New members: get your first 7 days of ITTutorPro Premium for free! Join for free

Ethical Hacking Course (ECC 312-50)

Course Description

32.57 Hours

239 Video

Want to learn how to hack?

White-Hat” hacking to be more specific. The Ethical Hacking v10 course covers ethical hacking of networks and system penetration testing. This course covers all of the exam objectives for the EC-Council exam ECC 312-50 version 10 exam. Students are taken step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows and Kali Linux-based. You have access and instructions on setting up a fully virtual environment to allow you to gain practical hands-on experience during the course. A broad range of examples used by hackers is covered.

The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored, or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.

An Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. It demonstrates proficiency in ethical hacking concepts and techniques. The topics in this course cover a broad range of concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.

How Much Can I Earn?

With a strong focus on information security these days, positions related to security in the U.S., an ethical hacker salary can average between $107,000 to $115,000 annually. Individuals accomplishing this certification are often IT Security Specialist, Security Engineers and Penetration Testers. is a great resource for up-to-date information on the Ethical Hacker Salary in the United States.

An exceptional compliment to this course is our hands-on CompTIA PenTest+ course. Both courses provide you with an in-depth of all things hacking and testing. For those really serious about cybersercurity, ITU offers a complete line of Cybersecurity and security courses including CompTIA CySA+, CompTIA CASP+, CompTIA Security+, Cisco CCNA Security and more. All included for one low price in our All-Access IT Certification products.

Key Learning Topics In This Course
Footprinting, scanning, and enumeration
Vulnerability analysis
Sniffing and Spoofing
Social engineering
Denial of Service
Web server, web application, and database hacking
System hacking using various forms of malware and tools
Wireless network and mobile device hacking
Evading IDS
Firewalls and Honeypots
Cloud computing and Internet of Things hacking


Share on:

Course Syllabus

Module 1 – Introduction to Ethical Hacking

  1. Module 1 Notes
  2. Introduction
  3. Introduction to Hacking
  4. Information Security Threats and Attack Vectors
  5. Hacking Concepts
  6. Ethical Hacking Concepts and Scope
  7. Information Security Controls Part 1
  8. Information Security Controls Part 2
  9. Information Security Laws and Standards

Module 2 – Footprinting and Reconnaissance

  1. Module 2 Notes
  2. Footprinting and Reconnaissance
  3. Footprinting Methodology
  4. Google Hacking
  5. FootPrinting Through Social Networking
  6. Website Foot Printing
  7. Email Foot Printing
  8. Competitive Intelligence Gathering
  9. WhoIs Foot Printing
  10. DNS Logical and Geographical Foot Printing
  11. Network Footprinting
  12. Foot Printing
  13. Foot Printing Tools
  14. Foot Printing Penetration Testing
  15. Conduct Recon with Ping Act
  16. Query DNS with NSLookUp Act
  17. Discover Website Subdomain with Sublist3r Act
  18. Obtain OSINT Information About a Person wit Pipl Act
  19. Gather Contact and Host Information with theHarvester Act
  20. Automate OSINT Research with Recon-ng Act
  21. Get Started with Metasploit Act
  22. Conduct Open Source Intelligence with OSR Framework Act
  23. Obtain Whois Information with Smart Whois Act
  24. Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
  25. Create an Offline Copy of a Website with HTTrack Act
  26. Trace an Email with eMail Tracker Pro Act

Module 3 – Network Scanning

  1. Module 3 Notes
  2. Network Scanning
  3. Discovery Scans
  4. Port Scans
  5. Nmap
  6. Nmap Stealth Scans
  7. Nmap Options
  8. H-ping and Other Scanners
  9. SSDP Scanning
  10. Scanning Beyond IDS and Firewall
  11. Banner Grabbing
  12. Scanning Pen Testing
  13. Checking for Live Systems with Angry IP Scanner Act
  14. Network Scanning with MegaPing Act
  15. Advanced Scanning with nmap Act
  16. Packet Crafting with Hping3 Act
  17. Packet Crafting with Colasoft Packet Builder Act

Module 4 – Enumeration

  1. Module 4 Notes
  2. Enumeration
  3. Enumeration Technicques Tools
  4. NetBIOS Enumeration
  5. SNMP Enumeration
  6. LDAP Enumeration
  7. NTP Enumeration
  8. SMTP and DNS Enumeration
  9. Enumeration Countermeasures
  10. Enumeration Penetration Testing
  11. Enumerate NetBIOS Information with SuperScan Act
  12. Enumerate NetBIOS Information with NetBIOS Enumerator Act
  13. Enumerate NetBIOS and LDAP Information with Hyena Act
  14. Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act

Module 5 – Vulnerability Analysis

  1. Module 5 Notes
  2.  Vulnerability Analysis
  3.  Vulnerability Assessment Solutions
  4.  Vulnerability Scoring Systems
  5. Vulnerability Assessment Tools and Reports
  6.  Perform a Vulnerability Scan and Analysis with Nessus Act

Module 6 – Malware Threats

  1.  Module 6 Notes
  2.  Malware Threats
  3.  Trojan Concepts
  4.  Trojan Types
  5.  Trojan Tools
  6. Virus and Worm Concepts
  7.  Virus Types
  8.  Malware Analysis
  9.  Malware Reverse Engineering
  10. Malware Detection
  11.  Malware Countermeasures
  12.  Malware Penetration Testing
  13.  Infect a Victim with a Remote Access Trojan Act

Module 7 – Sniffing

  1. Module 7 Notes
  2.  Sniffing Concepts
  3.  DHCP Attacks
  4.  MAC Attacks
  5.  ARP Poisoning
  6.  DNS Poisoning
  7.  Sniffing Tools
  8.  Sniffing Countermeasures
  9.  Sniff a Clear Text HTTP Session with Wireshark Act
  10.  Intercept and Crack a Network Login Act

Module 8 – Social Engineering

  1.  Module 8 Notes
  2.  Social Engineering
  3.  Human Based Social Engineering
  4.  Computer Based Social Engineering
  5.  Additional Types of Social Enginnering
  6.  Social Engineering Countermeasures
  7.  Social Engineering Penetration Testing
  8.  Fool a User with a Baited USB Stick Act
  9.  Harvest Credentials with Spear Phishing Act

Module 9 – Denial of Service

  1.  Module 9 Notes
  2.  Denial of Service
  3.  Common Dos-DDoS Attack Types
  4.  Additional DoS Attack Types
  5.  BotNets
  6.  DoS Countermeasures
  7.  Additional DoS Countermeasures
  8.  DoS Penetration Testing
  9.  Perform a DoS Attack With the Low Orbit ION Cannon Act
  10.  Step Up the DoS Attack With the High Orbit ION Cannon Act
  11.  Perform a Slowloris DoS Attack Act

Module 10 – Session Hijacking

  1. Module 10 Notes
  2.  Session Hijacking
  3.  Browser Session Hijacking
  4.  Way to Compromise a Session Token
  5.  Client Side Attacks
  6.  Hijacking at the Network Level
  7.  Session Hijacking Tools
  8.  Session Hijacking Countermeasures
  9.  Session Hijacking Testing
  10.  Perform a MITM Attack with Ettercap Act

Module 11 – Hacking Webservers

  1.  Module 11 Notes
  2.  Hacking Web Servers
  3.  Webserver Attacks
  4.  Methodology of Webserver Attacks
  5.  Webserver Attack and Defense Tools
  6.  Webserver General Defense
  7.  Webserver Specific Attack Countermeasures
  8.  Webserver Patch Management
  9.  Webserver Pen Testing
  10.  Footprint a Web Server with IDServe Act
  11.  Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
  12.  Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
  13.  Brute Force a Web Server with Medusa Act

Module 12 – Hacking Web Applications

  1. Module 12 Notes
  2.  Hacking Web Applications
  3.  Web App Vulnerabilities and Exploits
  4.  Web Application Threats
  5.  Injection Attacks
  6.  Hidden Fields and Clickjacking
  7.  Cross Site Attacks
  8.  Additional Web App Attacks
  9.  Web Hacking Methodology
  10.  Web App Hacking Countermeasures
  11.  Web App Security Tools
  12.  Web Application Penetration Testing
  13.  Conduct a Simple Command Injection Attack Act
  14.  Inject a Malicious Link with Cross Site Scripting Act
  15.  Conduct a Cross Site Request Forgery Attack

Module 13 – SQL Injection

  1.  Module 13 Notes
  2.  SQL Injection
  3.  Types of SQL Injection
  4.  SQL Injection Methodology
  5.  SQL Injection Tools
  6.  SQL Injection Countermeasures
  7.  SQL Injection Penetration Testing
  8.  SQL Injection Act

Module 14 – Hacking Wireless Networks

  1.  Module 14 Notes
  2.  Hacking Wireless Networks
  3.  Wireless Discovery and Mapping
  4.  WiFi Sniffers
  5.  WiFi Attacks
  6.  WiFi Cracking
  7.  Wireless Hacking Tools
  8.  Bluetooth Hacking
  9.  Wireless Hacking Countermeasures
  10.  Wireless Security Tools
  11.  Wireless Penetration Testing
  12.  Crack a WEP Key with Aircrack-ng Act
  13.  Crack a WPA Key with Aircrack-ng Act

Module 15 – System Hacking


  1.  Module 15 Notes
  2.  System Hacking Methodology
  3.  Windows System Vulnerabilities and Exploits
  4.  Linux System Vulnerablities and Exploits
  5.  Password Cracking Methods
  6.  Network Service Password Cracking
  7.  Windows Password Cracking
  8.  Linux Password Cracking
  9.  Password Cracking Tools
  10.  Other Methods of Obtaining Passwords
  11.  Keylogging
  12.  Spyware
  13.  RootKits
  14.  Hiding Files
  15.  Steganography
  16.  Privilege Escalation
  17.  Creating and Maintaining Remote Access
  18.  Hiding Evidence
  19.  System Hacking Penetration Testing
  20.  Spoof Name Resolution and Capture Credentials with Responder Act
  21.  Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
  22.  Crack Passwords with L0pht7 Act
  23.  Exploit Client Side Vulnerabilities Act
  24.  Track User Activity with Spyware Act
  25.  View and Clear Audit Policies with Auditpol Act
  26.  Hide Data Using Whitespace Steganography Act
  27.  Hide Data Using Least Significant Bit Steganography Act
  28.  Cover Your Tracks Act

Module 16 – Hacking Mobile Platforms

  1.  Module 16 Notes
  2.  Hacking Mobile Platforms
  3.  Hacking Android OS
  4.  Rooting Android
  5.  Securing Android
  6.  Hacking iOS
  7.  Jailbreaking iOS
  8.  Securing iOS
  9.  Hacking Windows Phone OS
  10.  Hacking Blackberry
  11.  Mobile Device Management
  12.  Mobile Security Guidelines and Tools
  13.  Mobile Penetration Testing
  14.  Prepare Your Wireless Email Environment Act
  15.  Pwn a Mobile Device with Metasploit Act
  16.  Use a Mobile Device in a DDoS Campaign Act
  17.  Return Your VMs to Original Configuration Act
  18.  Uninstall Main Activity Malware from Android Act

Module 17 – Evading IDS, Firewalls, and Honeypots

  1.  Module 17 Notes
  2.  Evading IDS Firewalls and Honeypots
  3.  Firewalls
  4.  Honeypots
  5.  IDS Firewalls and Honeypots Tools
  6.  Evasion
  7.  Evasion Countermeasures
  8.  IDS Firewall Honeypot Penetration Testing
  9.  Fly Below IDS Radar Act
  10.  Test and Analyze a Honey Pot Act
  11.  Bypass Windows Firewall Act

Module 18 – Cryptography

  1.  Module 18 Notes
  2.  Cryptography
  3.  Encryption Algorithms
  4.  Cryptography Tools
  5.  Public key Infrastructure
  6.  Email Encryption
  7.  Disk Encryption
  8.  Cryptography Attacks
  9.  Crytography Penetration Testing
  10.  Examine Hashing Algorithms Act
  11.  Protect Data with Symmetric Encryption Act
  12.  Protect Data with Asymmetric Encryption Act

Module 19 – Cloud Computing

  1.  Module 19 Notes
  2.  Cloud Computing
  3.  Virtualization
  4.  Cloud Computing Threats
  5.  Countermeasures to Cloud Computing Threats
  6.  Cloud Computing Attacks
  7.  Cloud Security
  8.  Cloud Security Best Practices
  9.  Cloud Penetration Testing

Module 20 – IoT Hacking

  1.  Module 20 Notes
  2.  IoT Hacking
  3.  IoT Vulnerabilities and Attacks
  4.  IoT Hacking Methodology and Tools
  5.  IoT Hacking Countermeasures
  6.  oT Penetration Testing
  7.  Search the Internet for Vulnerable IoT Devices Act
  8.  Conclusion

From: $14.99 / year

  • Vast selection of courses and labs Access
  • Unlimited access from all devices
  • Learn from industry expert instructors
  • Assessment quizzes and monitor progress
  • Vast selection of courses and labs Access
  • Blended Learning with Virtual Classes
  • Access to new courses every quarter
  • 100% satisfaction guarantee

You Will Get Certification After Completetion This Course.

Instructor Led Lectures
All IT Tutor Pro Formerly It Nuggets Courses replicate a live class experience with an instructor on screen delivering the course’s theories and concepts.These lectures are pre-recorded and available to the user 24/7. They can be repeated, rewound, fast forwarded.
Visual Demonstrations, Educational Games & Flashcards
IT Tutor Pro Formerly It Nuggets recognizes that all students do not learn alike and different delivery mediums are needed in order to achieve success for a large student base. With that in mind, we delivery our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimization & Progress Tracking
Our courses are optimized for all mobile devices allowing students to learn on the go whenever they have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.
Practice Quizzes And Exams
IT Tutor Pro Formerly It Nuggets Online’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure you are confident on the topic you are learning.
World Class Learning Management System
IT Tutor Pro Formerly It Nuggets provides the next generation learning management system (LMS). An experience that combines the feature set of traditional Learning Management Systems with advanced functionality designed to make learning management easy and online learning engaging from the user’s perspective.

Frequently Asked Questions

How does online education work on a day-to-day basis?
Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.
Is online education as effective as face-to-face instruction?
Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.
Do employers accept online degrees?
All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.
Is online education more conducive to cheating?
The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.
How do I know if online education is right for me?
Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
What technical skills do online students need?
Our platform typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.