Level: Beginner → Intermediate
Format: Instructor-led lectures + hands-on labs + case studies + final assessment
Delivery: In-person or virtual lab environment
This 15‑day course teaches the fundamentals and applied skills of ethical hacking (authorized penetration testing) to help learners identify, exploit responsibly, and remediate security weaknesses in networks, systems, and web applications. Emphasis is placed on legal/ethical considerations, a repeatable testing methodology, real-world tool use in safe lab environments, and translating findings into actionable remediation. Graduates will understand how attackers operate and how to protect systems against them.
Aspiring penetration testers and security analysts
System/network administrators who want defensive perspective
Developers seeking secure coding awareness
IT managers wanting to understand risk and mitigation
Anyone with basic IT knowledge who wants hands-on cybersecurity skills
Basic understanding of operating systems (Windows/Linux)
Familiarity with networking concepts (TCP/IP, DNS, HTTP)
Comfortable using a command line (bash/PowerShell)
(If not, a short preparatory module can be provided.)
By the end of this course participants will be able to:
Explain legal, ethical and contractual boundaries for penetration testing.
Follow a structured pentest methodology: Recon → Scanning → Exploitation → Post‑exploitation → Reporting.
Use mainstream tools for reconnaissance, scanning, vulnerability discovery, and reporting.
Identify common vulnerabilities in networks, systems, and web applications and recommend remediation.
Produce a clear, prioritized penetration testing report with evidence and remediation steps.