attacks.
​
Web Application Architecture and Vulnerability Stack.
​
Web Application Threats and Attacks.
​
SQL Injection Attacks.
​
Types of SQL Injection Attacks.
​
Wireless Attacks and Countermeasures
Types of Wireless Encryption.
​
Wireless Network-specific Attack Techniques.
​
Bluetooth Attacks.
​
Wireless Attack Countermeasures
​
Mobile Attacks and Countermeasures
Mobile Attack Anatomy.
​
Mobile Attack Vectors and Mobile Platform Vulnerabilities.
​
IoT and OT Attacks and Countermeasures
-
IoT Attacks
-
IoT Devices, their needs, and Application Areas.
-
IoT Threats and Attacks OT
-
-
Attacks.Understand OT Concepts
- ​OT Challenges and Attacks
-
OT Attacks Countermeasures
Cloud Computing Threats and Countermeasures
Cloud Computing Concepts.
​
Container Technology.
​
Cloud Computing Threats.
​
Cloud Computing Countermeasures.
​
Penetration Testing Fundamentals
Fundamentals of Penetration Testing and its Benefits.
​
Various Types and Phases of Penetration Testing.
​
Guidelines and Recommendations for Penetration Testing.
Tools You Will learn and Use
L0phtCrack, Netcraft, SQL Injection Detection Tool, Web Application Security Scanner, ARP Spoofing Detection Tools
​
e-Learning resources including eBook and videos are available to all learners, free of charge.
​
Unlock powerful add-ons, including cloud labs that provide intensive skills training and practice, official EC-Council certification exams, exam preps, and certification of completion.
Network defense essentials
Network Defense Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in network security with add-on labs for hands-on experience.
The course includes 12 modules and optional upgrades to lab ranges covering fundamental network security concepts, including IoT, cryptography, and PKI.
MODULES YOU WILL LEARN:
Network Security Fundamentals
Fundamentals of network security.
​
Network security protocols that govern the flow of data.
​
​Identification, Authentication, and Authorization
Access control principles, terminologies, and models.
Identity and access management (IAM).
​
Network Security Controls: Administrative Controls
Regulatory frameworks, laws, and acts.
Security policies, and how to conduct security and awareness training.
​
Network Security Controls: Physical Controls
Importance of physical security and physical security controls.
​
Physical security policies and procedures.
​
Best practices to strengthen workplace security.
Environmental controls.
​
Network Security Controls: Technical Controls
Types of bastion hosts and their role in network security.
​
IDS/IPS types and their role in network defense.
​
Types of honeypots and virtual private networks (VPNs).
​
Security incident and event management (SIEM)
Virtualization and Cloud Computing
Key concepts of virtualization and OS virtualization security.
​
Cloud computing fundamentals and cloud deployment models.
​
Cloud security best practices.
​
Wireless Network Security
Fundamentals of wireless networks and encryption mechanisms.
​
Wireless network authentication methods.
Implementing wireless network security measures.
​
Mobile Device Security
Mobile device connection methods and management.
​
Mobile use approaches in enterprises.
​
Security risks and guidelines associated with enterprise mobile usage policies.
​
Implement various enterprise-level mobile security management solutions.
Best practices on mobile platforms.
​
IoT Device Security
IoT devices, application areas, and communication models.
​
How security works in IoT-enabled environments.
​
Cryptography and PKI
Cryptographic tools, security techniques, and algorithms.
​
Public key infrastructure (PKI) to authenticate users and devices in the digital world.
Data Security
Data security and its importance.
​
Security controls for data encryption.
​
Perform data backup and retention.
​
Implement data loss prevention concepts.
​
Network Traffic Monitoring
Network traffic monitoring concepts.
​
Traffic signatures for normal and suspicious network traffic.
​
Perform network monitoring to detect suspicious traffic.
Tools You Will learn and Use
Data Recovery Wizard
​
e-Learning resources including eBook and videos are available to all learners, free of charge.
​
Unlock powerful add-ons, including cloud labs that provide intensive skills training and practice, official EC-Council certification exams, exam preps, and certification of completion.