Mode of Instruction Instructor-Led
Learning Hours 70
Career Path Social Engineering, Pentesting Tools, Exploiting Networks, Ethical Hacking, Reporting, Vulnerability Assessment, Exploiting Applications, IoT Security, Vulnerability Scanning, Penetration Testing
Level Intermediate
Fee On Request
Who Should Attend

Aspiring ethical hackers, penetration testers, IT professionals, and cybersecurity enthusiasts interested in offensive security.

Course Overview

The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world is a necessity. Offensive security professionals like ethical hackers and penetration testers can proactively discover unknown threats and address them before cybercriminals do.

This course prepares you with an Ethical Hacker skillset and a solid understanding of offensive security. You will become proficient in scoping, executing, and reporting vulnerability assessments while recommending mitigation strategies. Engage in gamified learning and hands-on labs inspired by real-world scenarios.

After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester, or strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyze, and respond to current security threats.

Course Outline:
  • Module 1: Introduction to Ethical Hacking and Penetration Testing
  • Module 2: Planning and Scoping a Penetration Testing Assessment
  • Module 3: Information Gathering and Vulnerability Scanning
  • Module 4: Social Engineering Attacks
  • Module 5: Exploiting Wired and Wireless Networks
  • Module 6: Exploiting Application-Based Vulnerabilities
  • Module 7: Cloud, Mobile, and IoT Security
  • Module 8: Performing Post-Exploitation Techniques
  • Module 9: Reporting and Communication
  • Module 10: Tools and Code Analysis