0% found this document useful (0 votes)
478 views1 page

Ethical Hacking Associate (EHA)

This document outlines an Ethical Hacking Associate (EHA) course covering the fundamentals of hacking including information and network fundamentals, security protocols, social engineering, the hacking cycle, identification and authentication, cryptography, firewalls, intrusion detection systems, data backup, virtual private networks, wireless network security, and ethical hacking and penetration testing.

Uploaded by

Niko Tahiraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
478 views1 page

Ethical Hacking Associate (EHA)

This document outlines an Ethical Hacking Associate (EHA) course covering the fundamentals of hacking including information and network fundamentals, security protocols, social engineering, the hacking cycle, identification and authentication, cryptography, firewalls, intrusion detection systems, data backup, virtual private networks, wireless network security, and ethical hacking and penetration testing.

Uploaded by

Niko Tahiraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Ethical Hacking Associate (EHA)

Hacking: The Art of Exploitation

1. Information Fondamentals
2. Network fondamentals
3. Security network protocols
4. Information security torea and attaks
5. Social engineering
6. Hacking Cycle
7. Identification, authentication ancd authorization
8. Cryptography
9. Firewalls
10. Inrusion detection system
11. Data backup
12. Virtual private network
13. Wireless network security
14. Ethical hacking and penetration testing

You might also like