Learn the hacking techniques used by the Internet’s most skilled professionals. This Ethical Hacking Essentials lab bundle, which includes 22 distinct, hands-on labs, will prepare you to exploit networks in the manner of an attacker in order to discover how protect the system from them, ensuring you’re ready to fill the role of an ethical hacker.
This lab bundle is designed to align to the learning objectives found in EC-Council’s Certified Ethical Hacker certification — Course 2031, Certified Ethical Hacker (CEH v10) Training.
Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.
Students will create a list of installed programs, services, and accounts in a Windows 2012 server environment using various tools and methods.
Students will use nmap and OpenVAS / Greenbone Vulnerability Scanner to confirm old vulnerable systems and discover new ones. They will perform a risk analysis of the findings and determine steps to be taken to mitigate the issues discovered. Finally, armed with a previously completed audit report as an example, they will fill out the necessary audit documentation to provide details on their findings and any suggested mitigations.
Students will use Core Impact to enumerate a LAN and determine any vulnerable virtual machines through the use of a vulnerability scan. Based on the results of the vulnerability scan, students continue to use Core Impact to conduct a penetration test against a previously identified vulnerable machine. Finally, students use the reporting mechanism built into Core Impact to create a host-based assessment outlining the entire vulnerability/penetration test process with a focus on possible remediation actions.
This lab exercise is designed to allow the trainee to become familiar with recognizing remote shells that operate using well known ports such as DNS.
Students will scan a system in OpenVAS (Open Vulnerability Assessment) to discover and identify systems on the network that have vulnerabilities.
Students will learn how to conduct manual scanning against systems using command line tools such as Netcat then they will login to a discovered system and enable object access verify that auditing to the object is enabled.
The Network Discovery lab is designed to help students facilitate open source collection by teaching them how to use more intimate network discovery techniques.
The Open Source Collection lab is designed to familiarize students with the advanced functionality of Google, default webpages used for web-servers, and the specifics of Google Hacking database. This allows the students to understand how open source information can be used for exploitation purposes.
Students will use John the Ripper and Cain and Abel to crack password protected files.
Students will utilize Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Using the tool, students will identify other devices on the laboratory network, to include computers and network infrastructure devices, such as routers.
Students will leverage Scalnline, a windows network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).
Students will run a Core Impact or Nessus Scan and identify vulnerabilities. Students will then view the report and prioritize vulnerabilities according to risk.
Students will setup and configure Core Impact in preparation of a vulnerability scan against an internal network.
Students will utilize OpenVAS to identify hosts on a network and assess their vulnerabilities.