Cybersecurity
Fundamentals

NDE, EHE & DFE Exam Prep

 

About the Program

The Essentials Series’ Massive Open Online Courses (MOOCs) contain eCourseware and video instruction, which is being offered free, with optional paid upgrades to course labs, exam prep, course assessments, and exam vouchers leading to certifications across each of the three Essentials Series courses.

EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity.

The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.

  • Professionals in the following roles who are looking to enhance their knowledge or transition from an IT role into cybersecurity would benefit from the Essentials Courses.

    Network Defense Essentials (NDE)

    • Local Area Network Specialist

    • Network Security Analyst

    • Network Technician

    • Network Administrator

    • Network Coordinator

    Ethical Hacking Essentials (EHE)

    • Help Desk Technician

    • Technical Support Specialist

    • Systems Specialist

    • Computer Support Specialist

    • Cybersecurity Specialist

    Digital Forensics Essentials (DFE)

    • Cybersecurity Technician

    • Cyber Forensic Specialist

    • Cyber Operations Technician

    • Intelligence Operations Specialist

    • IT Security Specialist

  • There are no eligibility criteria for the Essentials Series. The certification is valid for three years from the date the certificate is issued. The recertification window is at the end of 3-years, and EC-Council members may re-certify by passing the exam again. There are no annual fees or EC-Council Continuing Education Credits (ECE’s) required to maintain the certification credential during the three-year term.

    Exam Length : 2 Hours

    Exam Format : MCQ

    Exam Platform : ECC Exam Centre

    No. of Questions : 75

    Certification : Course Specific (NDE, EHE, DFE)

  • EC-Council’s Essentials Series programs and certifications build and validate candidates’ skills for their cybersecurity future. It is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.


Tuition & Program Info

To learn more about ETI’s tuition and financial aid options, click here.

Option 1

$0

Free video lectures and lab lectures for:

  • Network Defense Essentials (NDE)

  • Ethical Hacking Essentials (EHE)

  • Digital Forensics Essentials (DFE)

Option 2

$297

Optional paid upgrades for NDE, EHE, & DFE, including:

  • eBooks

  • iLabs (Lab Range)

  • Certification Exam Vouchers


Courses

Network Defense Essentials (NDE)

Network Defense Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in network security with add-on labs for hands-on experience. The course includes 12 modules and optional upgrades to lab ranges covering fundamental network security concepts, including IoT, cryptography, and PKI.

    • Fundamentals of network security

    • Network security protocols that govern the flow of data

    • Access control principles, terminologies, and models

    • Identity and access management (IAM)

    • Regulatory frameworks, laws, and acts

    • Security policies, and how to conduct security and awareness training

    • Importance of physical security and physical security controls

    • Physical security policies and procedures

    • Best practices to strengthen workplace security

    • Environmental controls

    • Types of bastion hosts and their role in network security

    • IDS/IPS types and their role in network defense

    • Types of honeypots and virtual private networks (VPNs)

    • Security incident and event management (SIEM)

    • Key concepts of virtualization and OS virtualization security

    • Cloud computing fundamentals and cloud deployment models

    • Cloud security best practices

    • Fundamentals of wireless networks and encryption mechanisms

    • Wireless network authentication methods

    • Implementing wireless network security measures

    • Mobile device connection methods and management

    • Mobile use approaches in enterprises

    • Security risks and guidelines associated with enterprise mobile usage policies

    • Implement various enterprise-level mobile security management solutions

    • Best practices on mobile platforms

    • IoT devices, application areas, and communication models

    • How security works in IoT-enabled environments

    • Cryptographic tools, security techniques, and algorithms

    • Public key infrastructure (PKI) to authenticate users and devices in the digital world

    • Data security and its importance

    • Security controls for data encryption

    • Perform data backup and retention

    • Implement data loss prevention concepts

    • Network traffic monitoring concepts.

    • Traffic signatures for normal and suspicious network traffic.

    • Perform network monitoring to detect suspicious traffic.

 

Ethical Hacking Essentials (EHE)

Ethical Hacking Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in ethical hacking with add-on labs for hands-on experience. The course contains 12 modules and add-on labs covering fundamental ethical hacking concepts, including emerging technologies like IoT and OT, cloud computing, etc.

    • Information security fundamentals

    • Information security laws and regulations

    • Cyber Kill Chain methodology

    • Hacking concepts, hacking cycle, and different hacker classes

    • Ethical hacking concepts, scope, and limitations

    • Detect various threat sources and vulnerabilities in a network or system

    • Different types of malwares

    • Types of password cracking techniques

    • Social engineering concepts and techniques

    • Insider threats and identity theft concepts

    • Packet sniffing concepts and types

    • Sniffing techniques and countermeasures

    • DoS and DDoS attacks under sniffing attacks

    • Web Server Attacks

    • Web Application Attacks

    • Web Application Architecture and Vulnerability Stack

    • Web Application Threats and Attacks

    • SQL Injection Attacks

    • Types of SQL Injection Attacks

    • Wireless Terminology

    • Types of Wireless Encryption

    • Wireless Network-specific Attack Techniques

    • Bluetooth Attacks

    • Wireless Attack Countermeasures

    • Mobile Attack Anatomy

    • Mobile Attack Vectors and Mobile Platform Vulnerabilities

  • IoT Attacks

    • IoT Devices, their need and Application Areas

    • IoT Threats and Attacks

    OT Attacks

    • Understand OT Concepts

    • OT Challenges and Attacks

    • OT Attacks Countermeasures

    • Cloud Computing Concepts

    • Container Technology

    • Cloud Computing Threats

    • Cloud Computing Countermeasures

    • Fundamentals of Penetration Testing and its Benefits

    • Various Types and Phases of Penetration Testing

    • Guidelines and Recommendations for Penetration Testing

 

Digital Forensics Essentials (DFE)

Digital Forensics Essentials is a first-of-its-kind MOOC certification that offers foundational knowledge and skills on digital forensics with add-on labs for hands-on experience. Twelve modules cover the fundamental concepts of digital forensics, such as dark web forensics, investigating web application attacks, and more.

    • Fundamentals of computer forensics and digital evidence

    • Objectives of forensic readiness to reduce the cost of investigation

    • Roles and responsibilities of a forensic investigator.

    • Legal compliance in computer forensics

    • Forensic investigation process and its importance

    • Forensic investigation phases

    • Types of disk drives and their characteristics

    • Booting process of Windows, Linux, and Mac operating systems

    • Examine file system records during an investigation

    • Data acquisition fundamentals, methodologies, and their different types

    • Determine the data acquisition format

    • Anti-forensics techniques and their countermeasures

    • How to gather volatile and non-volatile information

    • Perform Windows memory and registry analysis

    • Analyze the cache, cookie, and history recorded in web browsers

    • Examine Windows files and metadata

    • Volatile and non-volatile data in Linux

    • Analyze filesystem images using the sleuth kit

    • Demonstrate memory forensics

    • Mac forensics concepts

    • Network forensics fundamentals

    • Event correlation concepts and types

    • Identify indicators of compromise (IoCs) from network logs

    • Investigate network traffic for suspicious activity

    • Web application forensics and web attacks

    • Understand IIS and Apache web server logs

    • Detect and investigate various attacks on web applications

    • Dark web forensics investigation and how it works.

    • Tor browser forensics

    • Email basics and how it can be used as evidence

    • Techniques and steps used in email crime investigation

    • Malware, its components, and distribution methods

    • Malware forensics fundamentals and types of malware analysis

    • Perform static malware analysis and dynamic malware analysis

    • Conduct system and network behavior analysis