Ethical Hacking Essentials Labs

Course E002

  • Duration: Multi-Week
  • Language: English
  • Level: Foundation
Get This Course $149
  • Pre-configured labs with lab guides
  • Gain hands-on skills in topic areas aligned to EC-Council’s Certified Ethical Hacker certification
#E002

Learn the hacking techniques used by the Internet’s most skilled professionals. This Ethical Hacking Essentials lab bundle, which includes 22 distinct, hands-on labs, will prepare you to exploit networks in the manner of an attacker in order to discover how protect the system from them, ensuring you’re ready to fill the role of an ethical hacker.

This lab bundle is designed to align to the learning objectives found in EC-Council’s Certified Ethical Hacker certification — Course 2031, Certified Ethical Hacker (CEH) Training.

Ethical Hacking Essentials Labs Delivery Methods

  • 6-month access to CYBRScore Ethical Hacking Essentials Labs
  • Content aligned to EC-Council Certified Ethical Hacker certification

Ethical Hacking Essentials Labs Course Benefits

  • Practice the objectives presented in the EC-Council’s Certified Ethical Hacker certification
  • Exploit networks like an attacker and discover how protect the system from them
  • Determine the type of attack used and pinpoint exploit code in network traffic
  • Leverage network and discovery mapping tools to identify systems on a network

Ethical Hacking Lab Content

Students will leverage Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

Students will identify a browser-based attack used against a corporate asset using a network protocol analyzer. Students will determine the type of attack used and pinpoint exploit code in network traffic.

Students will Identify the use of an SQL Injection through the use of Wireshark. The students will also isolate the different aspects of the SQL Injection and execute the selected code.

Students will review network traffic to confirm the presence of malicious activity using various tools including Wireshark and VirusTotal.com.

Students will use Core Impact to conduct an automated vulnerability scan of specific systems in order to identify potential threat vectors.

This exercise will introduce students to the advanced settings within the Core Impact. Students will modify scan settings to perform different types of scans and to learn about the different functionalities Core Impact provides. Students will then compare the results of a Core Impact scan to the results of a port scan against the same target and discuss the differences and similarities between the two tools. Lastly, students will use the reporting feature to generate Core Impact reports.

This lab introduces students to the web application penetration testing suite within the Core Impact application.

Students will run Windows Forensic Toolchest against an existing system to create a baseline that will be used for future analysis.

Students will create a list of installed programs, services, and accounts in a Windows 2012 server environment using various tools and methods.

Students will use nmap and OpenVAS / Greenbone Vulnerability Scanner to confirm old vulnerable systems and discover new ones. They will perform a risk analysis of the findings and determine steps to be taken to mitigate the issues discovered. Finally, armed with a previously completed audit report as an example, they will fill out the necessary audit documentation to provide details on their findings and any suggested mitigations.

Students will use Core Impact to enumerate a LAN and determine any vulnerable virtual machines through the use of a vulnerability scan. Based on the results of the vulnerability scan, students continue to use Core Impact to conduct a penetration test against a previously identified vulnerable machine. Finally, students use the reporting mechanism built into Core Impact to create a host-based assessment outlining the entire vulnerability/penetration test process with a focus on possible remediation actions.

This lab exercise is designed to allow the trainee to become familiar with recognizing remote shells that operate using well known ports such as DNS.

Students will scan a system in OpenVAS (Open Vulnerability Assessment) to discover and identify systems on the network that have vulnerabilities.

Students will learn how to conduct manual scanning against systems using command line tools such as Netcat then they will login to a discovered system and enable object access verify that auditing to the object is enabled.

The Network Discovery lab is designed to help students facilitate open source collection by teaching them how to use more intimate network discovery techniques.

The Open Source Collection lab is designed to familiarize students with the advanced functionality of Google, default webpages used for web-servers, and the specifics of Google Hacking database. This allows the students to understand how open source information can be used for exploitation purposes.

Students will use John the Ripper and Cain and Abel to crack password protected files.

Students will utilize Nmap, a network discovery and mapping tool, to identify the systems on a network of responsibility. Using the tool, students will identify other devices on the laboratory network, to include computers and network infrastructure devices, such as routers.

Students will leverage Scalnline, a windows network discovery and mapping tool, to identify the systems on a network of responsibility. Students will utilize non-traditional scans to attempt avoiding an Intrusion Detection System (IDS).

Students will run a Core Impact or Nessus Scan and identify vulnerabilities. Students will then view the report and prioritize vulnerabilities according to risk.

Students will setup and configure Core Impact in preparation of a vulnerability scan against an internal network.

Students will utilize OpenVAS to identify hosts on a network and assess their vulnerabilities.

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Course FAQs

  • CYBRScore Labs are pre-configured hardware layouts with accompanying lab guides for fast, convenient access that make studying for an exam or learning new technologies an engaging experience.

  • Each lab consists of multiple tasks that take anywhere from 30 minutes to 2 hours to complete.

  • All you need is an HTML5 compatible browser, such as Google Chrome, Mozilla Firefox, or Microsoft Edge.

  • CYBRScore Labs are available for use for 6 months after the date of purchase. CYBRScore Labs are hosted online and available 24x7x365.

  • Once your purchase is complete, Learning Tree will contact you with the URL and login credentials you will use to access your lab bundle.
Chat With Us