Ethical Hacking and Penetration Testing Course – EH/PT
Embark on a transformative journey into the world of cybersecurity with our Ethical Hacking and Penetration Testing Course. Tailored for aspiring cybersecurity professionals in Nigeria, Kenya, and South Africa, this comprehensive program is designed to equip you with the essential skills and knowledge to excel in the ever-evolving field of ethical hacking.
What you will get:
Online Self-Paced Course
Regular Price: $200
What You Will Learn:
Each module in this course contributes to building a comprehensive skill set in ethical hacking and cybersecurity, enabling students to better understand, assess, and protect information systems and networks.
Module 1: Intro to Ethical Hacking & Cybersecurity Basics
Dive into the world of ethical hacking with a comprehensive overview of cybersecurity principles. Learn about ethical hacking, penetration testing, and vulnerability assessment, and understand key concepts such as the CIA Triad, risk management, and the African cyber threat landscape. This foundational module sets the stage for a successful career in cybersecurity.
Module 4: Introduction to Metasploit Framework
Get to know Metasploit Framework, a powerful tool for penetration testing and exploitation. This module provides an overview of its architecture, modules, and how to use Metasploit to identify and exploit vulnerabilities effectively.
Module 2: Home Hacking Lab Setup
Learn how to create a secure and effective home hacking lab, essential for hands-on practice. This module covers everything from setting up virtual machines and lab environments to configuring network settings. Gain practical experience by setting up Kali Linux, vulnerable machines, and using virtualization technologies like VirtualBox and VMware.
Module 5: Networking Fundamentals
Build a strong foundation in networking with a deep dive into the OSI model, TCP/IP suite, ports and services, and network topologies. Understand IP addressing, subnetting, and wireless networking essentials, and learn to navigate network infrastructure challenges unique to Africa.
Module 3: Introduction to Kali Linux
Master the tools of the trade with an introduction to Kali Linux, the go-to operating system for ethical hackers. Explore its features, package manager, file system, and basic commands. Get familiar with the suite of tools available for penetration testing and how they can aid in your hacking endeavors.
Module 6: Reconnaissance Techniques
Master reconnaissance techniques to gather critical information about your targets. This module covers both passive and active reconnaissance methods, DNS enumeration, and information gathering on individuals, organizations, and network systems.
Module 7: Scanning and Enumerations Techniques
Learn how to identify live hosts and discover open ports and services using scanning and enumeration techniques. Gain hands-on experience with tools like Nmap and Metasploit's auxiliary modules to uncover vulnerabilities and gather vital information.
Module 10: Post Exploitation and Maintaining Access
Learn to maintain access and perform post-exploitation tasks. This module covers persistence techniques, privilege escalation, and lateral movements within compromised systems. Gain insights into automating post-exploitation tasks for effective and long-term access.
Module 8: Vulnerability Assessment
Understand the process of vulnerability assessment and learn to identify, analyze, and prioritize vulnerabilities. This module covers manual and automated assessment techniques using tools like Nmap and OpenVAS, focusing on common vulnerabilities and exposures.
Module 11 Web Site Hacking Techniques
Uncover common web application vulnerabilities and learn to exploit them. This module focuses on techniques such as SQL injection, cross-site scripting (XSS), and unrestricted file upload vulnerabilities, providing practical skills for attacking and securing web applications.
Module 9: Exploitation Techniques
Explore exploitation techniques to gain unauthorized access to systems. This module covers various exploitation methods, including remote attacks, PowerShell techniques, password cracking, and anti-virus evasion. Learn how to use Metasploit and other tools for successful exploitation.
Module 12: Cryptography, Encryption, and Obfuscation
Delve into the world of cryptography with a focus on encryption methods, hashing, and digital signatures. Understand cryptanalysis, breaking encryption, and the role of cryptography in securing communications, especially in African digital payment systems.
Module 13: Social Engineering Attacks and Frauds
Master social engineering techniques used to manipulate individuals and organizations. This module covers phishing, pretexting, baiting, and tailgating, with practical exercises in email spoofing and phishing simulations. Learn prevention and awareness strategies to counter social engineering attacks.
Module 14: Evading IDS, Firewalls, and Honeypots
Explore techniques for evading intrusion detection systems (IDS), firewalls, and honeypots. This module covers methods to avoid detection, tools for evasion, and case studies on evading security measures in sensitive environments, such as government networks.
Module 15: Denial-of-Service (DoS) Attacks
Understand the mechanics of DoS and DDoS attacks and learn various techniques to execute and mitigate these attacks. This module provides practical experience with tools like LOIC and HOIC and discusses strategies to defend against service disruptions.