Access the authorized lab resources for Ethical Hacking Core Skills (EHCS), developed and authored by EC-Council! (www.eccouncil.org)
This license will provide you with 6 months access to EC-Council's exclusive iLabs portal (access starts post code redemption). Practice your skills, refine your skills, follow the instructions, or go outside of the instructions. These are NOT simulations and this is one range you will never break!
EHCS Course Outline:
- Chapter One Lab 1.1
- Chapter One Lab 1.2
- Chapter Two Lab 2.1
- Chapter Two Lab 1.2 and 2.3
- Chapter Three Lab 3.1 and 3.2
- Chapter Four Lab 4.1
- Chapter Five Lab 5.1 and 5.2
- Chapter Six Lab 6.1 and 6.2
- Chapter Seven Lab 7.1
- Chapter Nine Lab 9.1
- Chapter Ten Lab 10.1
Who is it for?
In this lab course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.
Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where the Core Concepts course comes in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.
Course Objectives
Students who successfully complete this class will be able to:
- Explain the foundations of security to include in-depth knowledge of the TCP/IP protocol
- Analyze packets for irregularities
- Detect signs of crafted packets
- Perform advanced protocol analysis techniques
- Conduct low-level protocol analysis
- Display functional skills in Unix and Linux
- Deply virtualization and build your own virtual labs
- Identify the steps of vulnerability assessment and the hacking methodology