Cybersecurity
Fundamentals
NDE, EHE & DFE Exam Prep
About the Program
The Essentials Series’ Massive Open Online Courses (MOOCs) contain eCourseware and video instruction, which is being offered free, with optional paid upgrades to course labs, exam prep, course assessments, and exam vouchers leading to certifications across each of the three Essentials Series courses.
EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity.
The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.
-
Professionals in the following roles who are looking to enhance their knowledge or transition from an IT role into cybersecurity would benefit from the Essentials Courses.
Network Defense Essentials (NDE)
Local Area Network Specialist
Network Security Analyst
Network Technician
Network Administrator
Network Coordinator
Ethical Hacking Essentials (EHE)
Help Desk Technician
Technical Support Specialist
Systems Specialist
Computer Support Specialist
Cybersecurity Specialist
Digital Forensics Essentials (DFE)
Cybersecurity Technician
Cyber Forensic Specialist
Cyber Operations Technician
Intelligence Operations Specialist
IT Security Specialist
-
There are no eligibility criteria for the Essentials Series. The certification is valid for three years from the date the certificate is issued. The recertification window is at the end of 3-years, and EC-Council members may re-certify by passing the exam again. There are no annual fees or EC-Council Continuing Education Credits (ECE’s) required to maintain the certification credential during the three-year term.
Exam Length : 2 Hours
Exam Format : MCQ
Exam Platform : ECC Exam Centre
No. of Questions : 75
Certification : Course Specific (NDE, EHE, DFE)
-
EC-Council’s Essentials Series programs and certifications build and validate candidates’ skills for their cybersecurity future. It is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.
Tuition & Program Info
To learn more about ETI’s tuition and financial aid options, click here.
Option 1
$0
Free video lectures and lab lectures for:
Network Defense Essentials (NDE)
Ethical Hacking Essentials (EHE)
Digital Forensics Essentials (DFE)
Option 2
$297
Optional paid upgrades for NDE, EHE, & DFE, including:
eBooks
iLabs (Lab Range)
Certification Exam Vouchers
Courses
Network Defense Essentials (NDE)
Network Defense Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in network security with add-on labs for hands-on experience. The course includes 12 modules and optional upgrades to lab ranges covering fundamental network security concepts, including IoT, cryptography, and PKI.
-
Fundamentals of network security
Network security protocols that govern the flow of data
-
Access control principles, terminologies, and models
Identity and access management (IAM)
-
Regulatory frameworks, laws, and acts
Security policies, and how to conduct security and awareness training
-
Importance of physical security and physical security controls
Physical security policies and procedures
Best practices to strengthen workplace security
Environmental controls
-
Types of bastion hosts and their role in network security
IDS/IPS types and their role in network defense
Types of honeypots and virtual private networks (VPNs)
Security incident and event management (SIEM)
-
Key concepts of virtualization and OS virtualization security
Cloud computing fundamentals and cloud deployment models
Cloud security best practices
-
Fundamentals of wireless networks and encryption mechanisms
Wireless network authentication methods
Implementing wireless network security measures
-
Mobile device connection methods and management
Mobile use approaches in enterprises
Security risks and guidelines associated with enterprise mobile usage policies
Implement various enterprise-level mobile security management solutions
Best practices on mobile platforms
-
IoT devices, application areas, and communication models
How security works in IoT-enabled environments
-
Cryptographic tools, security techniques, and algorithms
Public key infrastructure (PKI) to authenticate users and devices in the digital world
-
Data security and its importance
Security controls for data encryption
Perform data backup and retention
Implement data loss prevention concepts
-
Network traffic monitoring concepts.
Traffic signatures for normal and suspicious network traffic.
Perform network monitoring to detect suspicious traffic.
Ethical Hacking Essentials (EHE)
Ethical Hacking Essentials is a first-of-its-kind MOOC certification that provides foundational knowledge and skills in ethical hacking with add-on labs for hands-on experience. The course contains 12 modules and add-on labs covering fundamental ethical hacking concepts, including emerging technologies like IoT and OT, cloud computing, etc.
-
Information security fundamentals
Information security laws and regulations
-
Cyber Kill Chain methodology
Hacking concepts, hacking cycle, and different hacker classes
Ethical hacking concepts, scope, and limitations
-
Detect various threat sources and vulnerabilities in a network or system
Different types of malwares
-
Types of password cracking techniques
-
Social engineering concepts and techniques
Insider threats and identity theft concepts
-
Packet sniffing concepts and types
Sniffing techniques and countermeasures
DoS and DDoS attacks under sniffing attacks
-
Web Server Attacks
Web Application Attacks
Web Application Architecture and Vulnerability Stack
Web Application Threats and Attacks
SQL Injection Attacks
Types of SQL Injection Attacks
-
Wireless Terminology
Types of Wireless Encryption
Wireless Network-specific Attack Techniques
Bluetooth Attacks
Wireless Attack Countermeasures
-
Mobile Attack Anatomy
Mobile Attack Vectors and Mobile Platform Vulnerabilities
-
IoT Attacks
IoT Devices, their need and Application Areas
IoT Threats and Attacks
OT Attacks
Understand OT Concepts
OT Challenges and Attacks
OT Attacks Countermeasures
-
Cloud Computing Concepts
Container Technology
Cloud Computing Threats
Cloud Computing Countermeasures
-
Fundamentals of Penetration Testing and its Benefits
Various Types and Phases of Penetration Testing
Guidelines and Recommendations for Penetration Testing
Digital Forensics Essentials (DFE)
Digital Forensics Essentials is a first-of-its-kind MOOC certification that offers foundational knowledge and skills on digital forensics with add-on labs for hands-on experience. Twelve modules cover the fundamental concepts of digital forensics, such as dark web forensics, investigating web application attacks, and more.
-
Fundamentals of computer forensics and digital evidence
Objectives of forensic readiness to reduce the cost of investigation
Roles and responsibilities of a forensic investigator.
Legal compliance in computer forensics
-
Forensic investigation process and its importance
Forensic investigation phases
-
Types of disk drives and their characteristics
Booting process of Windows, Linux, and Mac operating systems
Examine file system records during an investigation
-
Data acquisition fundamentals, methodologies, and their different types
Determine the data acquisition format
-
Anti-forensics techniques and their countermeasures
-
How to gather volatile and non-volatile information
Perform Windows memory and registry analysis
Analyze the cache, cookie, and history recorded in web browsers
Examine Windows files and metadata
-
Volatile and non-volatile data in Linux
Analyze filesystem images using the sleuth kit
Demonstrate memory forensics
Mac forensics concepts
-
Network forensics fundamentals
Event correlation concepts and types
Identify indicators of compromise (IoCs) from network logs
Investigate network traffic for suspicious activity
-
Web application forensics and web attacks
Understand IIS and Apache web server logs
Detect and investigate various attacks on web applications
-
Dark web forensics investigation and how it works.
Tor browser forensics
-
Email basics and how it can be used as evidence
Techniques and steps used in email crime investigation
-
Malware, its components, and distribution methods
Malware forensics fundamentals and types of malware analysis
Perform static malware analysis and dynamic malware analysis
Conduct system and network behavior analysis