COURSE DETAILS
Course Image

This course delves into the world of ethical hacking and cybersecurity. Students learn how to think like hackers and identify vulnerabilities in computer systems, networks, and applications. Topics include penetration testing, vulnerability assessment, and ethical hacking methodologies. Graduates are equipped with the skills to secure digital assets and defend against cyber threats.

Objective

  • To teach students the ethical considerations in hacking.
  • To equip students with hands-on hacking skills.
  • To prepare students for a career in cybersecurity.
Course Structure

This course is organized into 8 online live class sessions, with each session lasting 2 hours. Each session is carefully designed to concentrate on specific elements of the course material, allowing you to progressively develop your understanding and expertise as you follow the curriculum outlined below.

  • Session 1: Introduction to Ethical Hacking
  • Session 2: Reconnaissance & Information Gathering
  • Session 3: Network Scanning and Enumeration
  • Session 4: Vulnerability Assessment and Exploitation
  • Session 5: Password Cracking and Security Tools
  • Session 6: Exploitation & Post-Exploitation
  • Session 7: Web Application Testing
  • Session 8: Reporting
Weekly Assignment

You will receive either a reading or problem-solving assignment each week. Completing all your weekly assignments is a mandatory requirement to successfully finish the course.

  • Reading assignments are designed to help you understand key concepts and theories related to the course material. Be sure to engage with the readings actively, taking notes and highlighting important points.
  • Problem-solving assignments will challenge you to apply what you've learned. Carefully read and analyze the problem statements, and use the knowledge gained from the readings and previous weeks to solve them.

What you’ll learn?

At the end of this course, participants should be able to:

  • Understand the fundamentals of ethical hacking.
  • Identify vulnerabilities in computer systems.
  • Implement security measures to protect against cyber threats.
Course Final Exams
Pass
Capstone Project
Pass
  • Assessment: Internal
  • Certification Exams: No
  • Language of Instruction: English
  • Duration: 4 weeks
  • Study Option: Live Online
  • Start Date:
  • Award: Certificate of Completion