Essentials Brochure1000
Essentials Brochure1000
"#$"%
7898-)5#*2;("<==8"8&'+*/*#6+*-5"8-)'(&">&'*&(
&"'()#*+,"-".%"
!"
!!!!
/'0$123+421*$.5
!"
' 1'
'(4)2*+ 1*20)%3'
!!!!
&&#%()*+&
,$5$'23+6)#".%$1%
!"
"!5 '
")3)(*+ 5./#%&)2&! '&&#%()*+&
!""#$%&'()*+&(("),-.)/-0-..-12")
!$%.345#6#()738#."#9:.&%3)7'.##."
!"#$%&'(&#)'*+$",-'./-'#&"0&1&2-34&5+"*5*+*6+*1&"%$"7898-)5#*2:
)7%
!""#$%&'()*#)+#',*-$.)*/-)
0'-123#41-'*)$5*-)&')*/-)
"46-$,-"0$&*4)ˎljȢǁȈɰƺȢɁɰljɽɁ
738#."#9:.&%3)D.-,#""&-$'(")E.#)&$)F#0'$?)&$)/<#"#)>$?:"%.&#"
The demand for cybersecurity professionals has only continued to grow, and extends
across a spectrum of industries, including banking and financial services, information
technology and management, government agencies, and consulting services.
*9-A#)'$?)7'.##.)B.-1%<
One can specialize in any domain of their choice, including ethical hacking, endpoint
security, digital forensics, security analysis, mobile forensics, incident handling, and more.
!""!#$%&'"("!)%!"
!"
!!!! !!!!
EC-Council’s Essentials Series is the first MOOC certification course series covering essential
skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials
(N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational
programs that help students and early career professionals choose their area of competency or
select a specific interest in cybersecurity.
The Essentials Series was designed to give students the foundation on which to build and develop
the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a
range of techniques across industry verticals, such as securing networks, mitigating cyber risks,
conducting forensic investigations, and more.
F#"&G$#?)83)%<#)!HA#.%"
The Essentials Series was designed by industry experts to provide an unbiased approach
to learning and exploring &'%0,*$4)6-,*)2$5"*&"-,. It empowers individuals to:
Practice essentials skills such as how to defend networks and investigate them
>$9(:?#?)>$)ICC7"J CA%&-$'()KD'&?L)MAG.'?#"J
H-(+"8-)'(&"!((&((4&5+"A""
B6%"C65D&
@*0&-"2&#+)'&("A"26%" 8&'+*/*#6+&"-/"8-432&+*-5
&?--.
2&#+)'&(
8&'+*/*#6+*-5"7E64"
F=59(*+&"G&(+*5D"-'"C&4-+&"H'-#+-'">&'1*#&("9"CH>I
Free Courseware: The Essentials series comes with free learning resources such as eCourseware,
lab tutorials, and video lectures that are easy to download and read on any device.
Lab Range (Paid): Practical hands-on learning in a simulated environment gives candidates a
competitive edge to hone their skills. Each course in the Essentials Series includes 12 modules
with learning exercises and lab ranges that provide a basic to intermediate knowledge of network
defense, ethical hacking, and digital forensics.
Certification (Paid): Each Essentials course comes with an onsite or remote certification exam.
Following a successful exam attempt, the course-specific certification credential will have a
validity period of three years from the date of the successful exam attempt.
Unlock paid add-ons, such as lab exercises within the modules, a certification of completion, and
certification exams at a fraction of the cost.
;<-)*<-:(?)E%%#$?)/<#"#)7-:."#"@
EC-Council’s Essentials Series programs and certifications build and validate candidates’
skills for their cybersecurity future. It is ideal for IT professionals who are seeking to 8#$54
into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will
readily find the program interesting, challenging, and useful.
!H'0)5#$G%<)))) ))J)Q)R-:."
!H'0)S-.0'%)))))) ))J)I7T
!H'0)D('%,-.0))) ))J)!77)!H'0)7#$%.# B#%)7#.%&,&#?)
U-V)-,)T:#"%&-$") ))J)WX
7#.%&,&9'%&-$))) ))J)7-:."#)*A#9&,&9)KUF!Y)!R!Y)FS!L)
=-8)P-(#")/<'%)O#$#,&%),.-0)/<#"#)!""#$%&'(")D.-G.'0"
Professionals in the following roles who are looking to enhance their knowledge or
transition from an IT role into cybersecurity would benefit from the Essentials Courses.
I-?:(#"J);<'%)a-:);&(()5#'.$
J" K)5064&5+62("-/"5&+,-'."(&#)'*+$
Z[ U#%1-.+)*#9:.&%3)S:$?'0#$%'(" J" L&+,-'."(&#)'*+$"3'-+-#-2("+M6+"D-1&'5"+M&"/2-,"-/"06+6
J" C&D)26+-'$"/'64&,-'.(N"26,(N"650"6#+(
U#%1-.+)*#9:.&%3)7-$%.-("J)
Z] E?0&$&"%.'%&6#)7-$%.-("
J" >&#)'*+$"3-2*#*&(N"650"M-,"+-"#-50)#+"(&#)'*+$"650"6,6'&5&(("
+'6*5*5D
J" O43-'+65#&"-/"3M$(*#62"(&#)'*+$"650"3M$(*#62"(&#)'*+$"#-5+'-2(
U#%1-.+)*#9:.&%3)7-$%.-("J)) J" HM$(*#62"(&#)'*+$"3-2*#*&("650"3'-#&0)'&(
Z^ D<3"&9'()7-$%.-(" J" ?&(+"3'6#+*#&("+-"(+'&5D+M&5",-'.326#&"(&#)'*+$
J" 751*'-54&5+62"#-5+'-2(
J" G$3&("-/"%6(+*-5"M-(+("650"+M&*'"'-2&"*5"5&+,-'."(&#)'*+$
U#%1-.+)*#9:.&%3)7-$%.-("J)
ZX /#9<$&9'()7-$%.-(")
J"
J"
OP>QOH>"+$3&("650"+M&*'"'-2&"*5"5&+,-'."0&/&5(&
G$3&("-/"M-5&$3-+("650"1*'+)62"3'*16+&"5&+,-'.("F@HL(I
J" >&#)'*+$"*5#*0&5+"650"&1&5+"4656D&4&5+"F>O7<I
J" R&$"#-5#&3+("-/"1*'+)62*S6+*-5"650"=>"1*'+)62*S6+*-5"(&#)'*+$
_&.%:'(&\'%&-$)'$?)7(-:?) J" 82-)0"#-43)+*5D"/)5064&5+62("650"#2-)0"0&32-$4&5+"4-0&2(
Z` 7-0A:%&$G J" 82-)0"(&#)'*+$"%&(+"3'6#+*#&(
J" O-G"0&1*#&(N"6332*#6+*-5"6'&6(N"650"#-44)5*#6+*-5"4-0&2(
Zb >-/)F#6&9#)*#9:.&%3
J" U-,"(&#)'*+$",-'.("*5"O-G9&56%2&0"&51*'-54&5+(
J" 8'$3+-D'63M*#"+--2(N"(&#)'*+$"+&#M5*V)&(N"650"62D-'*+M4(
[Z 7.3A%-G.'A<3)'$?)Dc> J" H)%2*#" .&$" *5/'6(+')#+)'&" FHROI" +-" 6)+M&5+*#6+&" )(&'(" 650"
0&1*#&("*5"+M&"0*D*+62",-'20
J" P6+6"(&#)'*+$"650"*+("*43-'+65#&
J" >&#)'*+$"#-5+'-2("/-'"06+6"&5#'$3+*-5
[[ F'%')*#9:.&%3 J" H&'/-'4"06+6"%6#.)3"650"'&+&5+*-5
J" O432&4&5+"06+6"2-(("3'&1&5+*-5"#-5#&3+(
J" L&+,-'."+'6//*#"4-5*+-'*5D"#-5#&3+(:
J" G'6//*#"(*D56+)'&("/-'"5-'462"650"()(3*#*-)("5&+,-'."+'6//*#:
[Q U#%1-.+)/.',,&9)I-$&%-.&$G
J" H&'/-'4"5&+,-'."4-5*+-'*5D"+-"0&+&#+"()(3*#*-)("+'6//*#:
/--(")a-:);&(()5#'.$)'$?)M"#
P-#.&'"?&5#M"/-'"(&#)'*+$N"!T>N"<*'60-'&"<P<N"U6(M862#N"<PW"#62#)26+-'N"U6(M<$K*2&(N"@&'68'$3+N"P6+6"
C&#-1&'$"T*S6'0N"650"T*'&(M6'.
» e-Learning resources including eBook and videos are available to all learners, free of charge.
» Unlock powerful add-ons, including cloud labs that provide intensive skills training and practice,
official EC-Council certification exams, exam preps and certification of completion.
!H'0)>$,-.0'%&-$
7#.%&,&9'%&-$))))))J)U#%1-.+)F#,#$9#)!""#$%&'("
!H'0)5#$G%<)))))J)Q)R-:." B#%)7#.%&,&#?)
!H'0)S-.0'%)))))J)I7T
U-V)-,)T:#"%&-$"J)WX
!.!*+$%/!('!&0!)"1%-
!"
!<'6=;54' #!#%&'
#()*+,+(- #.+(,!!%/,0)12*+0/!!&(34)+*5!!',,+3()
-!#($!"$%#3 "!*+)%$,(2-!)&$%2#"
8=
# @ !5A
/&0-0%#$!
!"#"$%&'() 1#*23#$4
#()*+,+(- @(8(*):*+08""""A(3*+8B"""""@)0,(33+08:; 5$2'#00&2)-.
&--'%*&$%2#("!*+)%$,( #!$62)7("!*+)%$,
78'659,5:9;5*"
$&#"<"&#=4=
$8-/3*)+:;"#08*)0;"&93*(13"":8-""&/2()>+30)9"#08*)0;"=8-"4:*:"=.?/+3+*+08
0%3%$&'(42)!#"%*"(5(%#*%0!#$()!"-2#"! !#*),-$%2#
!" !" !"
# $"% !"# $ % !!
!"#$%&'()))))))*+,-./0))1"('/2.,)
34567839:8;<
)
!"#"$%&'()!!!!"#$%&'&#!()*&+#)%!,-)+.#$
! #!&
!"#"$%&'() #()*+,+(- !8.)92*+08 &2(.+:;+3*
#!$62)7(0!4!#"! !$1%*&'(1&*7%#3
!"
0*('
# 54
#()*+,+(- 5(*60)7 4(,(8-()
!""!#$%&'"("!)%!" "!*+)%$,("-!*%&'%"$
012'($3*456'
!!!! !!!! !"
"!*+)!(+"!)
!"#$%&'( TM
)"*+,'#-'
.*(/'( #""&"#"'
#()*+,+(- &(./)( #012/*() '3()
This is a suggested learning pathway only. Programs can be taken independently in any order
depending on job role requirements and existing skill sets.
' 1'
!"
,#(-./0
!!!!
&&#%()*+&
"!5 '
")3)(*+ 5./#%&)2&! '&&#%()*+&
P#G&"%#.)U-1
EC-Council’s sole purpose is to build and refine the cybersecurity profession globally. The
organization helps individuals, organizations, educators, and governments address global
workforce problems through the development and curation of world-class cybersecurity
education programs and their corresponding certifications. EC-Council provides cybersecurity
services to some of the largest businesses around the world. Trusted by 7 of the Fortune 10, 47 of
the Fortune 100, the Department of Defense, the global intelligence community, NATO, and more
than 2,000 of the best universities, colleges, and training companies, EC-Council’s programs
have proliferated through 140 countries and have set the bar in cybersecurity education. EC-
Council is an ANSI 17024-accredited organization and has earned recognition from the DoD
under Directive 8140/8570, in the UK by the GCHQ, CREST, and a variety of other authoritative
bodies that influence the entire profession. Best known for the Certified Ethical Hacker program,
we are dedicated to equipping more than 230,000 information-age soldiers with the knowledge,
skills, and abilities required to fight and win against black hat adversaries.
!747-:$9&()E99.#?&%'%&-$")N)P#9-G$&%&-$J
DoD
ACE
Department of Defense
American Council on Education
Directive 8570
CNSS
Committee on National Security ANSI 17024
Systems American National Standards Institute