Ethical Hacking & Cybersecurity
1. Program Overview
The Certificate in Ethical Hacking & Cybersecurity training programe is a foundational, hands-on program designed to develop practical skills in
threat analysis, ethical hacking techniques, system defense, cybersecurity
tools, and incident response.
The program ensures legal, responsible, and ethical learning within
controlled lab environments.
2. Program Duration
- Total
Duration: 4–6
Months
- Learning
Hours: 150–200
Hours
- Delivery
Mode: Classroom
/ Online / Hybrid
- Components: Lectures, Labs, Simulations,
Projects, Exams
3. Target Audience
- Students pursuing
cybersecurity careers
- IT support personnel
- Network administrators
- Anyone preparing for CEH,
Security+, or Pentest+
4. Learning Outcomes
By the end of the
course, learners will be able to:
✔ Understand cybersecurity concepts and ethical
hacking principles
✔ Perform reconnaissance and vulnerability analysis
ethically
✔ Use cybersecurity tools (Nmap, Wireshark,
Metasploit, etc.)
✔ Identify and mitigate security vulnerabilities
✔ Secure networks, systems, and web applications
✔ Conduct incident response and basic digital
forensics
✔ Write professional cybersecurity reports
5. Course Structure & Modules
Module 1: Introduction to Cybersecurity & Ethical
Hacking
Topics:
- Cybersecurity fundamentals
- Threat actors, attack vectors
- Cyber kill chain
- Ethics, laws, and responsible
hacking
- Security frameworks &
certifications
Lab Work:
- Setting up a cybersecurity
lab (Kali Linux, Windows VM)
Module 2: Networking & Operating System Essentials
Topics:
- TCP/IP models & OSI
- Subnetting, DNS, DHCP, NAT
- Windows & Linux basics
for cybersecurity
- Packet analysis concepts
Lab Work:
- Wireshark packet capture
- Linux command-line
fundamentals
Module 3: Footprinting & Reconnaissance
Topics:
- OSINT techniques
- DNS enumeration
- WHOIS, email lookup
- Social engineering awareness
(non-practical)
Lab Work:
- theHarvester
- Recon-NG
- Passive scanning exercises
Module 4: Scanning & Enumeration
Topics:
- Network scanning methodology
- Nmap scanning techniques
- Banner grabbing
- Vulnerability scanning
Lab Work:
- Nmap service & version
scans
- Nessus/OpenVAS scanning
Module 5: Vulnerability Assessment
Topics:
- OWASP overview
- CVSS scoring
- Patch management
- Security misconfigurations
Lab Work:
- Vulnerability assessment on
target VMs
- Risk prioritization
Module 6: System Security & Hardening
Topics:
- Password attacks (theory
only)
- Privilege escalation concepts
- Malware types & defense
strategies
- OS security controls
Lab Work:
- Windows & Linux system
hardening
- Password auditing in lab
environments
Module 7: Web Application Security
Topics:
- OWASP Top 10
- Authentication & session
management
- Injection flaws (SQLi/XSS
simulations)
- Secure coding principles
Lab Work:
- DVWA / WebGoat vulnerability
identification
- XSS and SQLi testing in
isolated labs
Module 8: Network Security & Defense
Topics:
- Firewalls, VPNs
- IDS/IPS
- Zero Trust architecture
- SIEM concepts
Lab Work:
- Firewall rule configuration
- IDS log analysis
Module 9: Wireless Security
Topics:
- Wi-Fi standards
- Wireless attack types
(theory)
- Secure wireless
configurations
Lab Work:
- Wireshark wireless traffic
analysis
- Secure WPA3 setup
Module 10: Cryptography Essentials
Topics:
- Encryption vs hashing
- Symmetric & asymmetric
keys
- Certificates & SSL/TLS
- PKI
Lab Work:
- Hashing & encryption in
Linux
- File encryption
Module 11: Incident Response & Digital Forensics
Topics:
- Incident response lifecycle
- Digital evidence basics
- Log analysis
- Security monitoring
Lab Work:
- Windows event log
investigation
- Timeline analysis exercise
Module 12: Security Automation & Scripting
Topics:
- Python for cybersecurity
- Bash automation
- Log parsing
- Automating security tasks
Lab Work:
- Build a simple security
automation script
6. Assessments & Evaluation
Continuous Assessments
- 12 Quizzes (one per module)
- 12 Lab
Assignments
- Midterm
Examination
- Final
Examination
Final Project (Capstone)
Learners complete
one major project from these options:
- Vulnerability Assessment
Report
- Incident Response Simulation
- Web Application Security Test
(lab-based)
- Network Security Architecture
Design
- Threat Analysis Case Study
Evaluation Criteria:
- Technical accuracy
- Use of cybersecurity tools
- Documentation & reporting
quality
- Ethical compliance
- Presentation skills
Certification Requirements
To earn the
certificate, learners must:
✔ Complete all modules and labs
✔ Score at least 60% in assessments
✔ Complete the final project
✔ Pass the final exam
7. Learning Resources
- Kali Linux
- Windows Server & Client
- OWASP tools
- Wireshark
- Nmap
- OpenVAS/Nessus
- VirtualBox/VMware
- Security documentation
templates
8. Career Pathways
This certification
prepares learners for roles such as:
- Cybersecurity Technician
- Junior Penetration Tester
- SOC Analyst (Tier 1)
- Network Security Assistant
- Vulnerability Analyst