Ethical Hacking Foundation course

Learn the basics of ethical hacking with this 2-day crash course

Introduction

During this course, you will be taken on a journey with a hacker, crawling inside the world of vulnerability scanning, penetration testing and ethical hacking. You will have the opportunity to explore various hacking techniques and approaches.

This course is a mix of theoretical material and hands-on skills allowing you to explore the world of the hacker. Most topics will begin with the theory of a particular technique. Theory is followed with a hands-on demonstration using our art lab because you learn ethical hacking by doing it.

 

Download our Ethical Hacking track brochure to gain a complete overwiew of this course, our trainers and other hacking courses!

 

Target audience

This course is for those who take interest in Ethical Hacking with little knowledge of the technical aspects. 

 

Required knowledge

There is no prior knowledge required to attend this course. However, affinity with computers and technology is recommended

 

Exam, course material and certification

The SECO-Institute exam is conducted by EXIN and consists of multiple choice questions. The course will provide you with all the knowledge you need to pass the exam. Upon successful completion of your exam, you will receive an "Ethical Hacking Foundation" certificate from EXIN. Both the course material and the exam are in English. The exam is not included in this course. You can register for the exam via this link.

 

Ethical Hacking Foundation level 

This course constitutes the first level of the Certified Ethical Hacking Leader certification track of the SECO-Institute's Cyber Security & Governance Certification Program. Successful completion of an Ethical Hacking Foundation course will provide you with the necessary knowledge to be able to continue with the Ethical Hacking Practitioner course. More information on this certification program can be found on the SECO-institute website.

 

This course is also available online

SECO-Institute offers this course online through their virtual classroom environment. For the virtual classroom, click here to see available dates. For our classroom course, see the available dates below.

 

Just as in a real-world classroom, a student in a virtual classroom participates in synchronous instruction, which means that teacher and students are logged into the virtual learning environment at the same time. The advantage of a virtual classroom is that students from all over the world can participate without travel expenses.

Modules

  • Introduction to Ethical Hacking
    • Students learn the brief definition of ethical hacking
    • Students are aware of the hacking cycle
    • Students become acquainted with Kali Linux
  • Module 3 - Penetration II
    • Students acquire knowledge about manipulating parameters in web-pages including GET and POST parameters
    • Students become familiar with client and server-side validation
    • Students know what OWASP ZAP and Burpsuite are
    • Students know how to use ZAP/BURP to bypass client-side validation
    • Students know how to use ZAP/BURP with cookies
    • Students know what file inclusion is
    • Students know how local file inclusion works
    • Students know how remote file inclusion works
    • Students know how to use these techniques to gain shell access
  • Module 4 - Capture the Flag
    • Using the techniques learned in the previous 3 modules, students are able to break into the wireless network of Bicsma. They are able to discover interesting hosts and identify what services run on them. Students access and eventually exploit these services to gain access to the systems
  • Module 2 - Penetration I
    • Students acquire knowledge of dirb and nikto and their primary differences and are able to interpret the initial results of a dirb and nikto scan
    • Students know how to launch a vulnerability scan with Vega and analyse / interpret results
    • Students become familiar with the basic SQL commands and know some special SQL commands
    • Students know how to find a SQL Injection vulnerability
    • Students know how to execute an automated SQL Injection with SQLmap
    • Students are able to crack a password hash with John The Ripper
    • Students are able to use hydra to brute-force a web-based login form
  • Module 1 - Network Hacking
    • Students know the basics of wireless networking including BSSID and ESSID, open and closed networks and WPA/WEP security
    • Students are to find information about a wireless network adapter and configure the adapter to be used in WiFi hacking
    • Students know the basics of packet capturing using airodump and injection in order to capture and crack a WEP key
    • Students know the basics of using nmap and the zenmap GUI for network discovery scanning
  • Features

    • 2-day introductory course 
    • Course is available as Classroom or Virtual Classroom training
    • Official SECO-Institute course material will be provided through the Security Academy's Student Portal where you will find the course slides and plenty of additional courseware
    • Study load: 
      Contact hours: 14 hours (two days, minus breaks) 
      Self-study: 7 hours spread over the entire course 
    • Part of the SECO-Institute's Ethical Hacking certification track
    • EXIN examination (not included)

    Course information

    7,73.85

    Ethical Hacking Foundation course

    Score is based on ratings of 251 students

    3.8550

    Testimonials

    • Ethical Hacking Foundation is a fun course. Definitely recommended for security administrators and security officers so that they can learn what is possible for hackers.Anonymous
    • Fun interactive program that provides a good foundation for hackingAnonymous
    • Nice basic course where you actually do it yourself, try to hack using hacking toolsAnonymous

    Sign up for the newsletter.

    Others also viewed

    Your Internet Explorer is out of date.

    This website can not be viewed with this browser!

    Upgrade your browser to the latest version of Internet Explorer 8 or install another browser, such as Firefox or Google Chrome.