Ethical Hacking Core Skills [EC-EHCS]
Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge
Online of op locatie er is altijd een vorm die bij je past.
Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.
OVERVIEW
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric..
Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced securi…
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge
Online of op locatie er is altijd een vorm die bij je past.
Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.
OVERVIEW
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric..
Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where ethical hacking core skills come in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.
OBJECTIVES
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.
Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where the Core Concepts course comes in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.
Students who successfully complete this class will be able to:
- Explain the foundations of security to include in-depth knowledge of the TCP/IP protocol
- Analyze packets for irregularities
- Detect signs of crafted packets
- Perform advanced protocol analysis techniques
- Conduct low-level protocol analysis
- Display functional skills in Unix and Linux
- Deploy virtualization and build your own virtual labs
- Identify the steps of vulnerability assessment and the hacking methodology
CONTENT
- Introduction To Required Skills For Security
- Introduction & Overview
- UNIX/Linux
- Introducing Linux
- Overview of Virtual Machines
- Introduction to Vulnerability Assessment
- Introduction to the Hacking Process
- Challenges of Staying Current
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

