Loading...

Course Description

This course covers the topics of hacking and cybersecurity from an offensive perspective. Students are introduced to common tools and techniques used by hackers to gain access to systems, steal information, and cover their tracks in the digital environment. Expect hands-on experience in executing and examining real cyber-attacks, as well as an understanding of the mindset of threat actors and malicious hackers.

Course Details

Skills Acquired:

  • Knowledge of offensive security methodologies
  • Ability to use ethical hacking tools for penetration testing
  • Skills in vulnerability assessment and exploitation
  • Understanding of how to mitigate and report on security threats

Course Components:

Lectures (Theory Component):

  • Duration: 8 hours
  • Offensive Security Concepts and Techniques
  • Common Tools Used by Hackers (Nmap, Metasploit, Burp Suite)
  • Phases of Ethical Hacking (Reconnaissance, Scanning, Exploitation)
  • Countermeasures and Mitigation Strategies

Cyber Range-Based Labs (Hands-On Component):

  • Duration: 16 hours
  • Conducting Penetration Testing Simulations § Exploiting Vulnerabilities in a Controlled Environment
  • Post-Exploitation Analysis and Reporting
Loading...

Thank you for your interest...

Unfortunately, this course is not currently open for enrolment.

If you have a Professional and Continuing Education account, take note of the course number and submit a course inquiry to be notified if new sections become available.

Questions?

Required fields are indicated by .