Ethical Hacking

What’s the course about?

Ethical Hacking is the process of breaking into an organization's IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hackers use various hacking tools and techniques in each of these phases.

Ethical hackers conduct vulnerability assessment, risk assessment, penetration testing and system protection tests and fix security issues before they are exploited by hackers with malicious intent.

Ethical Hacking Image

Course Objective :

The course aims to train students how to use hacking tools and techniques to assess the security posture of a given IT network or system. Upon completing the course, students will be able to scan, test, hack and secure IT systems. They will be given hands-on training in penetration testing and other testing methodologies to ensure the security of an organization's information systems.

Key course content

 Introduction to Ethical Hacking

 Footprinting and Reconnaissance

 Scanning Networks


 System Hacking

 Malware Threats


 Social Engineering


 Session Hijacking

 Hacking Web Server

 Hacking Web Applications

 SQL Injection

 Hacking Wireless Networks

 Hacking Mobile Platforms

 Evading IDS, Firewalls & Honeypot

 Cloud Computing


Who can enroll

Graduates with basic computer skills and strong Knowledge in TCP/IP can benefit from the course and student/Professional concerned with secure programming and the integrity of the network infrastructure.

Job opportunities

IT and other business organizations hire ethical hackers to enhance their network security. Some of the jobs available for ethical hackers include: Information Security & Governance Specialist, Pentester/ IT Security Professional, Cyber Security Professional, Security Consultant, Security Advisors, IT Specialists, IT System Executives, and IT Consultants.