Overview
Course Description
The Certified Ethical Hacker program is a globally recognized and industry-leading certification in the field of cybersecurity. This program is designed to train individuals in the art of ethical hacking – the practice of legally breaking into computers and networks to test and improve security. It provides in-depth knowledge of hacking tools, techniques, and methodologies used by malicious hackers, but teaches them from an ethical and defensive perspective to proactively identify, assess, and fix security vulnerabilities in systems before attackers can exploit them.
What you'll learn
- Possess a strong background knowledge of networking, telecommunications, web and computer systems.
- Hack into an organization's network/systems - with its permission - to assess weaknesses and vulnerabilities.
- Hands-On Hacking - Use tools like Metasploit, Nmap, and Burp Suite to break and fix systems.
- Have the ability to identify and crack multiple types of passwords, and effectively counter password attacks
- Understand the current security protocols for popular operating environments, e.g., Linux, Windows & Mac OS.
- Find & Fix Vulnerabilities - Secure websites, networks, and devices before the bad guys do.
- Understand cryptography & encryption techniques, and private/public key infrastructure
- Get Certified and Shine: Earn a globally recognized certification that puts you ahead in the cybersecurity world — your dream job is waiting!
Requirements
- Basic knowledge of networking and operating systems
- A computer with virtual machine setup for labs (tools provided)
- Curiosity and commitment to learn ethical hacking
Course Content
20 Modules Live Training
In this module, you'll learn about information security basics, types of hackers, the CIA triad, and common cyber threats. We'll also set up your lab environment for upcoming modules.
This module focuses on collecting publicly available information about a target using tools like Whois, DNS lookups, Google Dorks, and Maltego through OSINT techniques.
You'll learn to identify active devices and services within a network using tools like Nmap, Angry IP Scanner, and Hping3.
Once scanning is done, you'll dive deeper to extract system details like usernames and shares from services such as FTP, SSH, and HTTP.
We'll use tools like Acunetix, Nessus, and Nikto to scan systems for weaknesses and understand how to assess vulnerabilities in a network.
This module teaches password cracking techniques, buffer overflow concepts, and methods to gain access and cover your tracks on a system.
You'll learn about common malware types like trojans, viruses, worms, and ransomware, along with how attackers create and use them for access.
We'll cover network sniffing attacks like ARP poisoning and MAC flooding, using tools like Wireshark and Bettercap to capture sensitive data.
Learn about human-based hacking techniques such as phishing, fake login pages, and social manipulation, along with basic defenses.
Understand what DoS/DDoS attacks are, how they overwhelm systems or websites, and explore basic tools and ways to prevent such attacks.
This module teaches how attackers take over active sessions using techniques like session ID theft, fixation, and replay attacks—and how to prevent them.
You'll explore how hackers bypass security systems using methods like tunneling, encryption, and fragmentation, and how to detect such evasion.
Understand how web servers like Apache and IIS are attacked through techniques such as directory traversal and brute force, and how to secure them.
This module covers web-based attacks including SQL Injection, XSS, and CSRF based on the OWASP Top 10 vulnerabilities list.
You'll learn how attackers use SQL queries to manipulate databases, steal data, or bypass logins, and how to defend against such threats.
Understand how Wi-Fi networks are attacked using methods like WPA2 cracking, rogue access points, and Evil Twin attacks.
This module explores how Android and iOS devices are targeted using malicious apps and tools to gain unauthorized access.
Learn about vulnerabilities in smart devices like smart TVs, cameras, and speakers—and how attackers exploit them using specialized tools.
We'll cover common cloud platform threats like misconfigured storage (e.g., S3 buckets), IAM role abuse, and data exposure.
You'll understand basic encryption, hashing, and digital certificates—and how cryptographic weaknesses can lead to security breaches.