EC-Council Core Concepts
Training for Your Group
- Private class for your team
- Online or on-location
- Fully customizable course material
- Onsite testing available
Training On Demand
$1599
- Learn at Your Own Pace
- Train from Anywhere
- Learn when it is most Convenient
- World-Class Instructors
Course Overview
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.
Course Length: Self-Paced
Audience: This course is for anyone who wants to start out with the foundation and core concept skills for becoming a security professional
Prerequisites: This course falls on the EC-Council Cyber Forensics Certification Path. If you intend to follow this path you should take the Computer Hacking Forensic Investigator (CHFI) course before attending this one.
What You're Going To Learn
- How to Analyze Packets for Irregularities
- How to Detect Signs of Crafted Packets
- Advanced Protocol Analysis Techniques
- Perform Low-Level Protocol Analysis
- Functional Skills in Unix and Linux
- Virtualization and How to Build Your Own Virtual Labs
- The Fundamentals of Vulnerability Assessment and the Hacking Methodology
Course Outline
Module 1: Introduction to Required Skills for Security
- TCP/IP
- Unix/Linux
- Introduction to the hacking process
- Virtualization
- Lab: Security Skills Introduction – Security Model
- Authentication
- Confidentiality
- Integrity
- Availability
- Authorization
- Lab: Security Model – Security Posture
- Promiscuous
- Paranoid
- Permissive
- Prudent
- Identifying services and allowing them
- Defining types of risk
- Types of risk
Module 2: Introduction & Overview
- Introducing TCP/IP Networks
- What TCP/IP Networks Provide: Key Application Services & Multivendor Capabilities TCP/IP & the Internet
- Internet RFCs & STDs
- TCP/IP layering
- Components of TCP/IP Networks
- Network Protocols (IP, TCP, UDP, ICMP)
- Lab: TCP/IP – Transport Protocols
- Packet Headers
- Lab: The Layers – Analyzing Network Traffic
- Examining the Data at the Packet Level
- Control Flags of TCP
- Lab: Analyzing Packets – Advanced Protocol Analysis
- tcpdump
- dsniff
- Wireshark
- Etherape
- Ettercap
- Lab: Protocol Analysis I – Wireshark
- Leveraging the Filter Capabilities
- Working within the GUI
- Low-Level Analysis
- Following Session Communication
- Customizing the Interface
- Using the Statistics Features within the Tool
- Text-Based Wireshark
- Packet Decomposition
- Lab: Protocol Analysis II – Tcpreplay
- Using Traffic Replay for Training & Advanced Analysis
- Customizing & Crafting Packets
- Command Line Tools
- GUI Based Tools
- Lab: Protocol Analysis III – Advanced Features of Wireshark
- Filters
- Sessions
- Graphs
- Endpoints
- Statistics
- Custom
- Lab: Advanced Wireshark
- Colasoft
- Hping
- Lab: Crafting Packets
Module 3: UNIX/Linux
- Interacting with UNIX
- Graphical User Interfaces
- The Common Desktop Environment (CDE)
- GNOME, Java Desktop System, Others
- The Command Line Interface
- Entering Commands to the Shell
- Browsing Online Documentation
- Displaying Man Pages
- Managing Files
- Essential File Housekeeping Tools
- Copying: cp
- Renaming: mv
- Removing: rm
- Linking: ln
- Editing: vi
- Printing: lp, lpr
- Root
- Ways to Assume root
- Lab: UNIX I – Working with the Processes & Jobs
- ps
- jobs
- kill
- Disk Commands
- Mount
- Unmount
- df
- du
- Working with Files
- gunzip
- zcat
- tar
- Searching Files & Directories
- find
- grep
- strings
- Compiling Programs
- Password Storage
- Networking
- Address Resolution
- Editors
- Lab: Unix II
Module 4: Introducing Linux
- The UNIX Heritage
- Linux Inception
- Linux Kernel & GNU Tools
- Open Source Licensing
- Distributions
- Accessing the System
- The GNOME Desktop
- Customizing Panels, Launchers & Applets
- Examining Graphical Applications
- Personalizing the Terminal Window
- Starting at the Command Line
- Lab: Linux
Module 5: Overview of Virtual Machines
- Defining Virtual Machines (Servers & Workstations)
- Advantages of deploying VMs
- Creating a Virtual Machine from a System Image or Another Virtual Machine
- Conversion Process for Importing from Other Formats
- VMware Converter Compare to the Conversion Wizard
- Supported Source Machines
- Operating System Compatibility
- Importing from Various Sources
- Transferring Files & Text Between the Host & guest
- Using Drag-and-Drop
- Enable or Disable Drag-and-Drop
- Using Copy & Paste
- Enable or Disable Copy & Paste
- Using Shared Folders
- Set Up Shared Folders
- Enabling and Disabling Shared Folders
- Preserving the state of a Virtual Machine
- Using the Suspend & Resume Features
- Use Hard Suspend or Soft Suspend
- Suspend or Resume a Virtual Machine
- Using Snapshots
- Scenarios for Using Multiple Snapshots
- Information Captured by Snapshots
- Information Captured by Snapshots
- Snapshot Conflicts
- Enable or Disable Background Snapshots Exclude a Virtual Disk from Snapshots
- Snapshot Manager Overview
- Take a Snapshot
- Rename a Snapshot or Recording
- Restore an Earlier State from a Snapshot
- Delete a Snapshot or a Recording
- Take or Revert to a Snapshot at Power Off
- Configuring a Virtual Network
- Components of the Virtual Network
- Virtual Switch
- DHCP Server
- Network Adaptor
- Common Networking Configurations
- Building Complex Virtual Architectures to Emulate Enterprise Architectures
Module 6: Introduction to Vulnerability Assessment
- Defining Vulnerability
- Vulnerability Scanners
- Challenge of Vulnerability Assessment
- Penetration Testing Defined
- Enumeration
Module 7: Introduction to the Hacking Process
- Hacking Methodology
- Surveillance
- Foot Printing
- Scanning
- Vulnerability Assessment
- Exploitation
- Covering Tracks
- Evasion
Module 8: Challenges of Staying Current
- Books
- Mailing lists
- Videos
- Professional Organizations
What to Expect at LeapFox
Knowledgeable Instructors
Our instructors are certified professionals. They are trained on the latest features and how to get the most out of software programs.
Hands-on Labs
No boring lectures! Our courses are designed to give students lots of time to practice what they are learning with hands-on exercises and projects.
Certificate of Completion
Receive a certificate of completion at the end of every course.
Up-to-date Curriculum
Each course comes with a helpful and up-to-date ebook which will contain instruction and practice exercises.
Time Saving Tips N Tricks
In each course, your instructor will show you tips and tricks that will save you time and make you more efficient.
Friendly and Helpful Staff
Our staff is dedicated to your success. Each team member is trained to provide the absolute best customer service possible.
Satisfaction Guarantee
If you aren't 100% satisfied with your experience at LeapFox, simply let us know, and we will make it right.