0% found this document useful (0 votes)
7 views

Essentials Brochure1000

The document discusses the increasing demand for cybersecurity professionals due to the expanding threat landscape, particularly for roles such as ethical hackers and cybersecurity analysts. It introduces EC-Council's Essentials Series, a set of free Massive Open Online Courses (MOOCs) designed to provide foundational skills in cybersecurity, including network defense and digital forensics. The courses aim to equip learners with the necessary knowledge and practical skills to pursue careers in the fast-growing cybersecurity sector.

Uploaded by

Ravi A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Essentials Brochure1000

The document discusses the increasing demand for cybersecurity professionals due to the expanding threat landscape, particularly for roles such as ethical hackers and cybersecurity analysts. It introduces EC-Council's Essentials Series, a set of free Massive Open Online Courses (MOOCs) designed to provide foundational skills in cybersecurity, including network defense and digital forensics. The courses aim to equip learners with the necessary knowledge and practical skills to pursue careers in the fast-growing cybersecurity sector.

Uploaded by

Ravi A
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

!""#$%&'(")!

"#$"%
7898-)5#*2;("<==8"8&'+*/*#6+*-5"8-)'(&">&'*&(

&"'()#*+,"-".%"
!"

!!!!

,#(-./0 "#$#%&# '&&#%()*+&

/'0$123+421*$.5
!"

' 1'
'(4)2*+ 1*20)%3'
!!!!

&&#%()*+&

,$5$'23+6)#".%$1%
!"

"!5 '
")3)(*+ 5./#%&)2&! '&&#%()*+&

!""#$%&'()*+&(("),-.)/-0-..-12")
!$%.345#6#()738#."#9:.&%3)7'.##."
!"#$%&'(&#)'*+$",-'./-'#&"0&1&2-34&5+"*5*+*6+*1&"%$"7898-)5#*2:

Copyright EC-Council. All Rights Reserved.


;<3)=-&$)%<#)738#."#9:.&%3)>$?:"%.3@
Given that the threat landscape has increased in scope and remote workers are soft targets
for hackers, organizations across the globe are looking to hire qualified information and
cybersecurity specialists. The need for qualified ethical hackers, network defenders,
cybersecurity analysts, system administrators, SOC analysts, information security analysts,
and digital forensics analysts, among others, is only going to increase in the future.

)7%
!""#$%&'()*#)+#',*-$.)*/-)
0'-123#41-'*)$5*-)&')*/-)
"46-$,-"0$&*4)ˎljȢǁȈɰƺȢɁɰljɽɁ

738#."#9:.&%3)D.-,#""&-$'(")E.#)&$)F#0'$?)&$)/<#"#)>$?:"%.&#"

The demand for cybersecurity professionals has only continued to grow, and extends
across a spectrum of industries, including banking and financial services, information
technology and management, government agencies, and consulting services.

*9-A#)'$?)7'.##.)B.-1%<

Cybersecurity is a fast-growing sector globally and this offers tremendous job


opportunities for IT professionals and aspiring cybersecurity enthusiasts.

One can specialize in any domain of their choice, including ethical hacking, endpoint
security, digital forensics, security analysis, mobile forensics, incident handling, and more.

Copyright EC-Council. All Rights Reserved. C6#.6&#1 2


;<'%)&")%<#)!""#$%&'(")*#.&#"@)
The Essentials Series’ Massive Open Online Courses (MOOCs)
contain eCourseware and video instruction, which is being
offered free, with optional paid upgrades to course labs,
exam prep, course assessments, and exam vouchers leading
to certifications across each of the three Essentials Series
courses.

!""!#$%&'"("!)%!"
!"

,!"' ' 1' "!5 '


!"
!"

!!!! !!!!

,#(-./0 "#$#%&# '&&#%()*+& '(4)2*+ 1*20)%3 '&&#%()*+& ")3)(*+ 5./#%&)2&! '&&#%()*+&

EC-Council’s Essentials Series is the first MOOC certification course series covering essential
skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials
(N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational
programs that help students and early career professionals choose their area of competency or
select a specific interest in cybersecurity.

The Essentials Series was designed to give students the foundation on which to build and develop
the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a
range of techniques across industry verticals, such as securing networks, mitigating cyber risks,
conducting forensic investigations, and more.

F#"&G$#?)83)%<#)!HA#.%"

The Essentials Series was designed by industry experts to provide an unbiased approach
to learning and exploring &'%0,*$4)6-,*)2$5"*&"-,. It empowers individuals to:

Gain foundational knowledge in cybersecurity

Practice essentials skills such as how to defend networks and investigate them

Challenge industry recognized exams and earn cybersecurity credentials to


build and further your career

Copyright EC-Council. All Rights Reserved. ;<'%)&")!""#$%&'(")*#.&#"@ 3


7-:."#)I'%#.&'()N)O#$#,&%"

>$9(:?#?)>$)ICC7"J CA%&-$'()KD'&?L)MAG.'?#"J
H-(+"8-)'(&"!((&((4&5+"A""
B6%"C65D&
@*0&-"2&#+)'&("A"26%" 8&'+*/*#6+&"-/"8-432&+*-5
&?--.
2&#+)'&(
8&'+*/*#6+*-5"7E64"
F=59(*+&"G&(+*5D"-'"C&4-+&"H'-#+-'">&'1*#&("9"CH>I

Free Courseware: The Essentials series comes with free learning resources such as eCourseware,
lab tutorials, and video lectures that are easy to download and read on any device.

Lab Range (Paid): Practical hands-on learning in a simulated environment gives candidates a
competitive edge to hone their skills. Each course in the Essentials Series includes 12 modules
with learning exercises and lab ranges that provide a basic to intermediate knowledge of network
defense, ethical hacking, and digital forensics.

Certification (Paid): Each Essentials course comes with an onsite or remote certification exam.
Following a successful exam attempt, the course-specific certification credential will have a
validity period of three years from the date of the successful exam attempt.

Unlock paid add-ons, such as lab exercises within the modules, a certification of completion, and
certification exams at a fraction of the cost.

;<-)*<-:(?)E%%#$?)/<#"#)7-:."#"@
EC-Council’s Essentials Series programs and certifications build and validate candidates’
skills for their cybersecurity future. It is ideal for IT professionals who are seeking to 8#$54
into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will
readily find the program interesting, challenging, and useful.

%$(7,89-//485+:/ *01-,/-23,4.0(!5.63/4+/./ *+,--,(".+,.-,/

Copyright EC-Council. All Rights Reserved. 4


!H'0)N)7#.%&,&9'%&-$
There are no eligibility criteria for the Essentials Series. The certification is valid for three
years from the date the certificate is issued. The recertification window is at the end of
3-years, and EC-Council members may recertify by passing the exam again. There are no
annual fees or EC-Council Continuing Education Credits (ECE’s) required to maintain the
certification credential during the three-year term.

!H'0)5#$G%<)))) ))J)Q)R-:."
!H'0)S-.0'%)))))) ))J)I7T
!H'0)D('%,-.0))) ))J)!77)!H'0)7#$%.# B#%)7#.%&,&#?)
U-V)-,)T:#"%&-$") ))J)WX
7#.%&,&9'%&-$))) ))J)7-:."#)*A#9&,&9)KUF!Y)!R!Y)FS!L)

=-8)P-(#")/<'%)O#$#,&%),.-0)/<#"#)!""#$%&'(")D.-G.'0"
Professionals in the following roles who are looking to enhance their knowledge or
transition from an IT role into cybersecurity would benefit from the Essentials Courses.

Copyright EC-Council. All Rights Reserved. ;<-)*<-:(?)E%%#$?@ 5


7-:."#)C:%(&$#

9-*:#$;) <-8-',-) =,,-'*&53, Ȉɰ ƃ ˎɨɰɽӸɁǹӸȈɽɰӸȟȈȶǁ ÃÝÝ: ƺljɨɽȈˎƺƃɽȈɁȶ ɽȃƃɽ ɥɨɁʤȈǁljɰ


ǹɁʍȶǁƃɽȈɁȶƃȢȟȶɁʥȢljǁǼljƃȶǁɰȟȈȢȢɰȈȶȶljɽʥɁɨȟɰljƺʍɨȈɽʰʥȈɽȃƃǁǁӸɁȶȢƃƹɰǹɁɨȃƃȶǁɰӸ
#')->2-$&-'"-?)@/-)"#0$,-)&'"30%-,)AB)1#%03-,)5'%)#2*&#'53)02($5%-,)*#)356)$5'(-,)
ƺɁʤljɨȈȶǼǹʍȶǁƃȴljȶɽƃȢȶljɽʥɁɨȟɰljƺʍɨȈɽʰƺɁȶƺljɥɽɰӗȈȶƺȢʍǁȈȶǼŽɁěӗƺɨʰɥɽɁǼɨƃɥȃʰӗƃȶǁ
¶Žӝ

I-?:(#"J);<'%)a-:);&(()5#'.$

J" K)5064&5+62("-/"5&+,-'."(&#)'*+$
Z[ U#%1-.+)*#9:.&%3)S:$?'0#$%'(" J" L&+,-'."(&#)'*+$"3'-+-#-2("+M6+"D-1&'5"+M&"/2-,"-/"06+6

>?#$%&,&9'%&-$Y)E:%<#$%&9'%&-$Y)'$?) J" !##&(("#-5+'-2"3'*5#*32&(N"+&'4*5-2-D*&(N"650"4-0&2(


ZQ E:%<-.&\'%&-$ J" O0&5+*+$"650"6##&(("4656D&4&5+"FO!<I

J" C&D)26+-'$"/'64&,-'.(N"26,(N"650"6#+(
U#%1-.+)*#9:.&%3)7-$%.-("J)
Z] E?0&$&"%.'%&6#)7-$%.-("
J" >&#)'*+$"3-2*#*&(N"650"M-,"+-"#-50)#+"(&#)'*+$"650"6,6'&5&(("
+'6*5*5D

J" O43-'+65#&"-/"3M$(*#62"(&#)'*+$"650"3M$(*#62"(&#)'*+$"#-5+'-2(
U#%1-.+)*#9:.&%3)7-$%.-("J)) J" HM$(*#62"(&#)'*+$"3-2*#*&("650"3'-#&0)'&(
Z^ D<3"&9'()7-$%.-(" J" ?&(+"3'6#+*#&("+-"(+'&5D+M&5",-'.326#&"(&#)'*+$
J" 751*'-54&5+62"#-5+'-2(

J" G$3&("-/"%6(+*-5"M-(+("650"+M&*'"'-2&"*5"5&+,-'."(&#)'*+$
U#%1-.+)*#9:.&%3)7-$%.-("J)
ZX /#9<$&9'()7-$%.-(")
J"
J"
OP>QOH>"+$3&("650"+M&*'"'-2&"*5"5&+,-'."0&/&5(&
G$3&("-/"M-5&$3-+("650"1*'+)62"3'*16+&"5&+,-'.("F@HL(I
J" >&#)'*+$"*5#*0&5+"650"&1&5+"4656D&4&5+"F>O7<I

J" R&$"#-5#&3+("-/"1*'+)62*S6+*-5"650"=>"1*'+)62*S6+*-5"(&#)'*+$
_&.%:'(&\'%&-$)'$?)7(-:?) J" 82-)0"#-43)+*5D"/)5064&5+62("650"#2-)0"0&32-$4&5+"4-0&2(
Z` 7-0A:%&$G J" 82-)0"(&#)'*+$"%&(+"3'6#+*#&(

J" K)5064&5+62(" -/" ,*'&2&((" 5&+,-'.(" 650" &5#'$3+*-5"


4&#M65*(4(
ZW ;&.#(#"")U#%1-.+)*#9:.&%3 J" T*'&2&(("5&+,-'."6)+M&5+*#6+*-5"4&+M-0(
J" O432&4&5+*5D",*'&2&(("5&+,-'."(&#)'*+$"4&6()'&(

Copyright EC-Council. All Rights Reserved. U#%1-.+)F#,#$"#)!""#$%&'(" 6


J" <-%*2&"0&1*#&"#-55&#+*-5"4&+M-0("650"4656D&4&5+
J" <-%*2&")(&"633'-6#M&("*5"&5+&'3'*(&(
J" >&#)'*+$"'*(.("650"D)*0&2*5&("6((-#*6+&0",*+M"&5+&'3'*(&"4-%*2&"
Zd I-8&(#)F#6&9#)*#9:.&%3 )(6D&"3-2*#*&(
J" O432&4&5+" 16'*-)(" &5+&'3'*(&92&1&2" 4-%*2&" (&#)'*+$"
4656D&4&5+"(-2)+*-5(
J" ?&(+"3'6#+*#&("-5"4-%*2&"326+/-'4(

J" O-G"0&1*#&(N"6332*#6+*-5"6'&6(N"650"#-44)5*#6+*-5"4-0&2(
Zb >-/)F#6&9#)*#9:.&%3
J" U-,"(&#)'*+$",-'.("*5"O-G9&56%2&0"&51*'-54&5+(

J" 8'$3+-D'63M*#"+--2(N"(&#)'*+$"+&#M5*V)&(N"650"62D-'*+M4(
[Z 7.3A%-G.'A<3)'$?)Dc> J" H)%2*#" .&$" *5/'6(+')#+)'&" FHROI" +-" 6)+M&5+*#6+&" )(&'(" 650"
0&1*#&("*5"+M&"0*D*+62",-'20

J" P6+6"(&#)'*+$"650"*+("*43-'+65#&
J" >&#)'*+$"#-5+'-2("/-'"06+6"&5#'$3+*-5
[[ F'%')*#9:.&%3 J" H&'/-'4"06+6"%6#.)3"650"'&+&5+*-5
J" O432&4&5+"06+6"2-(("3'&1&5+*-5"#-5#&3+(

J" L&+,-'."+'6//*#"4-5*+-'*5D"#-5#&3+(:
J" G'6//*#"(*D56+)'&("/-'"5-'462"650"()(3*#*-)("5&+,-'."+'6//*#:
[Q U#%1-.+)/.',,&9)I-$&%-.&$G
J" H&'/-'4"5&+,-'."4-5*+-'*5D"+-"0&+&#+"()(3*#*-)("+'6//*#:

/--(")a-:);&(()5#'.$)'$?)M"#
P-#.&'"?&5#M"/-'"(&#)'*+$N"!T>N"<*'60-'&"<P<N"U6(M862#N"<PW"#62#)26+-'N"U6(M<$K*2&(N"@&'68'$3+N"P6+6"
C&#-1&'$"T*S6'0N"650"T*'&(M6'.

» e-Learning resources including eBook and videos are available to all learners, free of charge.
» Unlock powerful add-ons, including cloud labs that provide intensive skills training and practice,
official EC-Council certification exams, exam preps and certification of completion.

!H'0)>$,-.0'%&-$
7#.%&,&9'%&-$))))))J)U#%1-.+)F#,#$9#)!""#$%&'("
!H'0)5#$G%<)))))J)Q)R-:." B#%)7#.%&,&#?)
!H'0)S-.0'%)))))J)I7T
U-V)-,)T:#"%&-$"J)WX

Copyright EC-Council. All Rights Reserved. U#%1-.+)F#,#$"#)!""#$%&'(" 7


a-:.)D'%<1'3)%-)')D.-0&"&$G)7'.##.)&$)738#."#9:.&%3
EC-Council certifications help professionals secure their careers in cybersecurity. These
certifications have helped thousands of professionals further their careers in Fortune 500
companies. Students can choose between following the certification path or learning in-
demand skills of their choice to become future cybersecurity professionals.

!.!*+$%/!('!&0!)"1%-
!"

!<'6=;54' #!#%&'
#()*+,+(- #.+(,!!%/,0)12*+0/!!&(34)+*5!!',,+3()

-!#($!"$%#3 "!*+)%$,(2-!)&$%2#"
8=

# @ !5A
/&0-0%#$!
!"#"$%&'() 1#*23#$4
#()*+,+(- @(8(*):*+08""""A(3*+8B"""""@)0,(33+08:; 5$2'#00&2)-.

&--'%*&$%2#("!*+)%$,( #!$62)7("!*+)%$,
78'659,5:9;5*"
$&#"<"&#=4=
$8-/3*)+:;"#08*)0;"&93*(13"":8-""&/2()>+30)9"#08*)0;"=8-"4:*:"=.?/+3+*+08

0%3%$&'(42)!#"%*"(5(%#*%0!#$()!"-2#"! !#*),-$%2#
!" !" !"

# $"% !"# $ % !!
!"#$%&'()))))))*+,-./0))1"('/2.,)
34567839:8;<
)
!"#"$%&'()!!!!"#$%&'&#!()*&+#)%!,-)+.#$
! #!&
!"#"$%&'() #()*+,+(- !8.)92*+08 &2(.+:;+3*

#!$62)7(0!4!#"! !$1%*&'(1&*7%#3
!"

0*('
# 54
#()*+,+(- 5(*60)7 4(,(8-()

!""!#$%&'"("!)%!" "!*+)%$,("-!*%&'%"$

012'($3*456'
!!!! !!!! !"
"!*+)!(+"!)
!"#$%&'( TM

)"*+,'#-'
.*(/'( #""&"#"'
#()*+,+(- &(./)( #012/*() '3()

This is a suggested learning pathway only. Programs can be taken independently in any order
depending on job role requirements and existing skill sets.

Copyright EC-Council. All Rights Reserved. 7#.%&,&9'%&-$)D'%< 12


7$1*%'2#'+2+82#""#+$.+
89:"#%"1;#$'9+($'0+/8<8);.1$3=%+
!**!U/>E5*)*!P>!*
&"'()#*+,"-".%" /'0$123+421*$.5 ,$5$'23+6)#".%$1%
!" !"

' 1'
!"

,#(-./0
!!!!

"#$#%&# '&&#%()*+& '(4)2*+ 1*20)%3'


!!!!

&&#%()*+&
"!5 '
")3)(*+ 5./#%&)2&! '&&#%()*+&

P#G&"%#.)U-1

Copyright EC-Council. All Rights Reserved. 13


E8-:%)!747-:$9&(
;#)F#,&$#?)%<#)
*%'$?'.?"

EC-Council’s sole purpose is to build and refine the cybersecurity profession globally. The
organization helps individuals, organizations, educators, and governments address global
workforce problems through the development and curation of world-class cybersecurity
education programs and their corresponding certifications. EC-Council provides cybersecurity
services to some of the largest businesses around the world. Trusted by 7 of the Fortune 10, 47 of
the Fortune 100, the Department of Defense, the global intelligence community, NATO, and more
than 2,000 of the best universities, colleges, and training companies, EC-Council’s programs
have proliferated through 140 countries and have set the bar in cybersecurity education. EC-
Council is an ANSI 17024-accredited organization and has earned recognition from the DoD
under Directive 8140/8570, in the UK by the GCHQ, CREST, and a variety of other authoritative
bodies that influence the entire profession. Best known for the Certified Ethical Hacker program,
we are dedicated to equipping more than 230,000 information-age soldiers with the knowledge,
skills, and abilities required to fight and win against black hat adversaries.

!747-:$9&()E99.#?&%'%&-$")N)P#9-G$&%&-$J

DoD
ACE
Department of Defense
American Council on Education
Directive 8570

CNSS
Committee on National Security ANSI 17024
Systems American National Standards Institute

Veteran Affairs NCSC


Department of Veteran Affairs US National Cyber Security Centre

NICE Mapped US Army


National Initiative for Cybersecurity US Army Credentialing Assistance
Education

Copyright EC-Council. All Rights Reserved. E8-:%)!747-:$9&( 14


!"#"$%&'()
www.eccouncil.org

Copyright EC-Council. All Rights Reserved.

You might also like