Ethical Hacking Techniques
Ethical Hacking Techniques
Join this ethical hacking course to learn Kali Linux, VMware, Wireshark, Nmap, Metasploit and social engineering. Perform footprinting, vulnerability scanning, and web hacking to gain practical cybersecurity and penetration testin
Earn a certificate with an Academy Pro subscription

Stand out to recruiters

Share on professional channels

Globally recognised

Land your dream job

Course outline
Industry focussed curriculum designed by experts
Introduction to Ethical Hacking
9 items
1.40 hr
- Introduction to Ethical Hacking
- Agenda of Introduction to Ethical Hacking
- Types of Ethical Hackers
- Importance of Ethical Hacking
- Ethical Hacking Process and its Legal Considerations
- Introduction to AI in Ethical Hacking
- Essential Skills, Tools and Career Paths in Ethical Hacking
- Case Study on Operation Sindoor
- Summary of Introduction to Ethical Hacking
Setting up a Hacking Lab
6 items
1.15 hr
- Installation of VMware, Metasploit and Kali Linux
- Installation of Ubuntu and Windows OS for VMware
- Installation of other Tools and Services on Ubuntu and Windows OS for VMware
- Basic Linux commands for Hacking
- Installation of Metasploit
- Summary of Setting up a Hacking Lab
Footprinting & Reconnaissance
6 items
0.48 hr
- Introduction to Footprinting
- Information Gathering Using Nmap
- OSINT and Information Gathering using Google Search Operators
- Network Traffic Analysis using Wireshark
- Introduction to DarkTrace and Shodan
- Summary of Footprinting and Reconnaissance
Vulnerability Assessment, Exploitation and Scanning
5 items
0.52 hr
- Vulnerability Assessment, Scanning and Exploitation
- Privilege Escalation and Gaining Access to Systems
- Post Exploitation Techniques
- Persistence and Maintaining Access
- Summary of Vulnerability Assessment, Exploitation and Scanning
Web Application Hacking
5 items
0.38 hr
- Agenda of Web Application Hacking
- Understanding Web Applications
- Security Testing and Input Validation Issues
- Common Web Server Vulnerability and MITRE Attack
- Summary of Web Application Hacking
Wireless Network Hacking
8 items
0.58 hr
- Agenda of Wireless Network Hacking
- Introduction to Wireless Network Hacking
- Types of Wireless Network Attacks
- MITM Attack
- Automated SQL Injection with sqlmap
- Deauth DDoS Attack
- Introduction to Burp Suite
- Summary of Wireless Network Hacking
Social Engineering Attacks
4 items
0.29 hr
- Agenda of Social Engineering Attacks
- Overview of Social Engineering Attacks
- Hands-on Social Engineering Attacks
- Summary of Social Engineering Attacks
Get access to the complete curriculum with your free trial
Start 7-Day Free TrialGuided Projects
Solve real-world projects with a step-by-step guide, starter code templates, and access to model solutions to boost your skills and build a standout resume.
- GUIDED PROJECT 1
- Cybersecurity Awareness & Vulnerability Assessment of a Small Business Website
- In this project, you will conduct a cybersecurity awareness campaign and perform a vulnerability assessment on a small business website. The primary goal is to identify security vulnerabilities, provide recommendations for improvements and raise awareness about common cybersecurity threats. You will use ethical hacking techniques, including footprinting, reconnaissance, network scanning and exploitation to simulate an attack on the website. The project will help enhance your understanding of security flaws in web applications and introduce you to basic penetration testing practices.
- GUIDED PROJECT 2
- Wireless Network Penetration Testing with AI-driven Detection
- In this project, you will conduct a wireless network penetration test to identify security vulnerabilities and unauthorized access points in a Wi-Fi network. By simulating attacks like packet sniffing, WPA/WEP cracking and Man-In-The-Middle (MITM) attacks, you will evaluate the security of wireless networks. You will also integrate AI-driven tools such as Darktrace to detect suspicious activities and unauthorized devices in the network. This project will help you understand how to secure wireless networks, identify potential threats and enhance network security by incorporating AI-based threat detection.
Gain skills & build your resume with complete access to guided projects in your free trial
Start 7-Day Free TrialCourse Instructors
Aniket Amdekar
General Manager - Cyber Defence Education
Gain work-ready skills with an Academy Pro subscription
Get unlimited access to in-demand courses that get you noticed at work
Subscribe To Pro • $25/MonthShare your certificate online
Share your professional certificate & updated resume on LinkedIn


Learn from the best
Taught by top faculty & industry experts


Learn by doing
Apply skills with guided projects and interactive coding exercises
AI Mock Interviews
30+ Guided Projects
200+ Coding Exercises

Learn with AI
Get AI-powered coding hints & instant doubt resolution
24x7 Doubt resolution
Coding Hints
Advance your career with
Top University programs
Gain industry-relevant skills through learning from top faculty, guidance from industry mentors, and hands-on projects.






MIT Professional Education
12 Weeks  • Online









McCombs School of Business at The University of Texas at Austin
7 months  • Online



McCombs School of Business at The University of Texas at Austin
7 months  • Online



McCombs School of Business at The University of Texas at Austin
6 months  • Online


