Ethical Hacker Core Skills (ECHS)

Cas Training > Nuestros cursos > Ethical Hacker Core Skills (ECHS)
Icono Duración del curso
Duración del curso
Lugar de impartición
Madrid / Online
Icono modalidad del curso
Icono Fecha del curso
Fecha de inicio

Acerca del curso

In this course Ethical Hacker Core Skills (ECHS) you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric..

Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where ethical hacking core skills come in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.

Próximas convocatorias

Estamos preparando nuevas convocatorias. Déjanos tus datos a través del formulario y te avisaremos lo antes posible.


  • Explain the foundations of security to include in-depth knowledge of the TCP/IP protocol
  • Analyze packets for irregularities
  • Detect signs of crafted packets
  • Perform advanced protocol analysis techniques
  • Conduct low-level protocol analysis
  • Display functional skills in Unix and Linux
  • Deply virtualization and build your own virtual labs
  • Identify the steps of vulnerability assessment and the hacking methodology
  • Contenidos

    Module 1: Introduction to required skills for security

    Introduction to the hacking process

    Module 2: Introduction & overview

    Introducing TCP/IP networks
    What TCP/IP Networks
    What TCP/IP provides: Key application services & multivendor capabilities TCP/IP & the internet
    Internet RFC’s & STDs
    TCP/IP Protocol architecture
    Protocol layering concepts
    TCP/IP layering
    Components of TCP/IP networks
    Network protocols (IP, TCP, UDP, ICMP)

    Module 3: UNIX/ Linux

    Interacting with UNIX
    Graphical user interfaces
    The Common Desktop Environment (CDE)
    GNOME, Java Desktop System, others
    The command line interface
    Entering commands to the shell
    Browsing online documentation
    Displaying man pages
    Managing Files
    Essential file housekeeping tools
    Copying: cp
    Renaming: mv
    Removing: rm
    Linking: ln
    Editing: vi
    Printing: lp, lpr

    Module 4: Introducing Linux

    The UNIX heritage
    Linux inception
    Linux kernel & GNU tools
    Open source licensing
    Accessing the system
    The GNOME desktop
    Customizing panels, launchers & applets
    Examining graphical applications
    Personalizing the terminal window
    Starting at the command line

    Module 5: Overview of virtual machines

    Defining virtual machines (servers & workstations)
    Advantages of deploying VMs
    Creating a Virtual Machine from a System Image or Another Virtual Machine
    Conversion Process for Importing from Other Formats
    VMware Converter Compared to the Conversion Wizard
    Supported Source machines
    Operating System Compatibility
    Importing from Various Sources
    Transferring Files & Text Between the Host & Guest
    Using drag-and-drop
    Enable or disable drag-and-drop
    Using copy & paste
    Enable or disable copy & paste
    Using shared folders
    Set up shared folders
    Enabling and disabling shared folders
    Viewing a shared folder
    Preserving the State of a Virtual Machine
    Using the suspend & resume features
    Use hard suspend or soft suspend
    Suspend or resume a virtual machine
    Using snapshots
    Scenarios for using multiple snapshots
    Information captured by snapshots
    Snapshot conflicts
    Enable or disable background snapshots exclude a virtual disk from snapshots 193
    Snapshot manager overview
    Take a snapshot
    Rename a snapshot or recording
    Restore an earlier state from a snapshot
    Delete a snapshot or a recording
    Take or revert to a snapshot at power off
    Configuring a Virtual Network
    Components of the virtual network
    Virtual switch
    DHCP server
    Netwrok adaptor
    Common networking configurations

    Module 6: Vulnerability assessment

    Defining vulnerability
    Vulnerability scanners
    Challenge of vulnerability assessment
    Penetration testing defined

    Module 7: Introduction to the Hacking process hacking methodology

    Foot printing
    Vulnerability assessment
    Covering tracks

    Module 8: Challenges of staying current

    Mailing lists
    Professional organizations


    Solicita más información

    Solicitar Información
    Mensaje enviado correctamente
    No se ha enviado su mensaje. Por favor revisa los campos e inténtalo otra vez.