98ÌÃapp

Penetration Testing Essentials - Ethical Hacking

About the Course

Jump to:

Course Details

Overview

Who Should Attend

Key Benefits

Program Outline

Course Details

Course Details

Course Name: Penetration Testing Essentials - Ethical Hacking
Course Date: May 5 - 16, 2025 (Test Day: May 19, 2025)


Duration: 9am - 2pm
Credit Hours: 50 hours
Location: AIU Campus

Overview

Overview

Designed as an entry-level course into the world of ethical hacking, this program introduces participants to the methodologies and key tools used by ethical hackers to uncover security weaknesses.

Students will learn techniques for scanning networks, identifying system vulnerabilities, and exploiting these weaknesses ethically to improve security defenses. Topics include network security basics, threat modeling, vulnerability assessment, and penetration testing frameworks. With a focus on hands-on labs, participants will practice using tools like Nmap, Wireshark, and Metasploit to simulate attacks, analyze system vulnerabilities, and prepare detailed security reports. Graduates of this course will have a foundational skill set for performing ethical hacking tasks and supporting proactive security measures.

Who Should Attend

Who is this course for?

  • IT and network professionals aspiring to become ethical hackers.
  • Cybersecurity enthusiasts seeking hands-on offensive security skills.
  • Students preparing for certifications like CEH or OSCP.

Key Benefits

Key Benefits

  • Learn to think like a hacker to uncover system vulnerabilities.
  • Hands-on experience with penetration testing tools and techniques.
  • Understand the ethical and legal boundaries of ethical hacking.
  • Build foundational skills for advanced penetration testing.

Program Outline

Program Outline

1. Introduction to Ethical Hacking

  • Ethical hacking methodologies.
  • Legal and ethical considerations.

2. Reconnaissance and Footprinting

  • Open-source intelligence (OSINT) gathering.
  • Passive and active reconnaissance techniques.

3. Vulnerability Analysis

  • Scanning networks and identifying vulnerabilities.
  • Introduction to vulnerability assessment tools.

4. Exploitation Techniques

  • Exploiting web applications, networks, and systems.
  • Basics of privilege escalation.

5. Reporting and Remediation

  • Writing professional penetration testing reports.
  • Remediation strategies and best practices.