Course / Course Details
Prior knowledge of networking and operating systems.
Completion of Network Security and Defense recommended.
Access to a virtual lab environment (Kali Linux preferred).
Aligned with the Certified Ethical Hacker (CEH) framework, this course immerses learners in the offensive side of cybersecurity. Through real-world simulations, learners will perform reconnaissance, scanning, exploitation, and post-exploitation using tools such as Metasploit, Nmap, and Burp Suite.
By the end of this course, learners will be able to:
Conduct reconnaissance and footprinting using open-source tools.
Perform scanning and enumeration on networked systems.
Exploit vulnerabilities in web and system environments ethically.
Document and report penetration testing results.
Apply ethical hacking techniques within a legal and professional framework.
Elias Mucacu is an accomplished cybersecurity professional and instructor with extensive experience in the fields of information security, network defense, and digital forensics. With a strong background in ICT management and hands-on expertise in implementing cybersecurity frameworks, Elias has trained professionals and students across various sectors, empowering them with practical skills to identify, prevent, and respond to evolving cyber threats.
No Review found