Ethical Hacking Course

0 Enrolled
72 hours

About Course


Our Cyber Security Training enables you to build basic to advanced cybersecurity knowledge and gain skills on techniques to defend against cyber threats. By taking this course, you will become proficient in securing your critical systems and assets. You will also be working with the latest Cybersecurity technologies and tools that help you become an expert in detecting vulnerabilities, threats, and cybersecurity attacks. Following course completion, you will be able to perform risk management, incident response, and more to protect your infrastructure from cyber attacks. All these skills will help you clear the Cybersecurity certification.

Training Locations

  • UK
  • India
  • Mozambique
  • Global Online Training

Key Features

  • Hands-On Training: Practical learning experience focusing on real-world application.
  • Certification Preparation: Training aligned with cybersecurity certification requirements.
  • Latest Technologies and Tools: Training on cutting-edge cybersecurity tools and techniques.
  • Full-Time Lab Facility: Access to extensive lab facilities for practical exposure.

Course Curriculum

  • Overview of ethical hacking and its importance.
  • Understanding the difference between black hat, white hat, and grey hat hackers.
  • Ethical responsibilities and legal considerations.

  • Basics of cybersecurity.
  • Understanding cyber threats and vulnerabilities.
  • Introduction to risk management and incident response.

  • Installation and configuration of necessary tools.
  • Working with virtual machines for safe practice.
  • Using cybersecurity software and hardware.

  • Concepts
  • Networking
  • Deploy a Kali Linux VM
  • Adding Metasploitable to Your Lab
  • Adding Windows to Your Lab
  • Configure a Static IP on Kali
  • Windows Evaluations
  • Deploy Windows 8.1
  • Deploy Windows 2012
  • Deploy Windows 10
  • Deploy Windows 2016

  • Ethics in hacking
  • Hacking vocabulary
  • InfoSec concepts
  • Attack categories, types, and vectors

  • 5 phases of hacking
  • Footprinting and reconnaissance concepts

  • Search engine tools
  • Hacking using Google
  • Website recon tools
  • Metagoofil metadata tool
  • Email headers for footprinting
  • Using WHOIS for recon
  • DNS tools

  • Overview
  • Methodology
  • Port discovery
  • Tools
  • Stealth idle scanning
  • OS and application fingerprinting
  • Vulnerability scanning
  • Network mapping tools
  • Proxy servers
  • Using public proxy services

  • Concepts
  • NetBIOS enumeration
  • SNMP enumeration concepts and tools
  • LDAP enumeration concepts and examples
  • NTP enumeration
  • SMTP enumeration

  • Overview
  • Password cracking concepts
  • Password attack examples: MITM and sniffing
  • Rainbow crack lab setup and demonstration
  • Password reset hacking
  • DHCP starvation
  • Remote access
  • Spyware
  • NTFS alternate data streams exploit
  • Steganography with OpenPuff and SNOW
  • Covering tracks

  • Overview
  • Trojan overview and creation
  • Virus overview and creation
  • Detecting and analyzing malware
  • Hash file verification

  • Sniffing overview
  • CAM table attack and port security
  • DHCP snooping
  • Dynamic ARP inspection
  • Social engineering techniques

  • Buffer overflow
  • OWASP broken web application project
  • Shellshock
  • SQL introduction and injection
  • Web app vulnerabilities: WordPress

  • Using an Android VM
  • Malware for mobile
  • Mobile device risks and best practices

  • Firewall evasion
  • Firewall ACL example
  • NAT and PAT fundamentals
  • IDS/IPS evasion
  • Honeypots

  • CIA: Confidentiality, Integrity, and Availability
  • Policies
  • Quantifying risk
  • Separation of duties

  • Symmetrical encryption concepts
  • Asymmetrical encryption concepts
  • Control types

  • Multi-factor authentication
  • Centralized identity management
  • Kerberos and Single Sign On (SSO)

  • Backups and media management
  • Operations security controls
  • Physical security controls

  • Incident response
  • VPN
  • Disaster recovery planning


  • Cybersecurity Certification: The course prepares candidates to successfully earn various cybersecurity certifications.

Why Choose Websecure360 Academy?

  • Recognized as one of the best training institutes globally.
  • Largest training lab in the UK.
  • Focus on practical, hands-on learning with real devices.
  • Comprehensive preparation for the latest certification exams.
Show More

Course Content


Ibrahim Iqbal

Ibrahim Iqbal

AI Expert, Aws Architect Solutions Certified, CCNA Certified, CEH certified
29 Students
7 Courses
No Review Yet
No Review Yet