Ethical Hacking Core Skills (EHCS)
C|EH Practical Credential holders can:
-
Demonstrate the understanding of attack vectors
-
Perform network scanning to identify live and vulnerable machines in a network.
-
Perform OS banner grabbing, service, and user enumeration.
-
Perform system hacking, steganography, steganalysis attacks, and cover tracks.
-
Identify and use viruses, computer worms, and malware to exploit systems.
-
Perform packet sniffing.
-
Conduct a variety of web server and web application attacks including directory traversal, parameter tampering, XSS, etc.
-
Perform SQL injection attacks.
-
Perform different types of cryptography attacks.
-
Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems etc.
The Ethical Hacking Core Skills course you will teach you the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows-centric.
Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where ethical hacking core skills come in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.