top of page
ethical_hacking.webp

ETHICAL HACKING COURSE / PENETRATION TESTING COURSE

Learn penetration testing and launch your security career.

Need International certification in Cyber Security Courses and become job ready? 

We provide training & Certifications for all knowledge levels.

Get hands-on ethical hacking training with our most updated course on penetration testing.

Ethical Hacking Training.

​

Our ethical hacking training course is tailored for technical enthusiasts, students, and professionals eager to embark on a career in cybersecurity. This course will also prepare you for certification exams related to ethical hacking and/or penetration testing and security auditing. With a hands-on approach and one-on-one teaching, we ensure a personalized learning experience that your specific questions and concerns. The curriculum is built on our extensive industry experience, incorporating the latest techniques for a practical, no-nonsense education. Our goal is to students with employable skills in cybersecurity, making them competitive in network and web application vulnerability assessments and testing.

 

Contact us today for the best deals on personalized cybersecurity training!

​

​

Ethical Hacking course - Topics overview.

Information Gathering

  • Gathering publicly available information for target.

  • Understanding risks & mitigations.

System Hacking

  • Basics of password attacks.

  • Windows LM & NTLM hashes | Windows password cracking.

  • Online & Offline password attacks | Steganography.

  • Defending against password attacks.

Network Scanning

  • Basics of network scanning.

  • Advanced network scanning.

  • Vulnerability scans & reporting.

  • Result interpretations. 

Network Sniffing

  • Network sniffing basics.

  • Wireshark basics to advanced.

  • ARP spoofing / DNS spoofing / MAC spoofing.

  • Defense against spoofing attacks.

Enumeration

  • Enumeration Basics.

  • Windows enumeration & Linux enumeration.

  • Common configuration weakness.

  • Result Interpretations.

Social Engineering

  • Introduction to social engineering.

  • social engineering tactics by scammers.

  • Defending against social engineering attacks.

Malwares

  • Introduction to malwares - virus, trojans, worms, ransomware, etc.

  • Infection strategies by attackers.

  • Securing against malwares.

Web application security

  • Introduction to OWASP top 10.

  • Hands-on OWASP top 10 practical.

  • Web application scanning.

  • Website security testing.

  • Security of web applications - tips & tricks.

Denial of Service (DoS)

  • Fundamentals of DoS & DDoS

  • DoS attack types.

  • Hands-on & security against DoS attacks.

Wireless Network Security (WiFi Security)

  • Wireless network authentication.

  • Attacks on wireless network / attacks on WiFi

  • Security of WiFi networks.

  • Hands-on Wifi cracking / Wireless security testing.

Web Servers & Sessions

  • Web servers basics & session basics.

  • Security testing of web servers. / web server scanning.

  • Attacks on web servers.

  • Securing web servers.

Firewall, IDS & Honeypots

  • Introduction to firewalls, IDSes & Honeypots.

  • Firewall testing - Hands-on

  • Managing firewall - blocking traffic on firewalls.

  • Hands-on - Firewall testing, IDS & honeypots.

©2024 by Evolution Info Secure.

bottom of page