Get in Touch

Course Outline

Day 1: Overview of cybersecurity, ethical hacking, and contemporary architecture

Day 2: Active reconnaissance

Day 3: System exploitation

Day 4: Exploitation and post-exploitation, and report drafting

Day 5: Certification Exam

Learning objectives

  • Understand the fundamental concepts of ethical hacking and the technical knowledge required to perform and manage penetration tests.
  • Master the concepts, approaches, standards, methods, and techniques used to operate an effective ethical hacking process.
  • Acquire the expertise to conduct a penetration test using a logical sequence of tools and techniques.
  • Develop the ability to analyze testing results and produce effective reports that help organizations address vulnerabilities.
  • Strengthen the personal qualities necessary to act with due professional care during penetration tests.
  • Be able to define and explain the different phases of cyberattacks.
  • Familiarize yourself with the various tools used to collect information prior to performing attacks.
  • Learn about the different attacks that impact the security of an organization's network.
  • Learn how to perform the various steps of a penetration test (ethical hacking), including information gathering, scanning, enumeration, and attack processes.
  • Understand the key aspects of Distributed Denial of Service (DDoS) attacks and their associated tools.

Educational approach

  • This training combines theory and practical exercises, with a ratio of 40% theory and 60% practical application. Practical exercises are integrated with tutorials to help candidates acquire the required skills.
  • The laboratory environment is intensive, providing in-depth knowledge and practical experience regarding current security systems for each candidate.
  • Learning by doing: Participants will engage in scenarios, situations, and decision-making processes they are likely to encounter in their professional lives.
  • Practical tests are designed to simulate the Certification Exam.

Examination

The "PECB Certified Lead Ethical Hacker" exam meets all requirements of the PECB Examination and Certification Program (ECP). The exam covers the following competency domains:

Domain 1: Fundamental principles and concepts of ethical hacking

Domain 2: Attack mechanisms

Domain 3: Principles and reference frameworks for penetration tests

Domain 4: Planning and performing penetration tests using various tools and techniques

Domain 5: Drafting penetration testing reports

The examination consists of two parts. The first part is a paper-based exam featuring essay-type questions. The second part is technical, requiring candidates to conduct penetration testing exercises on a computer and draft a report of the analysis.

Participants are authorized to use their personal notes during both the paper-based exam and the practical component.

For more information about exam details, please visit Examination Rules and Policies.

Certification

After successfully completing the exam, you can apply for the credentials listed in the table below. You will receive a certificate once you comply with all requirements related to the selected credential. For more information about Ethical Hacking certifications and the PECB certification process, please refer to the Certification Rules and Policies.

To be considered valid, activities related to ethical hacking and penetration testing should follow best practices and include the following activities:

  1. Understanding the scope of ethical hacking
  2. Defining a penetration testing approach
  3. Understanding the steps that should be followed during an ethical hacking process
  4. Defining the penetration testing criteria
  5. Evaluating pen test scenarios and treatment options
  6. Understanding methods that help increase the security of operating systems
  7. Reporting the penetration testing results

Requirements

A fundamental understanding of Information Security and advanced proficiency in operating systems (e.g., Microsoft, Linux, etc.) is required. Additionally, it is advisable for candidates to possess knowledge of computer networks, operating system usage, and programming concepts.

 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories