top of page

Certified Ethical Hacker Course Outline

This intensive two-month course covers the five critical phases of ethical hacking, focusing on real-world applications and hands-on labs. Each week, students will dive into a new phase, followed by practical lab sessions to reinforce their learning. Our curriculum is crafted to provide both foundational knowledge and advanced techniques, preparing you for industry certifications and real-world challenge

cehmodule.png

Week 1: Reconnaissance

  • Topics Covered:

    • Introduction to Ethical Hacking

    • Information Security Fundamentals

    • Reconnaissance Techniques

    • Footprinting and Gathering Information

  • Labs:

    • Setting up a lab environment (VirtualBox/VMware with Kali Linux)

    • Using tools like Nmap, Maltego, and Recon-ng for footprinting

    • Performing Google hacking and exploring Shodan

Week 2: Scanning and Enumeration

  • Topics Covered:

    • Network Scanning Techniques

    • Enumeration Techniques

    • Vulnerability Scanning

  • Labs:

    • Advanced Nmap usage for network scanning

    • Enumerating systems with Enum4linux and SNMPwalk

    • Using Nessus and OpenVAS for vulnerability scanning

Week 3: Gaining Access

  • Topics Covered:

    • System Hacking and Exploitation

    • Malware and Payloads

    • Privilege Escalation

  • Labs:

    • Exploiting vulnerabilities with Metasploit

    • Creating and analyzing malware with msfvenom

    • Privilege escalation on Windows and Linux systems

Week 5: Reporting and Mitigation

  • Topics Covered:

    • Documentation and Reporting

    • Mitigation Strategies

    • Legal and Ethical Considerations

  • Labs:

    • Writing a penetration testing report

    • Analyzing and mitigating vulnerabilities

    • Reviewing case studies and understanding legal frameworks

Week 4: Maintaining Access and Covering Tracks

  • Topics Covered:

    • Maintaining Access Techniques

    • Clearing Logs and Covering Tracks

    • Evading IDS, Firewalls, and Honeypots

  • Labs:

    • Persistence techniques using Metasploit and other tools

    • Clearing logs and using anti-forensic techniques

    • Bypassing firewalls and evading detection with Nmap and Metasploit

Week 6: Comprehensive Labs and Review

  • Activities:

    • Capture the Flag (CTF) challenges focusing on all five phases

    • Practical scenario-based exercises

    • Group discussions and Q&A sessions

Enrollment

Ready to take the next step in your cybersecurity career? Enroll in our Ethical Hacking course today and become a part of the CX2 Space community.

signal-2024-08-26-134823_004.png
CX2 Space was established in 2019 with the primary goal of providing world-class Information Security services.

Get in touch with us on LinkedIn

  • LinkedIn
ATC-Logo.png

© 2024 Copyright - CX2 Space Information Security Services.

bottom of page