0

Loading ...

Course / Course Details

Ethical Hacking Principles: A Comprehensive Certificate Course

  • CYSEC Academy image

    By - CYSEC Academy

  • 3 students
  • N/A
  • (0)

Course Requirements

  • Basic networking and OS knowledge (Linux/Windows)

  • Familiarity with command-line tools

  • Intro to cybersecurity or networking (recommended)

  • Laptop with virtualization tools (e.g., VirtualBox)

  • Access to ethical hacking lab tools (e.g., Kali Linux)

  • Course Description


    This certificate course provides an in-depth, hands-on exploration of ethical hacking principles and methodologies. Designed for aspiring security professionals, network administrators, and IT personnel, this program equips learners with the foundational knowledge and practical skills required to identify, assess, and mitigate vulnerabilities in digital systems. Upon completion, learners will be prepared to pursue entry-level roles as penetration testers, security analysts, or vulnerability assessors, and will possess a strong ethical framework for all their professional endeavors.

    Important Message: Document all your practicals by taking screenshots and labelling and giving detailed explanations accordingly. You will be required to submit your final report for this course in Microsoft Word format (.doc)  

    Practical Assignments

    These assignments are designed to test your practical skills and understanding of the ethical hacking lifecycle. For each question, you are required to submit a detailed walkthrough, including screenshots and/or screen recordings, to demonstrate your process and the successful completion of the task.

    Course Outcomes

  • Understand ethical vs. malicious hacking

  • Follow ethical hacking phases (recon, scanning, exploitation)

  • Use tools like Nmap, Metasploit, Burp Suite

  • Identify and exploit system vulnerabilities

  • Recommend security defenses

  • Write and present vulnerability reports

  • Course Curriculum

    • 9 chapters
    • 26 lectures
    • 0 quizzes
    • N/A total length
    Toggle all chapters
    1 Ethical Hacking Principles
    5 Min


    2 Foundations of Ethical Hacking
    1 Hour

    Module 1


    3 Assignment 1.1: Virtual Lab Setup Verification
    N/A


    4 Assignment 1.2: Research and Documentation
    N/A


    1 Reconnaissance: Information Gathering
    1 Hour 30 Min


    2 Assignment 2.1: Passive Reconnaissance with DNS and WHOIS
    N/A


    3 Assignment 2.2: Active Reconnaissance with Nmap
    N/A


    1 Scanning and Enumeration
    1 Hour


    2 Assignment 3.1: Automated Vulnerability Scanning
    N/A


    3 Assignment 3.2: Advanced Enumeration with Nmap Scripts
    N/A


    1 System Hacking and Exploitation
    1 Hour


    2 Assignment 4.1: Password Cracking
    N/A


    3 Assignment 4.2: Exploitation with Metasploit
    N/A


    1 Web Application Hacking
    1 Hour


    2 Assignment 5.1: SQL Injection Attack
    N/A


    3 Assignment 5.2: Cross-Site Scripting (XSS) Attack
    N/A


    1 Wireless Network Hacking
    1 Hour


    2 Assignment 6.1: Packet Sniffing and Handshake Capture
    N/A


    3 Assignment 6.2: Offline Password Cracking
    N/A


    1 Cryptography and Social Engineering
    1 Hour


    2 Assignment 7.1: Phishing Campaign Simulation
    N/A


    3 Assignment 7.2: Social Engineering Defense
    N/A


    1 Final Project and Reporting
    1 Hour


    2 Assignment 8.1: Executive Summary
    N/A


    3 Assignment 8.2: Technical Report Walkthrough
    N/A


    1 Course Summary
    1 Hour


    Instructor

    4.6 Rating
    5 Reviews
    772 Students
    27 Courses

    Course Full Rating

    0

    Course Rating
    (0)
    (0)
    (0)
    (0)
    (0)

    No Review found

    Sign In or Sign Up as student to post a review

    Student Feedback

    Course you might like

    Beginner
    Starting and Building a Career in Cyber Security
    0 (0 Rating)
    The primary goal of this quick start guide is to introduce you to cybersecurity and how to build a successful career. Th...
    Beginner
    Certified Secure Computer User (CSCU) - Int'l Certification Inclusive
    5 (2 Rating)
    The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect th...

    You must be enrolled to ask a question

    Students also bought

    More Courses by Author

    Discover Additional Learning Opportunities